Fundamentals of Communication and Networking
Fundamentals of Communication and Networking
The company sets up a computer that will act as a server. The server’s primary role will
be to act as an email server. It will also allow technicians to remotely login so that the
server can be managed from other computers.
State the names of two application layer protocols that the server must implement and
explain what each will be used for.
Protocol 1: ____________________________________________________________
Use: _________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
Protocol 2: ____________________________________________________________
Use: _________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
(Total 4 marks)
Q2.
Explain how the transport layer of the TCP/IP stack determines which application layer
software on the server should deal with a received request.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 1 mark)
Q3.
A message is to be transmitted from computer A to computer B. The message will be
encrypted using asymmetric encryption. To enable computer B to authenticate that the
message was sent by computer A, a digital signature will also be sent with the message.
Explain how computer B will decrypt the message and verify that it was sent by computer
A.
In your response you should refer to the specific keys that will be used in this process.
You do not need to explain how computer A will encrypt the message or create the digital
signature.
Page 1 of 67
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 4 marks)
Q4.
Employees at a bank use client computers to access data that is stored on a database
server.
The database server uses software to query and modify data stored in a database on hard
disk drives. It returns the results of these queries to the clients over the bank’s computer
network.
The performance of the system is unsatisfactory: the time-delay between a client sending
a query to the server and the client receiving the results is unacceptably long.
Explain how the performance of the system might be improved. You should consider the
following factors that might be affecting the performance:
In your answer you will be assessed on your ability to follow a line of reasoning to produce
a coherent, relevant and structured response.
(Total 12 marks)
Q5.
The diagram shows the physical topology of a local area network (LAN) used by a
company, and its connection to the Internet. The LAN uses the IPv4 protocol.
Page 2 of 67
Internally, the network has been divided into subnets: 27 bits have been allocated to the
network / subnet identifier.
(a) In binary, write out the subnet mask that has been programmed into the devices on
the network.
(1)
(b) Subnet Z consists of all of the devices that are directly connected to Switch B.
___________________________________________________________________
___________________________________________________________________
(1)
(c) When a device wishes to join Subnet Z it communicates with the DHCP server.
Explain:
___________________________________________________________________
___________________________________________________________________
Page 3 of 67
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(4)
(Total 6 marks)
Q6.
A network uses the CSMA / CA access method with Request to Send / Clear to Send
(RTS / CTS).
A computer on the network has data to send to another computer. Explain how the
CSMA / CA access method with RTS / CTS will be used during this transmission.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 6 marks)
Q7.
Both the Caesar and Vernam ciphers are symmetric ciphers, whereas a public and private
key encryption system is an asymmetric cipher system.
_______________________________________________________________________
_______________________________________________________________________
Page 4 of 67
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 1 mark)
Q8.
Between 2008 and 2010, a company that was gathering data for an online mapping
system, using cars fitted with cameras and WiFi equipment, collected some information
that was being transmitted on personal WiFi networks. The company apologised for doing
this and an investigation found that a small number of software developers had been
responsible for adding this functionality to the mapping system data collection software.
In your answer you will be assessed on your ability to follow a line of reasoning to produce
a coherent, relevant and structured response.
(Total 12 marks)
Q9.
Figure 1 shows the physical topology of a local area network (LAN) and its connection to
the Internet. The LAN uses the IPv4 protocol.
Figure 1
Page 5 of 67
Q10.
Explain the difference between a physical topology and a logical topology.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 2 marks)
Q11.
A web browser is used to access the World Wide Web.
Web pages can be retrieved from a web server using either the HTTP or the HTTPS
protocol.
Page 6 of 67
(a) What does HTTP stand for?
___________________________________________________________________
(1)
___________________________________________________________________
___________________________________________________________________
(1)
(Total 2 marks)
Q12.
A computer that retrieves a web page from a web server is known as a client.
Identify the TCP/IP layer that is concerned with ports and explain how a client port and a
well-known port are used when retrieving a web page.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 3 marks)
Q13.
To access an exam paper on the AQA website a student’s computer might need to make
use of a Domain Name System (DNS) query which is transmitted to a DNS server.
___________________________________________________________________
___________________________________________________________________
(1)
(b) In some circumstances the student’s computer will not need to contact a remote
DNS server to access a resource.
Describe two situations when a DNS query will not be sent to a DNS server.
Situation 1 __________________________________________________________
___________________________________________________________________
Page 7 of 67
___________________________________________________________________
Situation 2 __________________________________________________________
___________________________________________________________________
___________________________________________________________________
(2)
(Total 3 marks)
Q14.
A message is to be transmitted from Computer A to Computer B. For security reasons, the
message will be encrypted.
(a) What is encryption?
___________________________________________________________________
___________________________________________________________________
(1)
The message that is being transmitted will be encrypted and decrypted using public and
private keys. The figure below shows the encryption and decryption processes. The
symbols to in the figure represent the names of keys.
Page 8 of 67
(b) State the names of the keys that are represented by each of the symbols to .
Label Key Name
(2)
(c) Describe the process that will take place at the position labelled .
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(1)
Page 9 of 67
(d) State two purposes of the addition of the digital signature to the message.
Purpose 1: __________________________________________________________
___________________________________________________________________
Purpose 2: __________________________________________________________
___________________________________________________________________
(2)
(Total 6 marks)
Q15.
A student is using her computer at school.
The diagram shows the physical topology of the Local Area Network (LAN) to which her
computer is connected. The LAN is divided up into segments. It also shows a web server
that her computer connects to through the Internet. The student is using the computer
labelled .
Write a detailed description of how one packet of data that the student is uploading to the
web server will be routed from her computer in the UK to the web server that is located in
Chicago in the USA. You may assume that the web browser software on the student’s
computer has already used a domain name server to look up the IP address of the web
server.
• how the packet will be routed within the LAN from the student’s computer to the
Page 10 of 67
router (Router 3) that links the LAN to the Internet and
• how the packet will be routed to the web server once the packet is on the Internet.
In your answer you will be assessed on your ability to use good English, and to organise
your answer clearly in complete sentences, using specialist vocabulary where appropriate.
(Total 8 marks)
Q16.
A bar code scanner is connected to a computerised point of sale system (till). When a
product is sold, the bar code that is printed on the product is scanned by the scanner and
transmitted to the point of sale system.
Figure 1 shows the ASCII code for the character "9", which has been read from the bar
code, being transmitted to the point of sale system.
(a) Write the missing values of the stop bit, parity bit and start bit on Figure 1.
Figure 1
(2)
(b) Explain what asynchronous data transmission is and why stop and start bits are
required when asynchronous data transmission is used.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(3)
As part of the process of preparing the data for transmission, the 7-bit ASCII code
(0111001) is processed by a Mealy machine (a type of Finite State Machine with output).
The ASCII code is processed from left to right, i.e. the leftmost 0 is the first digit to be
Page 11 of 67
processed.
Figure 2 shows a diagram of the Mealy machine. Each transition is labelled with the input
symbol that will trigger the transition, followed by a comma, followed by the output that will
be produced.
Figure 2
(c) What output is generated by the Mealy machine in Figure 2 for the input 0111001?
___________________________________________________________________
(1)
(d) The last digit output by the Mealy machine is used in the transmission.
___________________________________________________________________
___________________________________________________________________
(1)
(e) Serial communication has been chosen instead of parallel communication even
though the scanner and point of sale system are located next to each other.
Reason 1 ___________________________________________________________
___________________________________________________________________
___________________________________________________________________
Reason 2 ___________________________________________________________
___________________________________________________________________
___________________________________________________________________
(2)
(Total 9 marks)
Q17.
(a) Three important computer security procedures are:
• authentication
Page 12 of 67
• authorisation
• accounting
The table lists two situations which involve the use of security procedures.
For each row in the table, place a tick in one column to indicate whether the
Situation and Procedure is an example of Authentication, Authorisation or
Accounting.
Situation and
Authentication Authorisation Accounting
Procedure
A web server
generating a log of the
IP addresses of
computers that have
accessed it.
Using a digital
signature when sending
an e-mail message.
(2)
Explain what a virus is, and explain the difference between a virus and a worm.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(3)
Describe the steps that would be involved in producing a digital signature for the
message before it is transmitted by Computer A.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
Page 13 of 67
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(4)
(Total 9 marks)
Q18.
Rich client (thick client), thin client and Software as a Service (SaaS) are three methods
that can be used to make software applications available to the users of computers that
are connected to a network.
• Explain how rich client and thin client systems work.
• Describe the different hardware requirements of rich client and thin client systems.
• Explain why Software as a Service can be considered to be a special type of thin
client system, and what distinguishes it from other types of thin client systems.
In your answer you will be assessed on your ability to use good English, and to organise
your answer clearly in complete sentences, using specialist vocabulary where appropriate.
(Total 8 marks)
Q19.
Wireless networks make use of the carrier sense multiple access and collision avoidance
(CSMA / CA) method when accessing a wireless network to transmit data.
The diagram below shows a simplified state transition diagram of the CSMA / CA wireless
network access method without use of request to send / clear to send (RTS / CTS).
Page 14 of 67
(a) Complete the table by writing in the descriptions that should appear at positions 1 to
4 in the above diagram.
Label Description
1
2
3
4
(4)
(b) Explain the role of a service set identifier (SSID) in wireless networking and why
some network administrators turn off SSID broadcasting.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(3)
(c) Explain why browsing the Internet might be slower at a public hotspot in a coffee
shop than at home on a wireless network.
___________________________________________________________________
Page 15 of 67
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(2)
(Total 9 marks)
Q20.
The OpenSSL project is a collaborative effort to develop a general purpose cryptography
software library for encrypting data transmissions.
In April 2014, a bug known as the 'Heartbleed Bug' was found in the OpenSSL software
library. The bug allowed anyone on the Internet to access the memory of systems
protected by the vulnerable versions of this OpenSSL software.
According to web server statistics, this bug could have affected around 66% of known web
servers.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(2)
(b) OpenSSL is an example of open source software and so its source code is freely
available for inspection.
Describe two benefits of having the source code of software publicly available.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(2)
(c) The ‘Heartbleed Bug’ was introduced into the code on December 31, 2011 but was
only discovered in 2014.
State one reason why the bug took over two years to find.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(1)
Page 16 of 67
(d) Government agencies sometimes require that they are given copies of encryption
keys. This allows these agencies to decrypt messages encrypted with these keys.
State one reason for and one reason against a government having the ability to
decrypt any encrypted messages.
Reason for:_________________________________________________________
___________________________________________________________________
___________________________________________________________________
Reason against:______________________________________________________
___________________________________________________________________
___________________________________________________________________
(2)
(Total 7 marks)
Q21.
(a) Represent the denary number 55 using 8-bit unsigned binary.
___________________________________________________________________
___________________________________________________________________
(1)
___________________________________________________________________
___________________________________________________________________
(1)
(c) Why are bit patterns often displayed using hexadecimal instead of binary?
___________________________________________________________________
___________________________________________________________________
(1)
(d) Represent the denary number -59 as an 8-bit two’s complement binary integer.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(2)
(e) Represent the denary number 5.625 as an unsigned binary fixed point number
with three bits before and five bits after the binary point.
___________________________________________________________________
Page 17 of 67
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(2)
(f) The ASCII system uses 7 bits to represent a character. The ASCII code in denary for
the numeric character ‘0’ is 48; other numeric characters follow on from this in
sequence.
The numeric character ‘0’ is represented using 7 bits as 0110000.
Using 7 bits, express the ASCII code for the character ‘6’ in binary.
___________________________________________________________________
___________________________________________________________________
(1)
(g) How many different character codes can be represented using 7-bit ASCII?
___________________________________________________________________
___________________________________________________________________
(1)
(h) Examples of logical bitwise operators include AND, OR, NOT and XOR.
Describe how one of these logical bitwise operators can be used to convert the 7-bit
ASCII code for a numeric character into a 7-bit pure binary representation of the
number, (eg 0110001 for the numeric character '1' would be converted to 0000001).
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(2)
(i) Characters are transmitted using an 8-bit code that includes the 7-bit ASCII code
and a single parity bit in the most significant bit. A parity bit is added for error
checking during data transmission.
Using even parity, what 8-bit code is sent for the numeric character '0'?
___________________________________________________________________
___________________________________________________________________
(1)
(j) Hamming code is an alternative to the use of a single parity bit. Hamming code uses
multiple parity bits - this allows it to correct some errors that can occur during
transmission.
The parity bits are located in the power of two bit positions (1, 2, 4, 8, etc.). The
Page 18 of 67
other bit positions are used for the data bits.
Describe how the receiver can detect and correct a single-bit error using Hamming
code.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(4)
(k) Figure 1 shows the bit pattern received in a communication that is using even
parity Hamming code. The data bits received are 1101000.
Figure 1
Bit position 11 10 9 8 7 6 5 4 3 2 1
Bit 1 1 0 0 1 0 0 0 0 0 1
Which bit position from the bit pattern in Figure 1 contains an error?
___________________________________________________________________
___________________________________________________________________
(1)
Figure 2 shows a Finite State Machine (FSM) represented as a state transition diagram.
The machine takes a bit pattern as an input. The bit pattern is considered to be valid if the
machine ends up in the accepting state Sx. The bit patterns 0111000 and 0110001 are
valid; the bit patterns 010011 and 01110111 are not valid. Bit patterns are processed
starting with the left-most bit.
Figure 2
Page 19 of 67
(l) Is the bit pattern 0111010 a valid input for the FSM shown in Figure 2?
___________________________________________________________________
___________________________________________________________________
(1)
(m) A finite state machine can also be represented as a state transition table. The table
below shows part of the state transition table that represents the finite state machine
shown in Figure 2. The state transition table is only partially complete.
Initial State Input New State
Sg 1
Sy
Sy
___________________________________________________________________
___________________________________________________________________
(1)
(o) The state Si in the FSM shown in Figure 2 is not necessary and is going to be
removed from the FSM.
Page 20 of 67
Describe the change that needs to be made so that state Si can be removed without
changing the functionality of the FSM.
___________________________________________________________________
___________________________________________________________________
(1)
(Total 22 marks)
Q22.
(a) Figure 1 and Figure 2 show two screenshots: identify the protocols being used in
each.
Figure 1
1) **** NEW CONNECTION (127.0.0.1)
1) C --> HELO tarzan.synametrics.com
1) S <-- 250 localhost. Please to meet you
1) C --> MAIL FROM:<asdf>
1) S <-- 250 OK
1) C --> RCPT TO:<[email protected]>
1) S <-- 250 OK
1) C --> DATA
1) S <-- 250 Message queued for delivery.
1) C --> QUIT
1) S <-- 221 Connection successfully closed
1) **** CONNECTION TERMINATED in 150ms.
Protocol ___________________________________________________________
Figure 2
[email protected]'s password:
Last login: Mon Feb 10 17:04:17 2014 from cpc4-warw15-2-
0.cable.virginm.net
[admin@torvalds ~]$ ls
Desktop
drupal test
httpd.log xibo-server.tar.gz
mysqldump.sql
[admin@torvalds ~] unzip xibo-server.tar.gz
[admin@torvalds ~] reboot
Protocol ___________________________________________________________
(2)
Figure 3 below shows part of the result of running a traceroute command on the URL
http://www.computingatschool.org.uk
Figure 3
traceroute to http://www.computingatschool.org.uk (129.12.3.236), 64
hops max
1 10.0.1.1 (10.0.1.1) 2.352ms 1.572ms 3.359ms
Page 21 of 67
2 cpc4-warw15-2-0-gw.3-2.cable.virginm.net (81.111.110.1) 12.619ms
12.300ms 10.466ms
3 brhm-core-2b.network.virginmedia.net (213.105.114.89) 12.807ms
11.505ms 16.987ms
4 brhm-bb-1b.network.virginmedia.net (62.253.174.77) 16.039ms
11.434ms 11.354ms
___________________________________________________________________
(1)
___________________________________________________________________
___________________________________________________________________
(1)
(d) The traceroute command shows the ‘hops’ taken to get from a computer to the
requested address. Each hop identifies a router on the Internet.
Explain why traceroute might show different hops when run a second time with the
same destination address.
___________________________________________________________________
___________________________________________________________________
(1)
Figure 4
Page 22 of 67
(e) Complete the table below by naming the TCP / IP layers used in Figure 4 above.
Layer
1
2
3
4
(2)
(f) Figure 4 shows how a packet travels from Host A to Host B through two routers.
Describe, for a packet, the role of the two lower levels of the TCP / IP stack in the
router.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
Page 23 of 67
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(2)
(Total 9 marks)
Q23.
A student is configuring the Local Area Network (LAN) at her home.
The diagram below shows the physical topology of the LAN and its connection to the
Internet.
Some, but not all, of the components of the Combined Device are shown.
• Port Y of the router in the Combined Device has the IP address 82.73.12.9.
• The network adapter card in the desktop computer has been allocated the IP
address 192.168.0.2.
• The subnet mask 255.255.255.0 has been programmed into devices to
(a) Port X is the router port, within the Combined Device, that allows devices on the
LAN to access the Internet. Suggest a suitable IP address that could be allocated to
Page 24 of 67
Port X of the Combined Device.
___________________________________________________________________
(1)
(b) What physical network topology has been used for the LAN?
___________________________________________________________________
(1)
(c) The IP addresses allocated to the devices on the LAN are non-routable IP
addresses.
The IP address allocated to Port Y of the combined device is a routable IP address.
Explain why the devices connected to a LAN are usually given non-routable IP
addresses.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(2)
(d) The desktop computer is uploading a file to an FTP server on the Internet.
Explain how the desktop computer will use the subnet mask (255.255.255.0), that it
has been programmed with, to determine that the data being sent to the FTP server
must be sent to the combined device from where it will be transferred on to the
Internet.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(3)
Describe how the firewall might control the data that flow between the LAN and the
Internet.
Page 25 of 67
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(3)
(f) The ADSL connection to the Internet is broadband and the cabled connections within
the LAN are baseband.
___________________________________________________________________
___________________________________________________________________
(1)
(g) The smart TV is capable of being connected to the network wirelessly or using a
cabled connection.
___________________________________________________________________
___________________________________________________________________
(1)
(Total 12 marks)
Q24.
The table below lists three situations which involve the transmission of data / information /
addresses.
(a) For each row in the table below, place a tick in one column to indicate whether the
transmission is most likely to be serial, most likely to be parallel or could be either
serial or parallel.
Situation Most likely Most likely Could be either Serial
to be to be or Parallel
Parallel Serial
Sending data to a
peripheral, such as a
printer, that is plugged
directly into a computer.
Transferring memory
addresses between the
processor and the main
memory of a desktop
Page 26 of 67
computer.
Transmitting an email
across a WAN from a
computer in England to
an email server in
Scotland.
(3)
___________________________________________________________________
___________________________________________________________________
(1)
(c) When data is transmitted over long distances, eg via satellites, latency can become
a problem.
___________________________________________________________________
___________________________________________________________________
(1)
(Total 5 marks)
Q25.
A company operates a Local Area Network (LAN) which is used by its employees.
Page 27 of 67
Explain why networks that use a bus topology are often segmented.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(2)
(c) Previously, employees of the company used word processing and spreadsheet
software that was installed locally on each of the individual computers on the
network. Now, employees use software with similar features as a service (SaaS).
The software runs on a web server and is accessed through the Internet.
Page 28 of 67
(i) Explain two advantages of using software as a service instead of using
software installed locally on individual computers.
Advantage 1 ___________________________________________________
______________________________________________________________
______________________________________________________________
Advantage 2 ___________________________________________________
______________________________________________________________
______________________________________________________________
(2)
______________________________________________________________
______________________________________________________________
______________________________________________________________
(1)
(d) One difference between a Local Area Network (LAN) and a Wide Area Network
(WAN)is the area that they cover. Describe two other differences between a LAN
and a WAN.
Difference 1 _________________________________________________________
___________________________________________________________________
Difference 2 _________________________________________________________
___________________________________________________________________
(2)
(Total 10 marks)
Q26.
A particular long-distance data transmission system transmits data signals as electrical
voltages using copper wire.
(a) What is the relationship between the bandwidth of the copper wire and the bit rate at
which the data can be transmitted?
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(1)
Page 29 of 67
What is latency in the context of data communications?
___________________________________________________________________
___________________________________________________________________
(1)
The system uses four different voltage levels so that two data bits can be transmitted with
each signal change.
The table below shows the signal levels (in volts) that the system uses for particular binary
patterns.
Binary pattern Signal level (volts)
00 0
01 2
10 4
11 6
Using this system, the binary pattern 011100011011 would be transmitted as the voltage
sequence 2,6,0,2,4,6 as shown in the graph below:
(c) What, precisely, is the relationship between the bit rate and the baud rate for this
system?
___________________________________________________________________
___________________________________________________________________
(1)
(d) A Moore machine is a type of finite state machine that produces output. The
transitions are labelled with the inputs and each state is labelled with a name and
the output that it produces; if a particular state has no output then it is labelled with
just a name.
The diagram below shows an incomplete diagram of a Moore machine that will
convert a two-bit binary code into the signal level (in volts) that is transmitted to
represent it, as listed in the table above.
Complete the diagram below. Label all of the transitions and the states that are
currently unlabelled. The machine should work for the four binary patterns 00, 01, 10
and 11.
Page 30 of 67
(4)
(Total 7 marks)
Q27.
An object-oriented program is being written to store details of the hardware devices that
are connected to a computer network in a college. This will be used by the network
manager to perform an audit of the equipment that the college owns.
Two different types of devices are connected to the network. They are printers and
computers. The computers are categorised as being laptops, desktops or servers.
A class Device has been created and two subclasses, Printer and Computer are to be
developed. The Computer class will have three subclasses: Laptop, Desktop and
Server.
(3)
(b) The Device class has data fields MACAddress, DeviceName and Location.
Page 31 of 67
Device = Class
Public
Procedure AddDevice
Function GetMACAddress
Function GetDeviceName
Function GetLocation
Private
MACAddress: String
DeviceName: String
Location: String
End
• HDDCapacity: Stores the capacity of the Hard Disk Drive installed in the
computer, in gigabytes.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(4)
(c) The Laptop class has the additional data field BluetoothInstalled. This field will
indicate whether or not the laptop is fitted with a Bluetooth module.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
Page 32 of 67
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(2)
(d) Explain what Bluetooth is and give an example of a task for which a laptop user
might use Bluetooth.
___________________________________________________________________
___________________________________________________________________
(2)
___________________________________________________________________
___________________________________________________________________
(1)
(Total 12 marks)
Q28.
The diagram below is a partial view of a router network connecting an e-mail client to an
e-mail server.
Page 33 of 67
(a) Describe two roles of the routers shown in the diagram above.
Role 1: _____________________________________________________________
___________________________________________________________________
Role 2: _____________________________________________________________
___________________________________________________________________
(2)
___________________________________________________________________
(1)
(c) The diagram below shows the TCP/IP stack for two computers (hosts) connected
via a network.
Explain how the TCP/IP stack in each host supports an e-mail client to e-mail server
request at the same time as a web browser to web server request. You should cover
in your explanation:
Page 34 of 67
• the steps from the initiation of a request to the receipt of a response
• the role of the different TCP/IP layers in the stages of client-server operation
In your answer you will be assessed on your ability to use good English and to
organise your answer clearly in complete sentences, using specialist vocabulary
where appropriate.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(6)
(Total 9 marks)
Page 35 of 67
Mark schemes
Q1.
2 marks AO2 (analyse) and 2 marks AO1 (knowledge)
Award 1 mark for each correctly named protocol, up to a maximum of 2 marks and 1
mark for each correct explanation of what a protocol will be used for, if linked to the
correct protocol.
Protocol
Use (AO1)
(AO2)
SMTP //
Simple Mail To send/transmit/receive emails (to/from
Transfer another email server/client).
Protocol
SSH // Secure
So that technicians can execute commands on
Shell //
the server // to give access to command line //
Telnet //
provides a secure/encrypted connection for
RDP // Remote
remote management (only award for secure
Desktop
protocols) NE. to login remotely
Protocol
A. if correct initialism used but then the full term is incorrect eg “SMTP – Special Mail
Transfer Protocol” as BOD
A. other protocols that achieve the same purposes as those listed above
R. non-application layer protocols eg TCP, IP
[4]
Q2.
Mark is AO1 (understanding)
(The transport layer will) use the port number to (determine which server / software should
deal with the request) // by adding a port number to the request/data/packet;
A. examples of specific port numbers and which server / software they would be directed
to.
[1]
Page 36 of 67
Q3.
All marks AO1 (understanding)
B’s private key is used to decrypt the message (and signature); R. more than one key
referenced
The message is rehashed // a new message digest/hash is calculated from the message;
A’s public key is used to decrypt the digital signature (to produce the received message
digest);
If received message digest and recalculated message digest match / if both hashes match
then the sender can be authenticated / B knows that A sent the message;
A. if recalculated hash matches digital signature then B knows A sent message, if third
mark point not awarded.
NE. if hashes match then B knows message has not been tampered with
Q4.
All marks AO1 (understanding)
Level Description Mark
Range
Page 37 of 67
substantiation.
For each guidance point, if the student expands on the point to explain in
what way the measure will improve performance then this can be considered
to be a second point. For example:
Note that just “faster” is not enough to count as an expansion point without an
explanation of why.
1. Server Hardware
Replace the processor with one which has more cores
Replace the processor with one which has more cache memory // increase the
amount of cache memory
Replace the processor with one which runs at a faster clock speed NE. faster
processor
Use a parallel processor architecture // use more processors which can work in
parallel
Use a processor with a bigger word size
Use a processor that makes (better) use of pipelining
Install more RAM // main memory // primary memory
Use RAM // main memory // primary memory with a faster access time
Replace HDDs with SSDs // Replace HDDS with HDDs that can read data at a
faster rate
Defragment the HDD
Replace the motherboard with one which has buses which run at a faster clock
speed
Replace the motherboard with one which has more lines in the data bus
Use the Harvard architecture
Distribute the processing across multiple servers
2. Network
Replace the network cable with cable that has a higher bandwidth // replace copper
cable with fibre-optic cable A. Ethernet cable for fibre-optic NE. higher bandwidth
network
Replace any wireless / WiFi connections with wired ones
Replace the network cards with ones that can transmit data at a higher bitrate
Consider the overall network design eg how the network is divided into subnets A.
split the network into subnets
Use a star topology (instead of a bus)
Consider using a more efficient protocol for the data across the network
Add additional wireless access points
3. Database and Software
Use a more efficient technique for controlling concurrent access to the database //
Page 38 of 67
replace record/table locks with serialisation/timestamp ordering/commitment
ordering
Replace the database software with software that uses more efficient algorithms for
tasks A. examples eg replace linear search with binary search
Use the index feature of the database to speed up searching on fields that are
commonly used for this purpose
Rewrite the database software in a language that is suitable for concurrent
execution // use a functional programming language for the database software
Ensure the software is compiled rather than executed by an interpreter // rewrite the
software in assembly language/machine code
Review the conceptual model of the database to see if it contains any inefficiencies
such as data redundancy that could be eliminated A. normalise the database design
Consider if it would be appropriate to sacrifice normalisation of the conceptual model
to improve performance
Use a non-relational database system A. examples eg NoSQL
Distribute the data across multiple servers
Try to reduce the amount of other (unrelated) software that might be running on the
database server at the same time
Try to reduce the number of database accesses that need to be made
simultaneously // run some tasks at quiet times / overnight
Purge / archive data that is no longer necessary / in use
[12]
Q5.
(a) Mark is for AO1 (understanding)
1
30 // (25)−2;
A. 32, 25, 31, (25)−1 (this time only)
1
(c) 1 mark for AO1 (understanding) and 3 marks for AO1 (knowledge)
Reduces the need for expert knowledge when configuring a host // reduces
the time required to configure hosts // facilitates efficient use of a limited pool
of IP addresses // avoids errors with a relevant example such as duplicating IP
addresses or programming incorrect subnet mask;
A. enables reuse of IP addresses
N.E. “avoiding errors” without an example
Page 39 of 67
Contents of communication (Max 2 marks – AO1 (knowledge)):
1. Host sends request to discover a (DHCP) server; A. host sends request for
configuration
2. (DHCP) server(s) offer configuration to host; NE. server gives IP
address to host
3. Host accepts offer of configuration from (a DHCP) server (by echoing
the accepted configuration back to the server);
4. (DHCP) server confirms that configuration has been allocated to host;
A. “IP Address” for “configuration” but NE. “subnet mask”, “default gateway”
for this mark point
Award one mark for any one correct point OR two marks for any two
correct points, made in the correct order.
4
[6]
Q6.
2 marks for AO1 (knowledge) and 4 marks for AO1 (understanding)
Level Description Mark
Range
Indicative Content
Page 40 of 67
student states that the computer will begin to transmit after the receiver sends
the CTS
• if CTS not received continue to wait (until transmission ends)
• receiver sends acknowledgement / ack after (all) data received
• after transmitting (the transmitter) waits to receive acknowledgement packet
(to confirm data received and not corrupted)
• if no acknowledgement / ack received (within reasonable time period) then:
◦ wait a time period
◦ then listen again / retransmit
• the acknowledgement / ack also notifies other computers that they can
transmit again
• waiting periods are (often) random A. an example waiting period that is
random
• collisions cannot be detected by transmitter
[6]
Q7.
Mark is for AO1 (knowledge)
Q8.
Marks is for AO2 (understanding)
Mark
Level Description
Range
Page 41 of 67
areas in the guidance below. Overall, at least
four valid points must have been made which
can relate to any of the topic areas in the
guidance.
2. Steps to prevent
Use a protocol that encrypts data transmissions
A. Encrypt the transmission
R. Password protection
Example of secure protocol eg WPA, WPA2
Disable broadcast of SSID to make network harder to identify (Note: Accept this
point even though the SSID would be in other data packets)
Limit power of transmitter so data does not travel outside premises (although in
practice this might be hard to achieve)
Use cabled network instead of WiFi.
R. MAC address filtering (as cars were not connecting to networks just intercepting
transmissions)
If the data is being transmitted through the air, who does it belong to, if anyone? //
Should data transmitted by WiFi be treated like a broadcast (eg TV) or a private
communication (eg telephone call)?
Is it wrong to intercept data if people freely choose to transmit it wirelessly? A. Is it
ethical to collect data from people without their permission?
Is it legal to intercept data if people freely choose to transmit it wirelessly? What
laws apply in this scenario? Is this really hacking?
Are the ethics or laws different for intercepting data transmitted wirelessly than by
cable?
Is there a difference between collecting statistical data eg channel number, signal
strength, SSID and collecting the payload data?
Was the data just collected or was there an intention to process it as well?
Page 42 of 67
What should the company have done when it realised that the data had been
collected? // Should the data have been immediately deleted, or kept so that the
company could contact and apologise to people it had collected data from? // What
should be done with the data now?
What should the company have done if it inadvertently discovered evidence of illegal
activity in the collected data?
Legality/ethicality may depend on the nature of the data gathered // (In the UK)
would some of the collected data count as “personal data” (under the Data
Protection Act) // could some of the data have been sensitive (accept example eg
bank account details, details of minors) NE. Data may be private
To what extent is the company financially liable for collecting the data? Or any
consequences of its use?
Could the legal situation be different in different countries where the company
operated?
Was the collection of data intentional or just an accidental side-effect of a
reasonable process?
What was done to ensure (existing) policies are followed?
Should there have been more oversight of code development?
Could intellectual property have been inadvertently stolen?
Is it ethical to collect/store information secretly from people // without them knowing?
Is it ethical to collect data if there is no (legitimate) purpose for doing so?
Were the developers in breach of their contracts with the company / company
guidelines?
Relevant Legislation
Students may name specific pieces of legislation that could have been breached as
part of their response. Determining whether or not a breach has actually occurred
would probably require more information than is provided in the question and
detailed knowledge of the legislation, which is not required by the specification.
Therefore, up to two points can be given for students naming relevant pieces of
legislation that could have been breached, regardless of whether or not this can be
ascertained with certainty. Relevant pieces of legislation include:
• The Data Protection Act
• The Computer Misuse Act
• The Regulation of Investigatory Powers Act
• The Communications Act
Points should be given for assertions that legislation has definitely been breached,
even if this is only a possibility in the context rather than a certainty.
Responses that reference other legislation should be referred to Team Leaders.
A. As an alternative to naming the Data Protection Act, a response could instead
question whether privacy laws have been breached, or if a breach of privacy has
occurred.
4. Lessons
Improved training for developers in what is legal / ethical (accept company needs to
improve understanding of legal/ethical issues)
Need to review guidelines that developers are expected to follow
Need for scrutiny of code / supervision by people outside of development team
Developers could be required to check each other’s code
Page 43 of 67
Developers could be required to log changes made to code and reason
Should only collect data that is absolutely necessary // that has a clear purpose //
need to review collected data to see why it is being collected and stored // need to
fully consider the purpose of any data collection before doing it
Could/should remove equipment for Wi-Fi data capture used in cars to collect
mapping data.
NE. Further testing should be carried out unless there is a clear explanation of the
mechanism by which testing will check that the software has no additional
functionality is described eg inspection of collected data files to verify purpose of
contents
[12]
Q9.
All marks AO1 (understanding)
1 mark: The 'Router and Firewall' port labelled A: 192.168.0.x where x is not 0 or
255;
1 mark: The 'Router 2' port labelled B: 192.168.2.x where x is not 0 or 255;
[2]
Q10.
All marks AO1 (understanding)
Q11.
(a) HyperText Transfer Protocol;
1
(b) HTTPS is secure;
HTTPS (usually) uses port 443, HTTP (usually) uses port 80 // use different
port numbers;
HTTPS uses SSL/secure socket layers;
HTTPS is encrypted;
Servers using HTTPS must have a public key certificate;
Max 1
[2]
Q12.
Page 44 of 67
Layer involved:
Transport layer;
Q13.
(a) To take a required Fully Qualified Domain Name/FQDN and to return an IP
address;
(b) The (local) computer already has a copy of the needed IP address (in a hosts
file);
The (local) computer has a cache of recent DNS queries / answered DNS
queries;
A. previously visited site / refreshing a page;
The URL refers to a local resource, e.g., a file on the local computer //
localhost // local network;
NE. intranet
Max 2
[3]
Q14.
(a) (Using an algorithm) to convert a message into a form that is not
understandable (without the key to decrypt it);
(Using an algorithm) to convert a message into a form that is only
understandable by the intended parties // can only be read with the correct
key;
(Using an algorithm) to convert a message into cipher text;
NE. Scrambling unless further explanation is provided
NE. Coding
A. “Unreadable” for “understandable”
A. “Data” for “a message”
Page 45 of 67
R. Responses that do not make clear that encryption is a process
Max 1
A. “Sender” for “A” and “Recipient” for “B” (or similar role descriptions)
Allow use of same key name more than once and mark correct in the position
it is correct (if any).
2
Award marks in part (d) for valid responses to part (d) that are made in
part (c).
2
[6]
Q15.
SUBJECT MARKING POINTS:
Internal:
External:
Page 46 of 67
• Hierarchical organisation of routers
• Example of hierarchical organisation of routers eg passed up to a national
router, transferred internationally and then passed back down a hierarchy
• Path to take selected by each router (not determined at start) NE. passed from
router to router
• Route may change as a result of eg congestion, technical problems
Either:
7-8 To achieve a mark in this band, candidates must meet the subject
criterion (SUB) and all 5 of the quality of language criteria (QLx).
SUB Candidate has covered both internal and external routing in
detail and has made at least seven subject-related points.
QWC1 Text is legible.
QWC2 There are few, if any, errors of spelling, punctuation and
grammar. Meaning is clear.
QWC3 The candidate has selected and used a form and style of
writing appropriate to the purpose and has expressed ideas
clearly and fluently.
QWC4 Sentences (and paragraphs) follow on from one another
clearly and coherently.
QWC5 Appropriate specialist vocabulary has been used.
5-6 To achieve a mark in this band, candidates must meet the subject
criterion (SUB) and 4 of the 5 quality of language criteria (QLx).
SUB Candidate has covered both internal and external routing,
although one may be in more detail than the other and has
made at least five subject-related points.
QWC1 Text is legible.
QWC2 There may be occasional errors of spelling, punctuation and
grammar. Meaning is clear.
QWC3 The candidate has, in the main, used a form and style of
writing appropriate to the purpose, with occasional lapses.
The candidate has expressed ideas clearly and reasonably
Page 47 of 67
fluently.
QWC4 The candidate has used well-linked sentences (and
paragraphs).
QWC5 Appropriate specialist vocabulary has been used.
1-4 To achieve a mark in this band, candidates must meet the subject
criterion (SUB) and 4 of the 5 quality of language criteria (QLx).
SUB Candidate may not have covered both internal and external
routing, but has covered at least one of them. Up to four
relevant points have been made.
QWC1 Most of the text is legible.
QWC2 There may be some errors of spelling, punctuation and
grammar but it should still be possible to understand most of
the response.
QWC3 The candidate has used a form and style of writing which has
many deficiencies. Ideas are not always clearly expressed.
QWC4 Sentences (and paragraphs) may not always be well-
connected.
QWC5 Specialist vocabulary has been used inappropriately or not at
all.
Note: Even if English is perfect, candidates can only get marks for the points made
at the top of the mark scheme for this question.
If a candidate meets the subject criterion in a band but does not meet the quality of
language criteria then drop mark by one band, providing that at least 4 of the quality
of language criteria are met in the lower band. If 4 criteria are not met then drop by
two bands.
[8]
Q16.
(a) Parity Bit: 1;
Page 48 of 67
transmitted/ begins – if neither of the other two marks for
start and stop bits have been awarded
3
(c) 1010001;
MAX 2
2
[9]
Q17.
(a)
Situation and
Authentication Authorisation Accounting
Procedure
A web server
generating a
log of the IP
addresses of ✔;
computers that
have accessed
it.
Using a digital
signature when
sending an e- ✔;
mail message.
Page 49 of 67
Has malicious purpose; A. Is a type of malware A. Examples
of malicious purposes
MAX 3
3
MAX 4
4
[9]
Q18.
SUBJECT MARKING POINTS:
Rich client:
Thin client:
• All/most processing done by (central) server // applications
not installed on (thin client) workstations // all applications on
server; A. All software run on server
• Keystrokes/mouse clicks/user input transmitted from
workstation/terminal to server over network, A. Workstations
are just interfaces
• Image/data needed to produce image transmitted from
server to terminal over network
• Operating system loaded by clients from server at boot
Page 50 of 67
workstations, A. Other examples of limited hardware
requirements, A. 'Dumb terminal'
• Server must have multiple processors/a lot of RAM
Accept the opposite of points e.g. for "a thin client system could
use a slower processor" accept "a thick client system would need
a faster processor" but don't award marks for a point and its
opposite point.
7-8 To achieve a mark in this band, candidates must meet the subject
criterion (SUB) and all 5 of the quality of written communication criteria
(QWCx).
SUB Candidate has written a detailed explanation of how thin client
systems work in comparison to rich client systems, and has also made
a good comparison of the hardware required for both types of system.
Some points have been made about how SaaS is distinguished from
other types of thin client system. The candidate has made at least
seven subject-related points.
QWC1 Text is legible.
QWC2 There are few, if any, errors of spelling, punctuation and
grammar. Meaning is clear.
QWC3 The candidate has selected and used a form and style of
writing appropriate to the purpose and has expressed ideas clearly and
fluently.
QWC4 Sentences (and paragraphs) follow on from one another clearly
and coherently.
QWC5 Appropriate specialist vocabulary has been used.
Page 51 of 67
5-6 To achieve a mark in this band, candidates must meet the subject
criterion (SUB) and 4 of the 5 quality of written communication criteria
(QWCx).
SUB Candidate has made some points in both of the areas of how thin
client systems work in comparison to rich client systems, and how the
hardware requirements of each type of system vary. The candidate
has made at least five subject-related points.
QWC1 Text is legible.
QWC2 There may be occasional errors of spelling, punctuation and
grammar. Meaning is clear.
QWC3 The candidate has, in the main, used a form and style of writing
appropriate to the purpose, with occasional lapses. The candidate has
expressed ideas clearly and reasonably fluently.
QWC4 The candidate has used well-linked sentences (and
paragraphs).
QWC5 Appropriate specialist vocabulary has been used.
1-4 To achieve a mark in this band, candidates must meet the subject
criterion (SUB) and 4 of the 5 quality of written communication criteria
(QWCx).
SUB Candidate has made some relevant points, but these are
superficial or narrow in scope.
QWC1 Most of the text is legible.
QWC2 There may be some errors of spelling, punctuation and
grammar but it should still be possible to understand most of the
response.
QWC3 The candidate has used a form and style of writing which has
many deficiencies. Ideas are not always clearly expressed.
QWC4 Sentences (and paragraphs) may not always be well-
connected.
QWC5 Specialist vocabulary has been used inappropriately or not at
all.
Note: Even if English is perfect, candidates can only get marks for
the points made at the top of the mark scheme for this question.
Q19.
Page 52 of 67
(a) Marks are for AO1 (understanding)
Label Description
2 no acknowledgement received;
NE collision occurs
3 acknowledgement received;
NE no collision detected
(b) 1 mark for AO1 (knowledge) and 2 marks for AO1 (understanding)
AO1 (knowledge):
AO1 (understanding):
1 mark: A wireless client must have the same SSID as the one put in the
access point to join;
1 mark: Broadcasting SSID announces publicly your wireless network and
can be seen as a security weakness;
3
In coffee shop speed could be limited for each device that is connected / /
throttling;
In coffee shop more clients connecting to one access point;
In coffee shop connection to Internet might have less bandwidth;
In coffee shop there may be more collisions;
NOTE accept answers made in terms of home
Max 2 marks
MAX 2
[9]
Q20.
(a) Marks are for AO1 (knowledge)
Page 53 of 67
(b) Marks are for AO1 (understanding)
Q21.
(a) 0011 0111;
1
(b) 37;
1
(d) 1;1000101;
Page 54 of 67
R if not 8 bits
2
(e) 101.10100
R if not 8 bits
Mark as follows:
3 bits before binary point correct;
5 bits after binary point correct;
R if not 7 bits
1
(g) 128 //
27;
1
(j) Recalculate the values for the parity bits using the data bits received (and
compare these values with the parity bits received);
A check the parity bits
Add up the bit positions of the parity bits where a parity checks fails // add up
the bit positions of the calculated parity bits that are different to those
received;
The bit position of where the error has occurred is indicated;
R positions
The contents of the indicated bit position are flipped;
R positions
4
(k) 7;
Page 55 of 67
1
(m)
Initial State Input New State
Sg 1 Sy;
Sy 0 Sy
Sy 1 Sy;
//
Initial State Input New State
Sg 1 Sy;
Sy 0 or 1 Sy;
2
(n) Works out if a given input is a (7-bit) ASCII code for a numeric character;
1
(o) The arrow labelled with a 0 from state Sg should go to state Sj;
1
[22]
Q22.
(a) SMTP;
Telnet;
A SSH;
Note
For SMTP accept Simple Mail Transfer Protocol
For SSH accept Secure Shell
2
I case
1
I brackets
1
Page 56 of 67
(d) A link between routers might be down / busy and / or a different route is
picked;
(e)
Layer
1 Application (layer)
2 Transport (layer)
4 Link (layer)
(f) (Link layer) responsible for network drivers // network cabling // physical
connection // changing from one medium to another;
(Link layer) (removes MAC address and) adds MAC address for the next hop;
A hardware address for MAC address
Q23.
(a) 192.168.0.x (where x is not 0, 2 or 255);
1
Page 57 of 67
So that LAN devices cannot be connected to (directly) by computers outside of
the LAN / on the Internet // for increased security;
A relevant examples of increased security
Would / May not be enough unique IP addresses for each device to have a
routable address // globally more IP addresses would be required if all devices
had routable IP addresses // more bits would be required to store an IP
address if all devices had routable IP addresses;
MAX 2
2
(d) AND operation performed using IP address(es) and subnet mask (to produce
network IDs / subnet IDs of both desktop computer and FTP server) // Network
IDs / subnet IDs / first three octets / bytes / values (in IP addresses) computed
using IP address(es) and subnet mask;
To award either of the next two marks, the candidate must have
indicated that the subnet mask is used to produce the results that will be
compared - even if the method by which the subnet mask is used is
incorrect so the first mark has not been awarded.
As network / subnet IDs (A first thee octets / bytes / values / results) differ,
desktop computer determines that FTP server is not on same network (so
must be communicated with via combined device);
3
(e) Block / allow (traffic on) specific ports // block specified protocols;
Block / allow (traffic from) specific IP addresses / domain names;
Search packets for specific contents / text (and block / allow based on this);
Act as a proxy server // all traffic to Internet must go via firewall // stops
computers on the Internet directly accessing devices on the LAN;
Stateful inspection // firewall maintains information about current connections
and only allows packets relevant to these connections through;
Identifies unusual behaviour from a host // example of unusual behaviour eg
sending an unusually large amount of data;
NE Packet filtering
NE “Data” instead of “packets”
NE Block specific programs connecting to Internet
A Firewall checks packets using rules / criteria for 1 mark if not other marks
awarded
MAX 3
3
(f) Baseband
Whole bandwidth of medium dedicated to one transmission (at a time) // one
Page 58 of 67
channel (at a time) // only one computer can send data (at a time) // sends
signals with frequencies from 0Hz to a maximum highest frequency;
Broadband
Bandwidth of medium shared // multiple channels can be carried
(simultaneously) // many computers can send data (simultaneously) //
frequency bands assigned to different communications; TO multiple wires
MAX 1
1
Q24.
(a)
Situation Most likely Most Could be
to be likely to either Serial
Parallel be Serial or Parallel
Sending data to a
peripheral, such as a
printer, that is plugged A
directly into a desktop
computer.
Transferring memory
addresses between
the processor and the
main memory of a
desktop computer.
Transmitting an e-mail
across a WAN from a
computer in England
to an e-mail server in
Scotland.
Page 59 of 67
To ensure successful communication;
MAX 1
1
(c) Time delay between the moment something is initiated and the moment its
effect begins;
A time delay between signal being transmitted and arriving
A time taken for transmitted data to arrive at the receiver
A lag for time delay
NE delay in transmission, transmission time
1
[5]
Q25.
(a) (i) 192.168.0.x where x is not 0 or 255;
1
Page 60 of 67
Can still access software and data if a specific computer is not working;
A reduced management cost / effort when a reason is given, such as no
need to install software on each computer, but just "does not need to be
installed on each computer" is not enough on its own.
MAX 2
2
(d) LAN usually baseband whilst WAN broadband* / / only one communication
can take place at a time on a LAN whereas multiple communications can take
place simultaneously on a WAN;
LAN communication links have higher speeds than WAN;
LAN has lower latency than WAN;
Lower error rates on LAN than WAN;
Communications medium in LAN likely to be privately owned, whereas likely to
be leased / publicly owned in a WAN;
Use different protocols (at link layer / hardware level);
Different hardware required to connect (A examples);
WAN may have greater security risks (as data transmitted over larger area, on
public system, through more servers or devices);
A WAN may use satellites / microwave whilst LAN may use cables / radio /
WiFi* - this point cannot be awarded for just saying WAN uses cables on LAN
radio or vice-versa as both LAN and WAN can use either of these
MAX 2
Only one side of the difference needs to be provided (as the other is
implicit) except for the points marked with an * for which both sides are
needed.
2
[10]
Q26.
(a) Greater the bandwidth, the higher the bit rate // positive correlation // (directly)
proportional;
Bandwidth must be at least 2wHz where w is the bit rate in bits per second;
Max 1
(b) Time delay between the moment something is initiated and the moment its
effect begins
A time delay between signal being transmitted and arriving
A time taken for transmitted data to arrive at the receiver
A lag for time delay
NE delay in transmission, transmission time
Page 61 of 67
1
(c) Bit rate is double / twice baud rate // Baud rate is half bit rate;
A “It” is double;
A 2:1
1
(d)
Note that:
Q27.
(a)
Page 62 of 67
1 mark for Device at top of diagram with Printer and Computer directly
underneath it and linked to it and no other labels linked to it;
1 mark for Computer with Laptop, Desktop and Server directly underneath it
and linked to it, and no other labels linked to it (except Device above);
1 mark for correctly styled diagram, i.e. lines drawn as arrows and boxes (any
shape) around labels; – This mark is only available if candidate has
already achieved at least one mark for correct contents of the diagram.
Page 63 of 67
functions are declared before variables);
1 mark for defining all 3 extra variables, with appropriate data
#
* – Do not award this mark if any extra functions / procedures have been
declared, except for functions that would set values e.g. SetProcessorName
or an incorrectly named procedure to add e.g. AddComputer
# – Do not award this mark if any extra variables have been declared
4
(c)
1
Laptop = Class/Subclass (Computer)
(Public) 1
Procedure AddDevice (Override)
Function GetBluetoothInstalled 1
Private / Protected
BluetoothInstalled : Boolean
End
Page 64 of 67
Example (1 mark):
Any sensible example, related to the use of Bluetooth with the laptop e.g.
synchronising contacts between phone/ laptop, sending photographs from
phone to laptop, Bluetooth mouse, Bluetooth headset / headphones (used with
laptop) etc;
NE connecting to wireless network
NE mouse
If the example makes clear that the technology is wireless, but this is not
explicitly stated in the “What” part of the response then the “Wireless” mark
should be awarded in the “What” part.
3
[12]
Q28.
(a) To examine the destination of each packet;
To forward packets from one network to another;
To manage congestion;
Choose an appropriate forwarding route;
Route packets according to destination IP address;
Store incoming packets temporarily;
Change link address in packet;
To store/make use of a routing table;
A data instead of packets
R information / signals
Max 2
(b) SMTP;
POP(3);
IMAP(4);
A full names of the protocols above
A ESMTP // SMAP // LMTP // QMTP
Max 1
Transport Layer:
Transport layer establishes end to end communication // Transport layer
establishes a virtual path // TCP layer establishes connection between client
and server;
Destination and source application level client/server identified by port
numbers;
TCP layer uses these port numbers to route reassembled requests/responses
to correct application layer client/server;
TCP layer splits and reassembles requests/responses into packets/from
packets;
Packets are numbered by transport layer;
Transport layer deals with error control (acknowledgements/retransmission);
Page 65 of 67
Network layer adds source and destination IP addresses; Routers use
destination IP addresses to route packets to destination // network layer
involved with packet routing;
Network layer strips IP address (when receiving) // Link layer strips MAC
address (when receiving);
Server uses received source IP address to know where to send response;
Note: Accept answers where candidate uses the IP addresses and ports
indicated in the figure to match up with statements above
To achieve a mark in this band, candidates must meet the subject criterion
(SUB) and 4 of the 5 quality of language criteria (QWCx).
SUB Candidate has made at least 5 valid points covering.
QWC1 Text is legible.
QWC2 There are few, if any, errors of spelling, punctuation and grammar.
Meaning is clear.
QWC3 The candidate has selected and used a form and style of writing
appropriate to the purpose and has expressed ideas clearly and fluently.
QWC4 Sentences and paragraphs follow on from one another clearly and
coherently.
QWC5 Appropriate specialist vocabulary has been used.
5-6
To achieve a mark in this band, candidates must meet the subject criterion
(SUB) and 4 of the 5 quality of language criteria (QWCx).
SUB Candidate has made at least 3 valid points.
QWC1 Text is legible.
QWC2 There may be occasional errors of spelling, punctuation and grammar.
Meaning is clear.
QWC3 The candidate has, in the main, used a form and style of writing
appropriate to the purpose, with occasional lapses. The candidate has
expressed ideas clearly and reasonably fluently.
QWC4 The candidate has used well-linked sentences and paragraphs.
QWC5 Appropriate specialist vocabulary has been used.
3-4
To achieve a mark in this band, candidates must meet the subject criterion
Page 66 of 67
(SUB). The quality of language should be typified by the QWCx statements.
SUB Candidate has provided at least one point from the above.
QWC1 Most of the text is legible.
QWC2 There may be some errors of spelling, punctuation and grammar but it
should still be possible to understand most of the response..
QWC3 The candidate has used a form and style of writing which has many
deficiencies. Ideas are not always clearly expressed.
QWC4 Sentences and paragraphs may not always be well-connected or bullet
points may have been used.
QWC5 Specialist vocabulary has been used inappropriately or not at all.
1-2
Page 67 of 67