Networking Cat
Networking Cat
Networking Cat
Radio waves
Microwaves
Infrared waves
An organisation that supplies audiobooks over the internet is moving into a new
office building.
(a) One reason for networking devices is to provide access to the internet.
(i) Give two other reasons for connecting devices to networks.
Deploy/update applications
(ii) The organisation has chosen wireless connectivity over wired connectivity for its
new office building. There is no significant difference in the cost of installing either.
Give three reasons why the organisation might prefer wireless connectivity.
Employees and visitors can move around the building without disconnecting
Adding new users just means giving out the SSID and password
A large comprehensive school has over 500 computers connected to their Local Area
Network (LAN) with a connection to the Internet. (a) Describe, in detail, four
disadvantages for the school of having a network of computers compared to stand
alone computers
Hackers may gain access as the network only as secure as weakest point of entry to
data and steal/destroy
The server/switch could go down (main cable break) so all workstations on the
network are affected
Substantial Initial disruption: drilling holes, fitting trunking, running cables between
buildings etc…
Can have a slow response time due to heavy network traffic so users cannot work as
effectively
Detecting network problems can be more difficult on a network i.e difficult to isolate
Only limited storage space available on network while one has access to all hard disc
drive on standalone computer
Time and effort to set up users o Can just start a standalone and use computer
Microwaves can cover shorter distances. On the contrary, radio waves can travel a
long distance. Radio wave is usually propagated through sky mode while microwave
uses the line of sight propagation.
Broadcast Radio
Infrared
Bluetooth
Microwaves
Satellite
(a) Other than the items labelled above state the hardware required by every
computer to connect to a network
(a)
(b)
Computer A adds computer D’s address to packet
Computer A sends packet to switch
Switch looks at address on packet Switch compares to stored list of addresses
on network
Switch forwards packet to computer D’s address
It transfers data signals from one node directly to another in the network
without broadcasting
allowing the network to share resources like files and software for printers and
computers
support the network's implementation of security features
controls user accounts
supplies network administrators with network monitoring tools.
State which layer of the TCP/IP model each of the network protocols operates
at
Devices must have a unique IP address because otherwise, a switch would not
know which of the two was the correct device to send packets to
Star topology
Devices must have a unique IP address because otherwise, a switch would not
know which of the two was the correct device to send packets to
Star topology
Examples
bus topology
ring topology
mesh topology
star topology
Examples
Ethernet
Your friend wishes to install a wireless network in his office. Explain to him the
difference between guided and unguided media
Differentiate between bus topology and star topology of networks. What are the
advantages and disadvantages of star topology over bus topology
A school intends to install a computer network. Explain three challenges that the
school may experience after the installation (KCSE 2021 Computer Studies Q19(b))
Network Failure - when the network becomes faulty or the network is down, users
may not access network resources hence operations of an organization may be
brought to a standstill
The rapid spread of viruses: Viruses can easily spread to terminals of a computer
network which may be very expensive to clear
Xpat ICT has been tasked to construct a network for an organisation. Explain three
factors that the company should consider when selecting the medium for the
connectivity (KCSE 2021 Computer Studies Q19c)
Security
Installation cost
bandwidth the medium can support
Flexibility e.g wireless media
Distance
A PAN exist around a single person whereas a LAN covers a larger area
Edit
Single-mode fibre consists of a narrow core in which all light pulses travel at
the same speed and arrive roughly at the same time at the destination.
Supports higher bandwidth with less signal loss over a greater distance
Multi-mode Multi-mode fibre consists of a larger core in which multiple light
pulses can travel down the core.
Supports a smaller bandwidth and signals attenuate at a shorter distance than
single mode fibre.
Edit
All nodes ‘listen’ for traffic to sense when the network is idle.
When a node wishes to transmit, it transmits a ‘request to send’ frame’ (RTS)
The intended receiving device will transmit a ‘clear to send’ (CTS) frame if it is
available.
All other nodes ‘sense’ the network is busy and wait a random amount of time
before trying to transmit
Edit
802.3 is the standard for ethernet wired networks and 802.11x is the standard for
ethernet
wireless networks.
Outline why standards such as these are important in the development of network
devices and
software.
Edit
Describe why fibre optic cable would be used for the backbone of the
network. (2 marks)
Describe how the firewalls can ensure the security of the EmergWA network.
Describe a transmission media that would work better in remote areas The
volunteers assisting in an emergency all wear personal protection equipment
(PPE) that has an RFID tag sewn into the collar so that they can be tracked if
they become lost in a remote location. Identify what RFID is and outline how it
works. (3 marks)
Fibre optic cable would be used because it has a higher bandwidth, allowing
faster communication in the main part of the network. It is also more secure as
it cannot be tapped.
Firewalls filter the data in and out of a network. Each packet is examined
against the filter rules and if a packet is flagged, it is dropped. Only data
packets that satisfy the filter rules are allowed through the firewall, thus
providing a layer of security for the network.
A satellite system would be better as it does not rely on wifi, cellular etc. It is
not subject to interference and is reliable in remote conditions
Radio-frequency identification (RFID) uses electromagnetic fields to
automatically identify and track tags attached to objects. An RFID system
consists of a tiny radio transponder, a radio receiver and transmitter. When
triggered by an electromagnetic interrogation pulse from a nearby RFID
reader device, the tag transmits digital data, usually an identifying inventory
number, back to the reader. This number can be used to track inventory
goods..
Advantages
Disadvantages
State the primary function of the Dynamic Host Configuration Protocol (DHCP)
protocol.
(a) Phishing
(b) DoS
(a) Phishing
(b) DoS
IP spoofing
Back door:
An undocumented method of gaining access to a program, online service or an
entire computer system
Explain, with examples where appropriate, the following five computer terms.
(a) Buffer
(b)batch processing
(c) e-commerce
(d) simulation
(a) Buffer
(b)batch processing
(c) e-commerce
electronic commerce
buying and selling products/services using the internet/computer networks
(d) simulation
(e) Email
Describe three possible threats to the computers connected to the network and
give one way each threat can be reduced or prevented
Prevention
Running anti-virus/anti-malware software
don’t download from unknown sources
don’t click on unknown links
Prevention
Prevention
Encryption
Phishing
An e-mail has a link that when clicked directs the user to a fake website that
collects personal data
Prevention
Pharming
A piece of code installed that redirects user to fake website that collects
personal data
Prevention
Anti-malware or firewall
Hacker
Prevention
Firewall
strong password
biometrics
penetration testing
1. State two ways in which a computer may be used in a healthcare sector other than
record keeping
Patient monitoring
Used to control medical equipment e.g ultra sound
medical research and studies
communication and telemedicine
it has a header that contains the destination address, the packet number, and
the originator’s address
it has a payload
it has a trailer.
A web server has an internet protocol (IP) address. Give three characteristics of an IP
address.
Identify the network component that uses the IP address to send data only to its
correct destination
Router
https : protocol
Advantages
Disadvantages
(a) byte
(c) handshaking
(e) simulation
Edit
blue tooth
radio
optical
satellite
infra-red
microwave
device e.g.
Give one benefit and one disadvantage of the use of wireless technology.
Advantages
no wires
fast/high-speed wireless Internet access
WLAN is faster than a modem or mobile
WLAN for working at home one day a week/teleworkers
see internet content away on the move
create and send multimedia messages to mobiles or e-mail
picture messaging - send photos/pictures text/sound/recorded
greetings from mobiles to mobiles/PCs
instant transmission - no busy signals/no searching for phone jacks
download e-mail and file attachments on mobile
watch live webcast on mobile/hotspot
listen to streaming video on mobile/hotspot
news/weather/sport/games while on the move
access information from mobile anytime
send/receive/delete e-mail while on the move
wireless Inbox on mobile - to contacts and calendar
view business appointments while out of the office on mobile
send corporate e-mail while out of the office - even behind a firewall on
mobile
wireless internet connection from chat rooms for discussions with colleagues
while on the move
give visual demonstrations from mobile and colleagues watch back at the
office
disadvantages e.g.
WLAN speeds are slower than Net access at work/narrow band width
any one within the WLAN nodes range with an appropriate device can use
your WLAN and broad band link
any one who walks past your house or WLAN linked into a corporate system
can access sensitive information or credit card details
3G phones not compatible with 2G phones
Blue tooth - has limited range
blocked signal/distorted signal/weak signal/lag
health problems from microwaves
Give one advantage using a star network rather than a ring network.
star - if one computer goes down the others can still be used
ring - if one computer goes down the others can not be used
Explain what is meant by the two terms download speed and upload speed
download speed :
– speed at which information/data is transferred FROM server/Internet
– speed at which information/data is transferred TO the user’s computer
upload speed :
– speed at which information/data is transferred FROM user’s computer
– speed at which information/data is transferred TO the Internet/server
RFID stands for radio frequency identification. There is an RFID reader and tag.RFID is
used in contactless credit and debit cards as well as in some hotel room cards. Inside
an RFID tag is a chip that contains a small amount of memory. The chip is attached to
a coil of wire which acts as an antenna. When an RFID tag is scanned, the reader
emits radio waves which are picked up by the tag’s antenna. The power induced in
the tag’s antenna from these waves is enough to power the chip which then uses its
antenna to emit its own radio wave, which contains the information held on the chip.
This wave is picked up by the reader which decodes the information and returns the
information to a computer.
It has a payload
It has a trailer.
A workshop has a lot of heavy machinery operating throughout the day and
requires a cable to connect a workstation to a switch. Which of the following,
unshielded twisted pair (UTP) or shielded twisted pair (STP) cable, would be the
more suitable? Justify your response.
The different factors that can influence the performance of a network include:
bandwidth, network design, data collisions, and excess broadcast traffic.
The bandwidth can influence through the method of transmission and
medium used