The Internet Chapter Notes and Answers
The Internet Chapter Notes and Answers
The Internet Chapter Notes and Answers
THE INTERNET
Checklist
Questions page 27-34
Questions page 45-50
Questions page 58
Page | 1
Computer Science @ Aquinas College
Contents
The Internet and how it works................................................................................................................4
Packet switching 4
IP addresses 5
Routers 5
Router operation 5
Gateways 6
Packet Switching - How does it work? 6
How the internet works : Activities 7
Uniform Resource Locator (URL) 8
Domain Names 8
The Domain Name Service and Domain Name Servers (DNS) 10
Accessing the internet registry. 11
Activity: Find a free website name 11
Internet Protocols and the protocol stack 12
Ports and Sockets 14
Client ports. 15
MAC Addresses 15
Application Level Protocols 16
FTP (file Transfer Protocol) 16
HTTP (Hypertext Transfer Protocol) 16
HTTPS (Hypertext Transfer Protocol Secure) 17
SSH (Secure Shell) 17
SMTP and POP3 (Simple Mail Transfer Protocol and Post Office Protocol) 18
Routing using IP addresses 19
IP address format 19
Masking IP Addresses 20
Routable and non-routable IP addresses 20
Network Address Translation (NAT) 21
Activity: Routing and IP addresses- Setting up a private network 23
Dynamic Host Control Protocol (DHCP) 24
Port Forwarding 24
Activity: Terminology – The Internet and how it works 25
Activity: Application Layer Protocols and Ports 26
Page | 2
Computer Science @ Aquinas College
Page | 3
Computer Science @ Aquinas College
Packet switching
The internet is a packet switching network. Any data communicated is broken down into chunks and
transferred as packets called datagrams.
Header
Page | 4
Computer Science @ Aquinas College
IP addresses
In IP v4 These are traditionally 4 one byte numbers E.g. 223.123.23.23 that are assigned to any
device on the internet. It is a unique address. Effectively you can have a range of addresses from
1.1.1.1 to 255.255.255.25. Because of the scale of the internet we are in the process of transferring
to IP (version 6). This will give us a far greater range of unique addresses. Public IP addresses have to
be issued by a domain name authority in order to prevent two people using the same address.
IP addressed identify the network and the computer. The first one, two or three numbers will identify
the network. The remaining numbers which computer on that network.
IP addresses are a bit like telephone numbers parts of the network ID also tell you the location.
Routers
These are devices that redirect packets on the internet based on their IP address. They are used to
connect networks running the internet protocol. When a packet arrives at a router it will look at the
IP address and decide which route the packet should leave the router from. It does this by looking at
a routing table which they maintain. Occasionally when there is heavy traffic it buffers packets or
choses an alternative route. They can exist on different levels – local, regional or national.
Router operation
Packet arriving
Packet leaving
Page | 5
Computer Science @ Aquinas College
Gateways
Whereas Routers connect networks using a common Internet Protocol. Gateways connect networks running
different protocols.
You often here the terms used interchangeably. Sometimes the word gateway is used as the connection point for
a network to the outside world.
Message packets
Computer 2
Page | 6
Computer Science @ Aquinas College
www.yougetsignal.com
Run this website and use the ‘Visual trace route’ tool to trace the route a data packet takes from one
location to another.
Page | 7
Computer Science @ Aquinas College
Page | 8
Computer Science @ Aquinas College
http://www.microsoft.co.uk/index.html
It is the method used to uniquely identifying the location of resources on the internet. The
contents of the file that a URL locates will vary depending on the Internet protocol being used. In the
above example, hypertext transfer protocol (HTTP) is being used. The file it points to is a html file
called “index.html” which contains hyperlinks to further pages. HTTP indicates that the file can be
accessed using a browser. Consequently, most URLs start with HTTP although it is not always
necessary to type it in the address line.
Domain Names
The Domain name identifies organisations or groups on the Internet. For example: bbc.co.uk
● bbc is the name of the organisation. Domain names have to be unique so organisation had to
act quickly to secure a domain name that was the same as the name of their organisation.
All domain names are registered at a central company called ICANN to ensure uniqueness. This
company overseas Internet registries.
● .co indicates that it is a company. This part of the name is referred to as the second-level
domain. It indicates the type of organisation. Some common examples are:
o .com indicates a commercial organisation
o .gov indicates that the organisation is part of government
o .ac indicates that the organisation is an academic institution (college or university)
o .sch indicates that the organisation is a school
o .org indicates that the organisation is non-commercial such as a charity
o .net indicates a company providing Internet services
Page | 9
Computer Science @ Aquinas College
● .uk indicates the website is registered in the UK. It is referred to as a top-level domain Other
examples:
o .au is Australia
o .ca is Canada
o .de is Germany (Deutschland)
o .gr is Greece
o .it is Italy
o .es is Spain (Espana)
o .com (us company) <- The US doesn’t not have to specify it’s country code.
Notice in the bbc example above we did not type in www before the domain name. The www
indicates the host server for the resource. Most commonly used websites are accessed via www so it
does not always needs to be typed in. Where the www is typed, the domain name is known as a fully
qualified domain name (FQDN) and is completely unambiguous as it can relate to only one host. The
domain bbc.co.uk might also contain other hosts with different names, e.g. mail.bbc.co.uk,
ftp.bbc.co.uk
Page | 10
Computer Science @ Aquinas College
So when we type in a domain name it has to be translated into an IP address. A DNS Server does this.
It’s a bit like your mobile phone address book!
The DNS service is arranged in a hierarchical fashion too with separate DNS servers responsible for
different sub-domains
Page | 11
Computer Science @ Aquinas College
http://whois.icann.org/en
http://www.nominet.uk/whois/
https://Community.jisc.ac.uk/janet-apps/whois
Think of a good website name – Use a WHOIS request see if it already owned!
Page | 12
Computer Science @ Aquinas College
It is important to understand that for effective communication across the internet several protocols
are required. This interaction between protocols is referred to as the protocol stack.
The protocol stack has four layers. Let’s look at this using the analogy of writing a letter.
Sending data
Receiving data
Page | 13
Computer Science @ Aquinas College
11-22-33-44-55 | 00-17-4F-08-5D-69
Page | 14
Computer Science @ Aquinas College
TCP
IP
Data Link
Page | 15
Computer Science @ Aquinas College
Client ports.
As well as well-known ports used by server software we need to set up temporary ports on clients
for the other end of the exchange. These temporary client ports (in the range 1024 to 65535) are
referred to as client or dynamic ports. Client ports are necessary to stop the well-known listening
port getting clogged up.
Let’s look at the communication between a web client and server. In the example below the same
computers carry out two different client-server interactions (called sessions);
IP 122.34.56.78 IP 215.221.12.56
MAC Addresses
A MAC address is given to any
piece of equipment that can be
networked.
Page | 16
Computer Science @ Aquinas College
Using FTP, a client can upload, download, delete, rename, move and copy files on a server. A user
typically needs to log on to the FTP
server. A server that provides an
FTP service may provide
anonymous FTP access which
requires no log in. Many FTP hosts
whose purpose is to provide
software updates will allow
anonymous logins.
2. The webpage returned is in HTML (text) format via the client port.
3. The HTML is rendered by the web-browser into a web page we see on the screen.
4. Any embedded content in the webpage – i.e. images, videos, sound files require more GET
requests.
Page | 17
Computer Science @ Aquinas College
HTTP web server dealing with multiple client requests on separate client ports
SSH is a protocol that uses public-key encryption to control another computer remotely.
These days, SSH is used to log into and execute code on remote hosts, browse the web using
encrypted proxy clients, and transfer files – even setting up a Virtual Private Network.
SSH could be used to tunnel through firewalls and bypass security however.
Page | 18
Computer Science @ Aquinas College
SMTP and POP3 (Simple Mail Transfer Protocol and Post Office Protocol)
These are separate protocols for sending and receiving emails.
The SMTP protocol delivers an email from the sender’s client computer to the receivers email server.
POP3 is used to deliver the mail from the receiver’s server to the client when requested.
Page | 19
Computer Science @ Aquinas College
IPv6 uses a 128-bit address, theoretically allowing Ipv4 uses a 4 byte(32 bit) address. So there are
2128 addresses (that’s a lot!) approximately 232 addresses
IP v4 IP address structure
Page | 20
Computer Science @ Aquinas College
Masking IP Addresses
When we route traffic we are routing BETWEEN NETWORKS. Therefore the host part of the address is
irrelevant and we want to get rid of it for the purposes of moving packets between networks.
So we mask out the station(host) part of the address. We do this by a Boolean AND operation and a
Mask.
This because only the first two bytes are used to identify the address
Assuming A packet with the following IP address( arrives in binary) destined for a class B network.
10111010.00100101.00111100.10001000
We want to preserve only the first two bytes so we can see which network it belongs to.
The big advantage of non-routable addresses is that they can be reused. This allows us to have many
more devices on the internet than otherwise would be possible.
Page | 21
Computer Science @ Aquinas College
Private IP addressing
No device outside of private network 1 will see any other address than the router’s external port
address i.e. 128.195.4.119
REMEMBER the external website will only see the external port address of the router not the
machine that requested the page.
The purpose of NAT (network address translation) is to help implement private IP addresses. It acts
as a way of redirecting external packets to the correct computer in the private local network and is
undertaken by the firewall/gateway/router that acts as the point of entry/exit to the network. It can
achieve this in a number of ways. One common way is to keep a table of which port numbers in
packets refer to which machines.
Page | 22
Computer Science @ Aquinas College
NAT in action
In the above diagram the person sat at the computer 192.168.0.2 requests a page from google’s
server
The packet google receives will look like this because private addresses are non-routable…
The response packet back to the client will look like this…
ROUTER A will use NAT to get the packet to machine 192.168.0.2 on the private network
Page | 23
Computer Science @ Aquinas College
An organisation creates a LAN that connects to the internet via a gateway computer. The organisation
has a routable IP address of 213.122.120.2 which it has registered.
Allocate the appropriate IP, gateway addresses and cabling below. There are relatively few machines
so a class C network will suffice. They decide to put the machines on a private (non-routable) IP
network 192.168.0
Wire up and assign the appropriate IP addresses to the network cards on these computers. All
network cards on a network need to know the unique IP address of the device AND the gateway IP
address i.e. the exit point from the network.
Page | 24
Computer Science @ Aquinas College
The key word in DHCP is "dynamic." Because instead of having just one fixed and specific IP address,
most computers will be assigned one that is available from a subnet or "pool" that is assigned to the
network.
Port Forwarding
Normally, a network router will examine the header of an IP packet and send it to a linked and
appropriate interface, which in turn sends the data to the destination information that's in the
header.
But in port forwarding, the intercepting application (or device) reads the packet header, notes the
destination, and then rewrites the header information and sends it to a another computer—one
that's different from the one intended. That secondary host destination may be a different IP address
using the same port, a different port on the same IP address, or a completely different combination
of the two.
A port forward is a way of making a computer on your home or business network accessible to
computers on the internet, even though they are behind a router and have a non-routable (private)
address. It is commonly used in gaming, security camera setup, voice over ip, and downloading files.
After you have forwarded a port you are said to have an open port.
Port forwarding is also an excellent way to preserve public IP addresses. It can protect servers and
clients from unwanted access, "hide" the services and servers available on a network, and limit
access to and from a network. Port forwarding is transparent to the end user and adds an extra layer
of security to networks.
In short, port forwarding is used to keep unwanted traffic off networks. It allows network
administrators to use one IP address for all external communications on the Internet while dedicating
multiple servers with different IPs and ports to the task internally. Port forwarding is useful for home
network users who may wish to run a Web server or gaming server on one network.
Page | 25
Computer Science @ Aquinas College
1. The Internet is a network of networks and computers that use unique ___ addresses and the
___________ protocol.
4. A protocol provides ______________ signals, codes and rules for data exchange between
systems.
______________.
13. A _____________________ IP address is one that cannot be routed and which doesn’t
require registering.
14. ___________ is a method of directing external packets to the correct private IP address in a
private network.
Page | 26
Computer Science @ Aquinas College
http
https
ftp
SMTP
SSH
POP3
User A wishes to send an e-mail to user B over an Ethernet. Complete the diagram.
User A User B
Page | 27
Computer Science @ Aquinas College
Question 1
The diagram below is a partial view of a router network connecting an e-mail client to
an e-mail server.
(a) Describe two roles of the routers shown in the diagram above.
Role 1: ...........................................................................................................
........................................................................................................................
Role 2: ...........................................................................................................
........................................................................................................................
(2)
........................................................................................................................
(1)
Page | 28
Computer Science @ Aquinas College
(c) The diagram below shows the TCP/IP stack for two computers (hosts) connected
via a network.
Explain how the TCP/IP stack in each host supports an e-mail client to e-mail
server request at the same time as a web browser to web server request. You
should cover in your explanation:
• the role of the different TCP/IP layers in the stages of client-server operation
Page | 29
Computer Science @ Aquinas College
In your answer you will be assessed on your ability to use good English and to
organise your answer clearly in complete sentences, using specialist vocabulary
where appropriate.
............................................................................................................... ...................
....................................................................................................................... ...........
.....................................................................................................................................
............................................................................................................... ...................
....................................................................................................................... ...........
.....................................................................................................................................
............................................................................................................... ...................
....................................................................................................................... ...........
.....................................................................................................................................
............................................................................................................... ...................
....................................................................................................................... ...........
.....................................................................................................................................
............................................................................................................... ...................
....................................................................................................................... ...........
.....................................................................................................................................
Page | 30
Computer Science @ Aquinas College
(6)
(Total 9 marks)
Question 2
An ICT technician at a secondary school has access to a variety of programs that she
uses to manage a group of servers.
(a) State one use for each of the protocols listed below.
(b) Whilst remotely connecting to one of the servers the technician executes a command
that displays the current network connections. The table below shows these network
connections.
(i) IP address:...................................................................................
(1)
(c) State two reasons why the technician uses remote management software
from her computer rather than going to the actual servers.
Reason 1: ......................................................................................................
.......................................................................................................................
Reason 2: ......................................................................................................
.......................................................................................................................
(2)
Page | 31
Computer Science @ Aquinas College
(Total 8 marks)
Question 3
https://www.aqa.org.uk/gce/computing/2012comp2.pdf
A B C
A ...........................................................................................................
..............................................................................................................
B...........................................................................................................
..............................................................................................................
C...........................................................................................................
..............................................................................................................
(3)
..............................................................................................................
(1)
(b) To access the exam paper, the student’s computer might need to make use
of a Domain Name System (DNS) query which is transmitted to a DNS
server.
..............................................................................................................
..............................................................................................................
(1)
Situation 1.............................................................................................
..............................................................................................................
Situation 2.............................................................................................
..............................................................................................................
Page | 32
Computer Science @ Aquinas College
(2)
(c) In the process of requesting a web page, a browser will generate an HTTP
GET request.
..............................................................................................................
(1)
(ii) Explain why the student’s computer might need to make several
HTTP GET requests to display one web page.
..............................................................................................................
..............................................................................................................
(1)
(iii) The HTTP GET requests are being sent to port 80 on the remote
machine. The browser has been allocated a client port number.
..............................................................................................................
..............................................................................................................
(1)
(Total 10 marks)
Question 4
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
(2)
(b) A packet being sent across the Internet may contain the details of a socket,
for example 12.23.45.89:80.
Complete the table below to explain what each part of the socket in the
table represents.
Part Represents
12.23.45.89
80
Page | 33
Computer Science @ Aquinas College
(2)
(Total 8 marks)
Question5 (2018)
The diagram shows the physical topology of a local area network (LAN) used by a
company, and its connection to the Internet. The LAN uses the IPv4 protocol.
Internally, the network has been divided into subnets: 27 bits have been allocated to
the network / subnet identifier.
(a) In binary, write out the subnet mask that has been programmed into the devices on the
network.
(1)
(b) Subnet Z consists of all of the devices that are directly connected to Switch B.
What is the maximum number of devices that could be connected to Subnet Z at the
same time?
___________________________________________________________________
___________________________________________________________________
(1)
Page | 34
Computer Science @ Aquinas College
(c) When a device wishes to join Subnet Z it communicates with the DHCP server.
Explain:
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(4)
(Total 6 marks)
Question 6
The web server, which has the IP address 192.168.16.12, must be accessible from
computers that are connected to the Internet but outside the company’s own network.
As the web server has a non-routable IP address, it cannot be accessed directly from
outside the network. Therefore, access to the web server will be facilitated by the External
Router, which supports Network Address Translation (NAT) and port forwarding.
Explain how the External Router will have been configured so that the web server can be
accessed by computers outside the network.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 2 marks)
Page | 35
Computer Science @ Aquinas College
Internet Security
The internet is to a large extent unregulated. As a result there are many potential security risks to
someone going on line. You need to be aware of these risks and the measures to protect against
hem.
Firewalls
As data passes from the gateway/router’s external card to the internal card the packets passing
through are inspected. Based on the packets conforming to certain rules they are either allowed
through from the external to the internal network or not.
Packet Filtering
This operates at the IP level by applying certain filtering rule to the packet’s header data. For example
- Do we allow packets from this IP address?
- Do we allow packets on this port?
- Do we allow this Protocol type?
The limitations of this type of firewall is that it is easy to bypass these rules using spoofing/proxy
servers and port forwarding. It is simple to implement and requires the firewall to have no
memory/storage
Stateful Inspection
This is more sophisticated. It tracks each session between clients and servers in a state table. When it
looks at packets it filters them in context. For example if may be expected a certain type of packet in
the session e.g. get/response packets. It would also remember which temporary ports are being used
by client and server and block packets in this session not using these ports.
Proxy server
Proxy servers are placed between networks and cache all incoming traffic. The external network only
sees the proxy server. The proxy can undertake more sophisticated monitoring of packets. e.g.
blocking packets with certain content or packets to and from certain network users. Another
advantage of caching web pages arriving is that several local users accessing the same information
can reuse the data that is cached on the proxy.
Page | 36
Computer Science @ Aquinas College
Proxy servers can unfortunately also be used to bypass security by hiding someone’s source IP
address. Sites such as (websiteproxy.co.uk) provide a service to do this.
Encryption
Encryption involves the process of converting plaintext into ciphertext before transmission so if the
data is intercepted it should be unreadable. Central to encryption is the use of keys to perform this
function. However, both sender and receiver must have the appropriate keys to be able to read each
other’s communication.
At the beginning of any encrypted communication both sender and receiver need a copy of the
symmetric encryption key. The transfer of keys between sender and receiver is known as key
exchange. If anyone else gets it they will be able to read the messages sent. BUT how do we
exchange the keys – we can’t encrypt them because we both don’t have the key yet!!!
Page | 37
Computer Science @ Aquinas College
The solution to this as used by the internet is the use of asymmetric keys.
Bob
(Bob's private key)
Bob has been given two keys. One of Bob's keys is called a Public Key, the other is called a Private
Key.
Page | 38
Computer Science @ Aquinas College
Bob's Co-workers:
Susan (shown below) can encrypt a message using Bob's Public Key
Any of Bob's co-workers might have access to the message Susan encrypted, but without Bob's
Private Key, the data is worthless.
HNFmsEm6U
n
"Hey Bob,
BejhhyCGKOK
how about
JUxhiygSBCEi
lunch at Taco
C
Bell. I hear
0QYIh/Hn3xgi
they have free
K
refills!"
BcyLK1UcYiY
lxx2lCFHDC/A
HNFmsEm6Un
BejhhyCGKOK
JUxhiygSBCEiC "Hey Bob, how about lunch at Taco
0QYIh/Hn3xgi Bell. I hear they have free refills!"
K BcyLK1UcYiY
lxx2lCFHDC/A
Bob can put digital signatures on documents and other data. A digital signature is a hashed digest of
the message. The digital signature acts as proof you have sent the message.
Page | 39
Computer Science @ Aquinas College
Page | 40
Computer Science @ Aquinas College
To
sign a
document, Bob's
software will crunch
down the data into
just a few lines by a
process called
"hashing". These
few lines are called a
message digest. (It is
not possible to
change a message
digest back into the
original data from
which it was
created.)
Bob's software then encrypts the message digest with his private key. The result is the digital
signature.
Page | 41
Computer Science @ Aquinas College
Finally, Bob's software appends the digital signature to document. All of the data that was
hashed has been signed.
First, Pat's software decrypts the signature (using Bob's public key) changing it back into
a message digest. If this worked, then it proves that Bob signed the document, because
only Bob has his private key. Pat's software then hashes the document data into a
message digest. If the message digest is the same as the message digest created when
the signature was decrypted, then Pat knows that the signed data has not been
changed.
Plot complication...
Doug (our disgruntled employee) wishes to deceive Pat. Doug makes sure that Pat
receives a signed message and a public key that appears to belong to Bob. Unbeknownst
to Pat, Doug deceitfully sent a key pair he created using Bob's name. Short of receiving
Bob's public key from him in person, how can Pat be sure that Bob's public key is
authentic?
To overcome this problem Bob registers for a digital certificate. This is proof you are the person who
owns this public key. A digital certificate authority will carry out background checks on you before
issuing you with an approved key pair.
Page | 42
Computer Science @ Aquinas College
Certificate Info: Let's say that Bob sends a signed document to Pat. To verify the
Expiration Date signature on the document, Pat's software first uses Susan's (the
Serial Number
certificate authority's) public key to check the signature on Bob's
Bob's Public Key: certificate. Successful de-encryption of the certificate proves that
Susan created it. After the certificate is de-encrypted, Pat's
software can check if Bob is in good standing with the certificate
authority and that all of the certificate information concerning
Bob's identity has not been altered.
Page | 43
Computer Science @ Aquinas College
SENDER RECEIVER
Page | 44
Computer Science @ Aquinas College
TLS session
SERVER CLIENT
Worm
Worms are self-replicating viruses that spread themselves across networks. As a result of their
proliferation the usually affect the bandwidth of infected networks. Worms do not need to attach
themselves to a host program. They use the internet to replicate themselves – one method by
generating emails from the infected machines email address book
Trojan
A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans
can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are
typically tricked by some form of social engineering into loading and executing Trojans on their
systems. Once activated, Trojans can enable cyber-criminals to spy on you, steal your sensitive data,
and gain backdoor access to your system.
Page | 45
Computer Science @ Aquinas College
Video resources
https://www.youtube.com/watch?v=DF8Ka8Jh0BQ
Page | 46
Computer Science @ Aquinas College
1 Hash message to
message digest
3 Add signature to
message.
MESSAGE TRANSMITTED
Sender’s Sender’s Recipient’s Recipient’s
public Private public key private key
key key
Activity recipient
7 Hashes message to
digest.
Page | 47
Computer Science @ Aquinas College
Question 1.
Two computers, A and B, are involved in a secure communication that uses asymmetric
encryption. A is sending a message to B.
(2)
(b) The security of the communication could be improved by the adding a digital signature.
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
(2)
(Total 4 marks)
Question 2.
Software is being developed to allow secure transmission of data over the Internet.
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
(1)
(b) The data that are being transmitted will be encrypted using public and private
keys.A and B will each have a public key and a private key.
A will encrypt the data that it is sending using B’s public key.
Page | 48
Computer Science @ Aquinas College
.............................................................................................................. .........................
........................................................................................................................................
(1)
.................................................................................................................................
..................................................................................................... ..........................
(1)
(c) The communication will be made more secure by the use of a digital signature
attached to the end of the message.
• Explain how it will be created and used in the data transmission process from
A to B.
In your answer you will be assessed on your ability to use good English, and to
organise your answer clearly in complete sentences, using specialist vocabulary
where appropriate.
................................................................................................................. ..................
.................................................................................................................. .................
................................................................................................................ ...................
................................................................................................................ ...................
........................................................................................................... ........................
................................................................ ...................................................................
................................................................ ...................................................................
................................................................. ..................................................................
.................................................................... ...............................................................
..................................................................... ..............................................................
........................................................................ ...........................................................
.......................................................................... .........................................................
............................................................................... ....................................................
................................................................................ ...................................................
................................................................................. ..................................................
.................................................................................. .................................................
Page | 49
Computer Science @ Aquinas College
................................................................................... ................................................
(6)
(Total 9 marks)
Question 3.
There are continuing threats invading any computer system.
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
(2)
.......................................................................................................................
.......................................................................................................................
(2)
(4 marks)
Question 4
Networks can be protected from one another by implementing a firewall using packet filtering,
stateful inspection or a proxy server.
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
(2)
.......................................................................................................................
.......................................................................................................................
.......................................................................................................................
(2)
.......................................................................................................................
.......................................................................................................................
Page | 50
Computer Science @ Aquinas College
.......................................................................................................................
(2)
Question 5
The configuration file for a school's firewall contains the following three rules:
___________________________________________________________________
___________________________________________________________________
(1)
______________________________________________________________
______________________________________________________________
(1)
(ii) Explain why the school has set up the firewall so that HTTP requests are
accepted from any IP address but Telnet requests are denied.
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
(2)
(c) David is a company's network manager who is away travelling for his summer
holiday. Whilst he is on holiday, a security update is released for a critical piece of
software running on one of his company's servers. The update can be downloaded
from the FTP server at URL ftp.aqaservertools.com for which David has a username
and password.
David has a laptop which has a telnet client and an FTP client installed on it.
On the company server, David has access to a Telnet server, an FTP server and an
Page | 51
Computer Science @ Aquinas College
FTP client.
Page | 52
Computer Science @ Aquinas College
Security update
Laptop Company server
server
Explain what is meant by the client server-model and describe the steps David would
go through to apply the security update to the company's server.
In your answer you will be assessed on your ability to use good English and to
organise your answer clearly in complete sentences using specialist vocabulary where
appropriate.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(6)
(Total 10 marks)
Page | 53
Computer Science @ Aquinas College
Question 6
(a) Three important computer security procedures are:
• authentication
• authorisation
• accounting
The table lists two situations which involve the use of security procedures.
For each row in the table, place a tick in one column to indicate whether the Situation
and Procedure is an example of Authentication, Authorisation or Accounting.
Situation and
Authentication Authorisation Accounting
Procedure
A web server
generating a log of the
IP addresses of
computers that have
accessed it.
Explain what a virus is, and explain the difference between a virus and a worm.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(3)
(Total 5 marks)
Page | 54
Computer Science @ Aquinas College
Page | 55
Computer Science @ Aquinas College
If we think about the way we interact with databases using SQL there is an obvious mapping here…
Operation SQL
Create INSERT
In a REST interface this mapping is taken one stage further. We use an API which processes database
requests using the HTTP protocol. HTTP has certain key words used to determine the type of request
being made. REST is an agreed standard both for requesting and the format the data is received in.
The advantages of RESTful Web APIs I that anything can be accesses from the browser using
JavaScript on the client’s browser rather than generating the pages on the server (called server sided
scripting). This means that different devices phones, laptops, tablets can worry about the interface at
their end. The server hasn’t got to worry about presentation and get on just processing raw data.
Page | 56
Computer Science @ Aquinas College
Here is a directory of available web APIs developed by webservers. It allows you to access their data
as well as themselves!
http://www.programmableweb.com/apis/directory
Page | 57
Computer Science @ Aquinas College
JSON vs XML
These are two competing formats for delivering data from a website through an API. Each have
advantgaes and disadvantages
JSON XML
Page | 58
Computer Science @ Aquinas College
In thin client networks the client station is ‘dumb’. It has little processing power and no hard disk. It is
effectively a simple input/output device (called a terminal) to the server. In a thin-client network the
files and applications remain on and run on the server. The results and inputs are simply transmitted
to the client.
Whilst thin clients still run an operating system, ultra-thin clients don’t even do that!
The internet is now providing many ‘on-line’ applications such as google docs. Also manufacturers
have produced thin-client machine that require internet access such as Chromebook.
THIN-CLIENT THICK-CLIENT
Page | 59
Computer Science @ Aquinas College
Read (Retrieve)
Update (Modify)
Delete (Destroy)
Page | 60
Computer Science @ Aquinas College
(a) The network was recently created from an existing set of stand-alone computers,
and is used by a team of programmers. Describe two advantages that
networking the computers has brought to the programming team.
1. _________________________________________________________________
___________________________________________________________________
2. _________________________________________________________________
___________________________________________________________________
(2)
Option 2: Installing the applications software on the hard drive of each PC.
______________________________________________________________
______________________________________________________________
(1)
______________________________________________________________
______________________________________________________________
(1)
______________________________________________________________
______________________________________________________________
(1)
______________________________________________________________
______________________________________________________________
(2)
Page | 61
Computer Science @ Aquinas College
http://www.smk-solutions.co.uk/index.htm
___________________________________________________________________
___________________________________________________________________
(1)
(Total 8 marks)
Page | 62
Computer Science @ Aquinas College
ANSWERS
NE=not enough
; = mark
R = Reject
A= accept
Question 1
(b) SMTP;
POP(3);
IMAP(4);
A full names of the protocols above
A ESMTP // SMAP // LMTP // QMTP
Max 1
Application layer selects appropriate protocol for the communication // protocol mentioned by
example ( POP / HTTP );
Application layer is to interact with the user via the email client / web browser;
Transport Layer: establishes end to end communication // Transport layer establishes a virtual path //
TCP layer establishes connection between client and server;
Destination and source application level client/server identified by port numbers;
TCP layer uses these port numbers to route reassembled requests/responses to correct application
layer client/server;
TCP layer splits and reassembles requests/responses into packets/from packets;
Packets are numbered by transport layer;
Transport layer deals with error control (acknowledgements/retransmission);
Network layer adds source and destination IP addresses; Routers use destination IP addresses to
route packets to destination // network layer involved with packet routing;
Page | 63
Computer Science @ Aquinas College
Network layer strips IP address (when receiving) // Link layer strips MAC address Server uses
received source IP address to know where to send response;
Server uses received client port number to know to which instance of application layer client to send
response to;
Servers use well-known ports;
Client port numbers come from the dynamic range;
Packets of Email client/server and Web browser/Web server travel independent paths;
Packets of Email client/server and Web browser/Web server share links//intermingled on links;
Question 2
(ii) Enable files on one host / computer / client to be copied to another host / computer /
server;
To manage files on a remote computer / server;
A to upload / download / transfer files
NE “sharing”
NE load a file
NE transfer data
1
(iii) 192.168.3.205:80 //
192.168.3.205:25 //
74.125.4.148:58539 //
208.43.202.29:57458 //
208.43.202.29:57459 ;
1
Page | 64
Computer Science @ Aquinas College
Question 3
(a) (i) A the protocol to be used / / secure hyper-text transfer protocol / / hyper-text
transfer protocol secure;
NE hyper-text transfer protocol
B the FQDN / / fully qualified domain name;
A the address of (AQA’s) web server
C the path and resource to be returned;
A path / pathname / file path
3
(ii) uk / / .uk ;
1
(ii) The (local) computer already has a copy of the needed IP address (in a hosts file);
The (local) computer has a cache of recent DNS queries / answered DNS queries;
A previously visited site / refreshing a page;
The URL typed in already contains an IP address;
The URL refers to a local resource, e.g., a file on the local computer / / localhost ;
NE intranet
MAX 2
(ii) To fetch different parts of the web page that also include an URL;
To fetch a needed image / video / javascript / css / resource;
R transmission error
R network busy
MAX 1
(iii) Port that is temporarily assigned / only exists for duration of a connection;
Port number automatically allocated / / assigned from the TCP / IP stack;
A a port number in range 1024 - 65535
MAX 1
[10]
Question 4
Page | 65
Computer Science @ Aquinas College
80
Question 5
30 // (25)−2;
A. 32, 25, 31, (25)−1 (this time only)
1
(c) 1 mark for AO1 (understanding) and 3 marks for AO1 (knowledge)
Reduces the need for expert knowledge when configuring a host // reduces
the time required to configure hosts // facilitates efficient use of a limited
pool of IP addresses // avoids errors with a relevant example such as
duplicating IP addresses or programming incorrect subnet mask;
A. enables reuse of IP addresses
N.E. “avoiding errors” without an example
Page | 66
Computer Science @ Aquinas College
Question 6
All marks AO1 (understanding)
Traffic arriving on the HTTP(S) port // the port used for web services // port
80/8080/443 (from outside the network) // HTTP(S) traffic (from outside the
network);
Must be forwarded (by the External Router) to the IP address of the Web Server //
IP address 192.168.16.12;
[2]
Page | 67
Computer Science @ Aquinas College
Question 1.
(a) All marks AO1 (understanding)
Question 2.
(a) (Using an algorithm) to convert a message into a form that is not
understandable
(without the key to decrypt it);
(Using an algorithm) to convert a message into a form that is only
understandable
by the intended parties // can only be read with the correct key;
Converting a message into cipher text;
NE scrambling unless further explanation is provided
A “unreadable” for “understandable”
A “data” for “a message”
Max 1
(b) (i) B will not be able to decrypt it // A's private key would be needed to
decrypt it // only A could decrypt it; (as ...)
Only A has access to A’s private key // B cannot access A.s private
key;
Max 1
Purpose:
To authenticate/confirm identity of sender // that message was sent by A //
To detect if message has been tampered with/changed;
How used:
*1 Hash / digest produced/calculated from message // (shortened) value
calculated from message;
A message is hashed
A message digest created
*1Hash encrypted with A’s private key;
*1Encrypted hash is known as the (digital) signature;
*2(Digital) signature is appended to message;
A transmitted with message
Page | 68
Computer Science @ Aquinas College
A even if stated or implied that this is done after the encryption of the
message using B’s public key
A hash or digest
A encrypts message and signature with B’s public key;
A without reference to signature but TO if clear from order of statements or
what candidate has written that the signature is not encrypted with B’s
public key
B decrypts message and signature with B’s private key;
A without reference to signature
B decrypts (digital) signature using A’s public key (to reveal hash);
B reproduces/recalculates hash from received message;
A re-hashed
A creates new digest
*3If received hash matches reproduced hash then message has not been
tampered with // identity of sender is authenticated;
A Data for message
A Digest, checksum for hash
A Encrypted hash / Encrypted digest for signature
A Example of hashing method e.g. MD2/4/5/6, SH0/1/224/256/384/512
*1 = as an alternative to these three points, allow one mark for the idea that
the digital signature is calculated from/hashed from/a digest of the message
*2 = only award this mark if there is previously the concept of the hash or
signature being produced.
*3 = can only be awarded if there is clear concept that the comparison is to a
recalculated hash
[6]
Question 3.
(a) Program designed to replicate itself (and spread on its own), preferably
without anyone aware of its existence.
Damage files / hardware or amuse user
Any 2 × 1
2
(b) Self replicating virus which can spread itself across networks. Doesn’t
require a host program. Consumes bandwidth
Any 2 × 1
2
[4]
Question 4
(a) IP level filtering
Looks at header information
Filters on IP address/protocol
Page | 69
Computer Science @ Aquinas College
[6]
Question 5.
(ii) HTTP:
HTTP is a protocol for accessing websites which are usually available to the general public;
Alternative steps:
• Run the FTP client on the laptop to connect to the security update Server using username and
password
• Download/transfer the required file
• Connect to the company FTP server
• Upload the required file from the laptop
• Run the Telnet client to connect to the company server
• Login to the remote server
• Run the command to install the security update // apply update
• Log off from the server // Disconnect from the server
Page | 70
Computer Science @ Aquinas College
5-6 To achieve a mark in this band, candidates must meet the subject criterion (SUB) and all 5 of
the quality of written communication criteria (QWCx).
SUB Candidate has made at least five mark-worthy points and covers both the client server
model and the steps form a logical sequence to update the server.
QWC1 Text is legible.
QWC2 There are few, if any, errors of spelling, punctuation and grammar. Meaning is clear.
QWC3 The candidate has selected and used a form and style of writing appropriate to the
purpose and has expressed ideas clearly and fluently.
QWC4 Sentences (and paragraphs) follow on from one another clearly and coherently.
QWC5 Appropriate specialist vocabulary has been used.
3-4 To achieve a mark in this band, candidates must meet the subject criterion (SUB) and 4 of the
quality of written communication criteria (QWCx).
SUB Candidate has made at least three mark-worthy points.
QWC1 Text is legible.
QWC2 There may be occasional errors of spelling, punctuation and grammar. Meaning is
clear.
QWC3 The candidate has, in the main, used a form and style of writing appropriate to the
purpose, with occasional lapses. The candidate has expressed ideas clearly and reasonably
fluently.
QWC4 The candidate has used well-linked sentences (and paragraphs).
QWC5 Appropriate specialist vocabulary has been used.
1-2 To achieve a mark in this band, candidates must meet the subject criterion (SUB) and 3 of the
5 quality of written communication criteria (QWCx).
SUB Candidate has made a small number of relevant points.
QWC1 Most of the text is legible.
QWC2 There may be some errors of spelling, punctuation and grammar but it should still be
possible to understand most of the response.
QWC3 The candidate has used a form and style of writing which has many deficiencies. Ideas
are not always clearly expressed.
QWC4 Sentences (and paragraphs) may not always be well-connected.
QWC5 Specialist vocabulary has been used inappropriately or not at all.
Page | 71
Computer Science @ Aquinas College
MAX 3
3
Answers Page 57 Client Server Model
Question 1.
(a) Allows for the sharing of peripherals/hardware; R ‘Resources’ programmers
can access their work from any terminal; better communications / internal
e-mail/instant messaging; easier/quicker/instant sharing of a program
library/ sharing program code/ data files; central storage of documents e.g.
program specifications; changes to important documents are held centrally /
document management; setting up of an Intranet (for document
management); easier for the backup of data;
R anything about program updates
Max 2
(c) (i) Protocol set of rules (about the way devices communicate);
A standards
R Instructions
1
(ii) Handshaking …
Sending signals between devices + implication of 2-way;
Confirmation of ready for sending / receiving data;
Acknowledge that a transfer is completed;
Max 2
(d) smk-solutions.co.uk;
R www.smk-solutions.co.uk
1
[8]
Page | 72