2 As Communication
2 As Communication
His entire career path revolves around computer science; either he was a student or a teacher.
He got a chance to polish his skills of teaching and studying more about computers at various
levels which has given him great confidence in presenting himself for any senior level position of
transferring his knowledge to the youth.
He has not stopped; he is continuing with his education at the higher levels. It is his second
semester of MPhil computer studies from a well-known university of Pakistan; The Institute of
Business & Technology.
Inqilab Patel knows a lot of methods of teaching computers and has developed tutorial notes,
worksheets and assignments for my students. He also maintains a website
(www.inqilabpatel.com) which is specifically designed for the support of those who want to excel
in GCSE computer science. He also regularly contributes material to CIE teacher support website,
for which he receives appreciation from different people across the world.
He has also received various training in innovative and special methods of teaching this subject.
A file server could be attached to the LAN that allowed users to store larger files and also
allowed files to be shared between users.
Instead of supplying individual printers to be connected to a user’s PC, one or more printers
could Managers in organisations could use electronic mail to communicate with staff rather
than sending round memos on paper.
The ‘paper-less office’ became a possibility, where files were to be stored in digital form
on a file server rather than as paper copies in a filing cabinet.
• The LAN will contain a device that allows connection to other networks.
When devices are connected across a wider geographical area, they form a wide area network
(WAN). Often lots of LANs are connected together to create a WAN. There are many examples of
WANs, such as a bank connecting all of its cash machines together across the country, or regional
police stations connecting together to share information.
The largest example of a WAN is the internet, which allows LANs in homes, businesses, universities,
or anywhere else to connect to each other by utilising an internet service provider (ISP). For example,
if you connect your mobile phone to your WiFi router when you are at home, you are connecting to
your home LAN. If you then use your phone to access a website or a social media app, you have
connected to the internet, which is a WAN.
The benefits of having the computers connected by a WAN were:
• a ‘job’ could be run on a remote computer that had the required application software
• a data archive that was stored on a remote computer could be accessed
• a message could be transmitted electronically to a user on a remote computer.
Today, a typical WAN is characterised by the following.
• It will be used by an organisation or a company to connect sites or branches.
• It will not be owned by the organisation or company.
• It will be leased from a public switched telephone network company (PSTN).
• A dedicated communication link will be provided by the PSTN.
• The transmission medium will be fibre-optic cable.
• Transmission within the WAN will be from switch to switch.
• A switch will connect the WAN to each site.
• There will not be any end-systems connected directly to the WAN.
Following are different types of networks.
These services constitute what is known as the Cloud Computing Stack with SaaS at the top, PaaS in
the middle, and IaaS on the bottom.
• high reliance on the server; if the • less secure (relies on clients to keep their
server goes down or there is a break own data secure)
in the communication link then the • each client needs to update data and
Cons devices cannot work software individually
• despite cheaper hardware, the start- • data integrity issues, since many clients
up costs are generally higher than for access the same data which can lead to
thick clients inconsistencies
Software •always relies on a connection to a •can run some of the features of the
remote server or computer for it to software even when not connected to a
work server
•requires very few local resources •relies heavily on local resources
(such as SSD, RAM memory or •more tolerant of a slow network
computer processing time) connection
•relies on a good, stable and fast • can store data on local resources such
network connection for it to work as HDD or SSD
•data is stored on a remote server or
computer
Network Topology
Topology defines the structure of the network of how all the components are interconnected to each
other.
Bus Topology:
The bus topology is the simplest network arrangement. It has one cable that connects every device
on the network, which is called the backbone. At each end of the main cable there is a small device
called a terminator which absorbs the signals when they reach the end, to prevent interference.
Each device must be connected to the main cable to join the network.
Advantages Disadvantages
A relatively low number of cables are needed so A collision of signals occur if more than one
it is cheap to install device transmit data at the same time
Simple to add additional devices The possibility of collisions increases on
networks with high traffic
If the backbone cable breaks the whole network
will fail
In a star topology, each device is connected to a central device, either a switch or a hub, which gives
it a star formation.
The main difference between a hub and a switch is that a hub will send every signal to every device
on the network, while a switch will only send each signal to the intended recipient device.
Routers
A router is a networking device that forwards data packets between computer networks. Routers
perform the traffic directing functions on the Internet. Data sent through the internet, such as a web
page or email, is in the form of data packets. A packet is typically forwarded from one router to
another router through the networks that constitute an internetwork (e.g. the Internet) until it reaches
its destination node.
A router is connected to two or more data lines from different IP networks. When a data packet
comes in on one of the lines, the router reads the network address information in the packet header
to determine the ultimate destination. Then, using information in its routing table or routing policy, it
directs the packet to the next network on its journey.
The role of the router is to forward data to the correct recipient.
Copper cables
Copper cables are the most common type used in
Ethernet networks. Copper cables use electrical signals
to transmit information. There are three types of copper
cables:
Coaxial: the same type as the cable used to connect TVs to aerials. It has one single copper
core wire.
Unshielded twisted pair (UTP): up to eight copper wires are twisted around each other in
pairs and then all pairs are twisted around each other. The arrangement reduces electrical
interference. UTPs are the most common type of cables used in Ethernet networks.
Shielded twisted pair (STP): the same structure as the unshielded twisted pair cable.
However, a layer of shielding is added to further prevent interference.
Fibre-optic cables can preserve a good signal strength for up to 100km and are not affected by
electrical interference therefore, they exceed the performance of copper wires, although they also can
be very expensive.
Advantages of Fibre-optic
fibre optic cables have greater bandwidth
fibre optic cables need less signal boosting // can transmit over longer distances
fibre optic cables have greater security (more difficult to “tap” into)
fibre optic cables are immune to electromagnetic and other effects
fibre optic cabling is lighter in weight (easier to install)
fibre optic cables consume less power
Wi-Fi
Wi-Fi is the wireless technology used to connect computers, tablets, smartphones and other
devices to the internet.
Wi-Fi is the radio signal sent from a wireless router (WAP-Wireless Access Point) to a nearby device,
which translates the signal into data you can see and use. The device transmits a radio signal back to
the router, which connects to the internet by wire or cable.
1. Station A wishes to send a frame. First, it checks if the medium is available (Carrier Sense). If it
isn't, it waits until the current sender on the medium has finished.
2. Suppose Station A believes the medium is available and attempts to send a frame. Because the
medium is shared (Multiple Access), other senders might also attempt to send at the same time.
At this point, Station B tries to send a frame at the same time as Station A.
3. Shortly after, Station A and Station B realize that there is another device attempting to send a
frame (Collision Detect). Each station waits for a random amount of time before sending again.
The time after the collision is divided into time slots; Station A and Station B, each pick a random
slot for attempting a retransmission.
4. Should Station A and Station B attempt to retransmit in the same slot, they extend the number of
slots. Each station then picks a new slot, thereby decreasing the probability of retransmitting in the
same slot.
Bit streaming is a sequence of bits (digital signals) over a communication over a communication path
(internet). It is used to transfer of data at high speed.
Bit streaming requires fast broadband connection and some form of buffering.
Bits arrive in the same order as sent.
Bit Streaming is a contiguous sequence of bits, representing a stream of data, transmitted
continuously over a communication path serially.
Because of the file sizes involved, streamed media is always compressed to a sequence of bits - a
‘bit stream’. Generic compression techniques can convert the byte stream to a bit stream with fewer
bits overall. For the decoding process at the receiver end to work properly, the data must be
transferred as a bit stream.
Benefits of bit streaming:
video or audio files can be played without waiting for a whole file to be downloaded
data is erased after being played automatically so no need to store large files on user’s computer
allows on demand playback
allows live broadcast
no specialist software is required for playback in browser
Problems in bit streaming
– video stops / hangs if very slow Internet / broadband speed low
– video stops / hangs if inadequate buffering capacity
– loss of Internet means can’t access films / files
– may require specific software to run the files / films
– viruses can be downloaded from the websites
Bandwidth
Bandwidth is the term used to describe the volume of data that can be sent or received. It isn't the
speed of data, but the amount of data, the volume of data.
There are two different types of Bit Streaming and these are Real-Time Bit Streaming and On-
Demand Bit Streaming.
Internet
The Internet is a global network of networks.
It is the network of connected computers,
Internet makes use of Internet Protocol (IP) and Transmission Control Protocols (TCP).
The number of networks and the number of hosts per class can be derived by this formula −
Class A addresses only include IP starting from 1.x.x.x to 126.x.x.x only. The IP range 127.x.x.x is
reserved for loopback IP addresses.
The default subnet mask for Class A IP address is 255.0.0.0 which implies that Class A addressing
can have 126 networks (2 7-2) and 16777214 hosts (224-2).
Class A IP address format is thus: 0NNNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH
Class B Address
An IP address which belongs to class B has the first two bits in the first octet set to 10, i.e.
Class B IP Addresses range from 128.0.x.x to 191.255.x.x. The default subnet mask for Class B is
255.255.x.x.
Class B has 16384 (214) Network addresses and 65534 (2 16-2) Host addresses.
Class B IP address format is: 10NNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH
Class C Address
The first octet of Class C IP address has its first 3 bits set to 110, that is −
Class C IP addresses range from 192.0.0.x to 223.255.255.x. The default subnet mask for Class C is
255.255.255.x.
Class C gives 2097152 (221) Network addresses and 254 (28-2) Host addresses.
Class C IP address format is: 110NNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH
Class D Address
Very first four bits of the first octet in Class D IP addresses are set to 1110, giving a range of −
URL encoding:
Web addresses can be written using hexadecimal rather than denary. Hexadecimal codes are preceded by a
% sign. For example, the word www.ruknuddin.com is written as:
r u k n u d d i n
in hex %72 %75 %6B %6E %75 %64 %64 %69 %6E
w w w . r u k n u d d i n . c o m
%77 %77 %77 %2E %72 %75 %6B %6E %75 %64 %64 %69 %6E %2E %63 %6F %6D
Some characters are not allowed in URL. URL encoding converts characters into a format that can be
transmitted over the Internet
For example
%20 is used in URL in place of <space> not allowed in a URL, %20 is the coding for a space (32 in denar
y)
? separates the URL from all parameters or variables
e.g. for query to search Inqilabpatel in Google
https://www.google.com.pk/search?q=inqilab%20patel
here q is variable for query ? separates it from URL https://www.google.com.pk/search
while %20 is used for the space between inqilab and patel
HYPERTEXT MARK-UP LANGUAGE (HTML) is used when writing and developing web pages. HTML isn t a
programming language but is simply a mark-up language. A mark-up language is used in the processing,
definition and presentation of text (for example, specifying the colour of the text).
HTML uses <tags> which are used to bracket a piece of code;
http
................................................................................................................................................................................
...............................................................................................................................
cie.org.uk ...........................................................................................................................................
................................................................................................................................................................................
........................................................................................................................................
computerscience.html ........................................................................................................................
................................................................................................................................................................................
................................................................................................................................... [3]
(ii) Sometimes the URL contains the characters %20 and ?.
Describe the function of these characters.
%20 ...................................................................................................................................................
............................................................................................................................................................
? .........................................................................................................................................................
....................................................................................................................................................... [2]
Example Question2.5:
(a) A web page offers a link for users to request another web page. The requested web page contains HTML
code. Put each statement in the correct sequence by writing the numbers 1 to 5 in the right-hand column.
Statement Sequence No
The requested web page is displayed on the client computer
The user clicks on the hyperlink and the web page is requested from the web server
The requested web page content is transmitted to the client computer
The client computer processes the html code using the web browser software
The web server locates the requested web page
(d) Draw one line from each term to its most appropriate description. [4]
Term Description
It is only visible to devices within the Local
Area Network (LAN)
(ii) Melinda mainly uses the internet to watch films and play computer games.
Tick one box to identify whether Melinda should connect to the router using a wired or wireless
network and justify your choice.
Wired
Wireless
Justification .......................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Receives and sends data between two networks operating on the same protocol
..........................
Wireless Network
.................................................................................................................
Interface Card
.................................................................................................................
(WNIC)
.................................................................................................................
Statement True ( )
The IP address consists of any number of digits separated by single dots (.)
Each number in an IP address can range from 0 to 255
IP addresses are used to ensure that messages and data reach their correct
destinations
Public IP addresses are considered to be more secure than private IP addresses
(b) Consider the URL:
http://cie.org.uk/computerscience.html
(i) Give the meaning of the following parts of the URL.
http ....................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
cie.org.uk ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
computerscience.html .......................................................................................................
...........................................................................................................................................
........................................................................................................................................... [3]
(ii) Sometimes the URL contains the characters %20 and ?.
Describe the function of these characters.
%20 ...................................................................................................................................
...........................................................................................................................................
? ........................................................................................................................................
........................................................................................................................................... [2]
(b) Three methods of connecting devices include fibre-optic cables, copper cables and radio waves.
The table below gives descriptions relating to these connection methods.
Tick ( ) one box on each row to show the method that best fits each description. [5]
Description Fibre-optic cable Copper cable Radio waves
Wireless medium
Twisted-pair is an example
Uses light waves
WiFi
Fastest transmission medium
(c) Bit streaming is used for both real-time and on-demand services.
Describe one difference between real-time and on-demand bit streaming.
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
............................................................................................................................................................[2]
(d) A device needs an IP address to connect to the Internet. IPv4 is the more common type of IP
address.
Describe, using an example, the format of an IPv4 address.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
7 (b) A user requests a web page by keying the Uniform Resource Locator (URL) into the address
bar of their web browser. The requested page contains a client-side script.
Describe the sequence of steps leading to the display of the web page on the computer screen.
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
............................................................................................................................................................[4]
True False
6 (d) (i) State whether this JavaScript code will be run client-side or server-side.
.......................................................................................................................................[1]
(ii) Explain the difference between client-side scripting and server-side scripting.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
(b) A website can be accessed using either the Uniform Resource Locator (URL) or the IP
address. Describe how a URL is converted into its matching IP address.
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................... [3]
(c) People use the Internet to stream media.
Complete the following statements by filling in the names of the missing methods of bit streaming.
................................................. bit streaming is used when watching a live stream of events that are
currently taking place. The event is captured live with a video camera connected to a computer, and it
cannot be paused or rewound.
................................................. bit streaming is used when watching an event that has taken place in
the past. Existing media are encoded to bit streaming format and uploaded to a server. It can be
paused and rewound. [2]
(b) A company has computers in two separate buildings that communicate using the Internet over a
Public Switched Telephone Network (PSTN).
(i) Describe the transmission of data using a PSTN.
.................................................................................................................................................................
.................................................................................................................................................................
.................................................................................................................................................................
........................................................................................................................................................ [2]
(ii) The company wants to install a dedicated line between the two buildings.
Identify one benefit and one drawback of installing a dedicated line between the two buildings.
Benefit ....................................................................................................................................................
................................................................................................................................................................
Drawback ...............................................................................................................................................
.......................................................................................................................................................... [2]
4 Customers of a bank can access their account information by logging in on the bank’s website.
(a) The bank has a client-server model of networked computers.
(i) Describe, using the bank as an example, the key features of a client-server model.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
(ii) Give two other examples of applications that can use the client-server model.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
........................................................................................................................................... [2]
(c) The bank is upgrading its local area network (LAN) copper cables to fibre-optic cables.
(i) State two benefits to the bank of upgrading to fibre-optic cable from copper cable.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
........................................................................................................................................... [2]
(ii) State two drawbacks of upgrading to fibre-optic cables.
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
........................................................................................................................................... [2]
2 c (iii) The peripheral devices are plugged into USB ports of the computer.
Describe two benefits of connecting the peripheral devices using a USB port.
1 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
........................................................................................................................................... [4]
The web page will make use of both client-side and server-side scripting.
(i) Explain how client-side scripting will be used in this web page.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
1 Ana owns a small company with four employees. The office has a network containing several computers that run on a
client-server model. There is one server that connects to the Internet using a router.
(a) Networks transmit data using various types of connection shown in the following table. Complete the table. [4]
Type of connection Description
..................................................................................................
Fibre-optic ..................................................................................................
..................................................................................................
..................................................................................................
..................................................................................................
Radio waves ..................................................................................................
..................................................................................................
..................................................................................................
2 (e) The surgery has five computers that can all access the database. A copy of the database is stored centrally.
(i) Complete the description of this type of network model by filling in the missing terms.
The ......................................... model has one ......................................... that stores all
the data for the surgery. The other computers are ......................................... . When a
user requests data, a request is sent to the ......................................... . [4]
(ii) The surgery wants to keep all data secure. The surgery network is not connected to the Internet.
Identify two authentication techniques the surgery could use to restrict access to the data.
1 ........................................................................................................................................
2 ........................................................................................................................................ [2]
(b) Joshua visits a website by entering its Uniform Resource Locator (URL).
Describe how the URL is converted into a matching IP address.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
(c) Give one example of a valid IPv4 address.
...................................................................................................................................................
............................................................................................................................................. [1]
Characteristic IP address
Q 22) June 17 P 31 Q 1
5 (a) A web browser is used to request and display a page stored on an internet web server.
Explain how each of the following items is used in this event.
(i) Packet: ..............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) Router: ...............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(iii) TCP/IP: ..............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(b) There are four statements in the following table. For each statement, place a tick ( ) in the
(b) There are four statements in the following table. For each statement, place a tick (3) in the
appropriate column to indicate whether it is true or false. [4]
(a) (i) State one benefit and one drawback of the star topology.
Benefit .....................................................................................................................................................
.................................................................................................................................................................
Drawback ................................................................................................................................................
...........................................................................................................................................................[2]
(ii) State one benefit and one drawback of the bus topology.
Benefit .....................................................................................................................................................
.................................................................................................................................................................
Drawback ................................................................................................................................................
...........................................................................................................................................................[2]
Protocol Layer
TCP
IP
SMTP