Computer Networks
Computer Networks
Name:
_
Fundamentals of computer
networks _______________________
Class:
_
_______________________
Date:
_
Time: 97 minutes
Marks: 91 marks
Comments:
Page 1 of 28
Q1.
Most schools have a computer network.
Some schools allow teachers to access the school network from their home computers.
Give one reason why some schools allow this and one reason why some schools do not
allow this.
_______________________________________________________________________
_______________________________________________________________________
(Total 2 marks)
Q2.
State three advantages of using a computer network.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 3 marks)
Q3.
PANs and LANs are two different types of network.
___________________________________________________________________
___________________________________________________________________
(1)
___________________________________________________________________
___________________________________________________________________
(1)
(Total 2 marks)
Q4.
Page 2 of 28
When two computers on a network communicate with each other they need to use the
same protocol.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 2 marks)
Q5.
For questions (a) to (c) shade one lozenge to indicate the most suitable protocol to use in
the situation described.
A HTTP
B HTTPS
C FTP
D SMTP
E IMAP
(1)
(b) Used to make a payment securely when purchasing goods from a website.
A HTTP
B HTTPS
C FTP
D SMTP
E IMAP
(1)
A HTTP
B HTTPS
C FTP
Page 3 of 28
D SMTP
E IMAP
(1)
(Total 3 marks)
Q6.
TCP/IP is a protocol used in networking. There are 4 layers in the TCP/IP stack.
Complete the table by placing the four layers of the TCP/IP stack into order (1-4) where 1
is the top layer and 4 is the bottom layer.
Transport
Link
Internet
Application
(Total 3 marks)
Q7.
A games café is evaluating the security for their network.
(a) State two reasons why using a biometric authentication measure is better than
password authentication for staff accounts.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(2)
(b) Explain why it would not be appropriate for the café to use MAC address filtering on
their wireless network.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
Page 4 of 28
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(2)
(Total 4 marks)
Q8.
Explain two differences between a LAN and a WAN.
Difference 1: ____________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
Difference 2: ____________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 4 marks)
Q9.
HTTP and HTTPS are two application layer protocols.
_______________________________________________________________________
_______________________________________________________________________
(Total 1 mark)
Q10.
The application layer and the network (internet) layer are two of the layers within the
TCP/IP stack.
What are the names of the other two TCP/IP stack layers?
1. _____________________________________________________________________
_______________________________________________________________________
Page 5 of 28
2. _____________________________________________________________________
_______________________________________________________________________
(Total 2 marks)
Q11.
What is the purpose of the network (internet) layer within the TCP/IP stack?
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 2 marks)
Q12.
Explain how MAC address filtering works.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 2 marks)
Q13.
List three different measures that can be used to maintain the security of a computer
system.
Q14.
Some schools allow teachers to access the school network from their home computers.
Give one reason why some schools allow this and one reason why some schools do not
allow this.
_______________________________________________________________________
Reason against:_________________________________________________________
Page 6 of 28
_______________________________________________________________________
(Total 2 marks)
Q15.
_______________________________________________________________________
_______________________________________________________________________
(Total 1 mark)
Q16.
_______________________________________________________________________
_______________________________________________________________________
(Total 1 mark)
Q17.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 6 marks)
Q18.
When two computers on a network communicate with each other they need to use the
Page 7 of 28
same protocol.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 2 marks)
Q19.
Shade one lozenge to indicate the most suitable protocol to use in the situation described.
A HTTP
B HTTPS
C FTP
D SMTP
E IMAP
(1)
(b) Used to make a payment securely when purchasing goods from a website.
A HTTP
B HTTPS
C FTP
D SMTP
E IMAP
(1)
A HTTP
B HTTPS
C FTP
D SMTP
E IMAP
Page 8 of 28
(1)
(Total 3 marks)
Q20.
TCP / IP is a protocol stack used in networking. There are four layers in the TCP / IP
stack.
Complete the table by placing the four layers of the TCP / IP stack into order (1 – 4),
where 1 is the top layer and 4 is the bottom layer).
Link
Internet
Application
(Total 3 marks)
Q21.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 2 marks)
Q22.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 3 marks)
Page 9 of 28
Q23.
One disadvantage of using a computer network is that there are increased security risks.
Describe three other disadvantages of using a computer network.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 3 marks)
Q24.
Barnes Pest Control is a small business with four employees. Each of their employees
has a standalone desktop computer. They have decided to use a network instead of
standalone machines.
Two security measures that Barnes Pest Control could use are authentication and
encryption. Explain each of these security measures and how Barnes Pest Control could
use them.
Authentication:___________________________________________________________
_______________________________________________________________________
Encryption:______________________________________________________________
_______________________________________________________________________
(Total 4 marks)
Q25.
Page 10 of 28
(Total 3 marks)
Q26.
Barnes Pest Control is a small business with four employees. Each of their employees
has a standalone desktop computer. They have decided to use a network instead of
standalone machines.
Barnes Pest Control decides to use a star network topology. State two reasons why this
topology may not be the most suitable choice.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 2 marks)
Q27.
The application layer and the internet layer are two of the layers in the four-layer TCP / IP
model. Describe the roles of each of the four layers in the TCP / IP model. In your answer
you should also state the names of the other two layers of the TCP / IP model.
_______________________________________________________________________
_______________________________________________________________________
Page 11 of 28
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 6 marks)
Q28.
The diagram below shows a client–server network. The clients are connected to a switch.
___________________________________________________________________
___________________________________________________________________
(1)
1. _________________________________________________________________
___________________________________________________________________
2. _________________________________________________________________
___________________________________________________________________
(2)
(Total 3 marks)
Page 12 of 28
Q29.
Discuss the advantages and disadvantages of connecting a computer to a network.
In this question you will be marked on your ability to use good English, to organise
information clearly and to use specialist vocabulary where appropriate.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 6 marks)
Q30.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 2 marks)
Page 13 of 28
Mark schemes
Q1.
All marks AO1 (understanding)
Q2.
All marks AO1 (understanding)
Max 3 marks
[3]
Q3.
(a) 1 mark for AO1 (understanding)
PANs are centred around one person, LANs cover a limited
geographical area / LANs cover a larger area;
PANs have one user, LANs (normally) have more than one
user;
PAN uses Bluetooth, LAN uses alternative protocols /
connection methods (A. by example);
Page 14 of 28
Note: answer must cover both PAN and LAN to be awarded
a mark
Max 1
1
Max 1
1
[2]
Q4.
All marks AO1 (recall)
a set of rules;
that allow two devices to communicate;
[2]
Q5.
(a) Mark is for AO1 (recall)
E IMAP;
B HTTPS;
D SMTP;
Q6.
All marks AO1 (recall)
Layer Order (1 – 4)
Transport 2
Page 15 of 28
Link 4
Network 3
Application 1
Mark as follows:
1 mark: any row correct;
2 marks: any two rows correct;
3 marks: all four rows correct;
[3]
Q7.
(a) All marks AO2 (apply)
Max 2
2
Q8.
4 marks for AO1 (understanding)
Example answers
• A WAN is a Wide Area Network that links more than one remote geographical
site / location to another;
• A LAN is a Local Area Network that links together devices that are within one
site \ location;
• The speed of data transmission across a LAN is likely to be higher than across
a WAN;
• WANs are typically public networks (and so data encryption is likely to be
used);
• LANs (may not need data encryption) as they are typically private;
• LANs typically carry less traffic than WANs;
• This is because the number of users on a LAN can be controlled by the
administrator whereas public WANs could have an unlimited number of users;
• LAN Connections are generally more reliable as they are under the control
and maintenance of the network administrators;
• On a WAN it is possible that heavy traffic, peak usage times, viruses, weather
or physical damage could affect the connection reliability;
Page 16 of 28
• WANs are typically under shared ownership;
• LANs are typically owned by a single person or organisation;
• LANs use different protocol suites (accept protocols) to WANs;
Q9.
Mark is for AO1 (understand)
Q10.
2 marks for AO1 (recall)
• Transport (layer);
• Data Link (layer);
• Link (layer);
• Network Interface / access (layer)
Q11.
2 marks for AO1 (understanding)
Max 2 marks:
Q12.
2 marks for AO1 (understanding)
Page 17 of 28
• Each device connected to the network has a (unique) reference ID / physical /
physical address (called the MAC Address);
• There is a list of allowed / denied addresses;
• The network device / router looks at the address of the device trying to
connect (and blocks / allows appropriately);
[2]
Q13.
9 marks for AO1 (knowledge and understanding)
The table below lists common examples but is not exhaustive; alternative valid responses
should also be credited.
Firewall Outline:
Analyses/scans network traffic
Can block traffic from suspicious hosts/
computers/addresses/ports
Effective against:
Hackers
Transmission of malware
Encryption Outline:
Data is stored/transmitted as ciphertext (A. in coded
form)
Only people who know the encryption method/key can
Page 18 of 28
decrypt/read the data
Effective against:
Data theft
Prevention of Outline:
use external Ports on a computer are disabled
storage Storage devices connected to them cannot be
devices / USB accessed // flash drives cannot be used
ports Effective against:
Putting malware onto a computer
Theft of data
CAPTCHA Outline:
Users have to type in some distorted text // recognise
images for a set of images
Humans can do this but it is a difficult task for computer
programs / bots
Effective against:
Automated hacking programs
Bots
Automatic Outline:
software Operating system / software configured to download
updates updates from the internet
Hackers look for security vulnerabilities in software
Updates can patch security vulnerabilities
Effective against:
Hackers
Malware
[9]
Q14.
Page 19 of 28
To try to help teachers have a work-life balance;
Increased security risks as teachers may not have fully-protected computers at
home (eg if a teacher does not have anti-virus software on their home computer this
may cause problems when they connect their computer to the school network);
Q15.
Note: answer must cover both PAN and LAN to be awarded a mark
Max 1
[1]
Q16.
Max 1
[1]
Q17.
Page 20 of 28
and consideration (one or two reasons) of why schools should use a wired network
(or why they should use a wireless network). Most of the reasons given will be
clearly relevant to the context of networks in a school environment rather than being
more general discussion points about the two types of network.
Alternatively, a statement of one or two reasons why schools either should or should
not use a wired network has been included. The reasons given may not be strongly
linked to a school environment.
0 marks:
No creditworthy answer
Q18.
Q19.
1 mark: E IMAP;
Page 21 of 28
1
1 mark: B HTTPS;
1 mark: D SMTP;
Q20.
Link 4
Internet 3
Application 1
Mark as follows:
1 mark: any row correct;
1 mark: any two rows correct;
1 mark: all four rows correct;
[3]
Q21.
Q22.
Share hardware;
Share data / files;
Improved communication tools;
Improved monitoring of users;
Centralised back-up;
Page 22 of 28
Max 3 marks
[3]
Q23.
Reliance on server;
Network can slow down (when traffic is heavy);
Cabling / additional hardware / installation costs;
May have additional costs due to need to employ a network manager;
Max 3 marks
[3]
Q24.
1 mark for AO1: Authentication is ensuring that a user is who they are claiming to
be;
1 mark for AO2:The business could give each employee their own username and
password // the business could use a biometric system, e.g. fingerprints, to check
which employee is logging in / to ensure that only employees can log in;
1 mark for AO1: Encryption is changing data so that it cannot be read (except by
authorised users / those with the decryption key);
1 mark for AO2: The business could use encryption to prevent unauthorised people
from reading sensitive data; A. example of sensitive data eg personnel records
[4]
Q25.
Mark as follows:
Diagram has a main cable; I. bidirectional arrow instead of line R. unidirectional
arrow
Network contains exactly four computers and each computer is not connected to
any other computers (except via the main cable);
Page 23 of 28
I. missing terminators at ends of main cable
Example answer
This diagram worth 2 marks as there is a main cable and there are four computers
not connected to any other computers (except via the main cable). However, it does
not get the mark for connecting the computers to the main cable as the computers
have not been given connections to the main cable.
[3]
Q26.
A. As there are only a small number of workstations there is little (A. no) difference
in network speed between the bus and star networks;
Max 2
[2]
Q27.
Two marks for AO1 (recall) and four marks for AO1 (understanding)
0 marks:
No creditworthy answer
Page 24 of 28
Guidance – Indicative Response for AO1 (understanding)
Application layer is where network applications operate;
Transport layer sets up the communication between the two hosts;
Transport layer splits the data into packets;
Internet layer adds (IP) addresses to the packets;
Internet layer routes the packets across the network;
Link layer is where network hardware operates (eg network interface card);
Link layer is where operating device drivers operate;
Note: there is significantly more detail that can be written about the roles of
the layers that is beyond the scope of the syllabus. Responses that contain
some of this detail would also obtain credit though the additional detail has
not been included on this mark scheme.
Q28.
(a) Star;
A. Switched Ethernet
1
It allows each client to use full transmission over the network // no data
collisions;
Easy to connect new devices;
The failure of one client will not affect the others;
Packets are only sent to intended device;
Improved performance; (compared to non-switched networks)
2
[3]
Q29.
No creditworthy material
0 marks
Quality of written communication: The candidate has used a form and style of writing
which has many deficiencies. Ideas are not often clearly expressed. Sentences and
paragraphs are often not well-connected or at times bullet points may have been used.
Specialist vocabulary has been used inappropriately or not at all. Much of the text is
legible and some of the meaning is clear. There are many errors of spelling, punctuation
and grammar but it should still be possible to understand much of the response.
1–2 marks
Page 25 of 28
Quality of written communication: The candidate has mostly used a form and style of
writing appropriate to purpose and has expressed some complex ideas reasonably clearly
and fluently. The candidate has usually used well linked sentences and paragraphs.
Specialist vocabulary has been used on a number of occasions but not always
appropriately. Text is legible and most of the meaning is clear. There are occasional errors
of spelling, punctuation and grammar.
3–4 marks
Quality of written communication: The candidate has selected and used a form and style
of writing appropriate to purpose and has expressed complex ideas clearly and fluently.
Sentences and paragraphs follow on from one another clearly and coherently. Specialist
vocabulary has been used appropriately throughout. Text is legible and the meaning is
clear. There are few if any errors of spelling, punctuation and grammar.
5–6 marks
Q30.
Page 26 of 28
Examiner reports
Q8.
This question was about networks, network protocols, network models and network
security.
Although most students could give one or two differences between LANs and
WANs, most could not describe the differences. A common answer was that LANs
are smaller and WANs are larger. Without giving a geographical context, or
example, this could not be awarded marks. Better students compared speed of
transmission across the network or referred to typical ownership of LANs and
WANs. Another common incorrect answer was that WANs are wireless (maybe
mistaking them for WLANs), whereas LANs are wired.
Q10.
This question was about networks, network protocols, network models and network
security.
More than ten percent of students did not attempt to answer this question about
TCP/IP stack layers.
Q11.
This question was about networks, network protocols, network models and network
security.
More than ten percent of students did not attempt to answer this question. Of those
who answered this question about the network layer, less than half could describe
its purpose. Many students answered that its purpose was to access the internet.
Q12.
This question was about networks, network protocols, network models and network
security.
A high percentage of students did not attempt to answer the this about MAC address
filtering. A large proportion of those who did answer knew that a MAC address is
unique but could not explain how it was used as a device filter.
Q28.
Two thirds of candidates could correctly identify the star network shown in question (a)
however only a quarter of candidates could state two advantages of this topology
(although two thirds could identify at least one advantage).
Q29.
Few candidates achieved full marks in this extended answer question (5%) but over
half received three or more marks. The question stem asked for a discussion on the
advantages and disadvantages and we refer to the mark scheme to see how
answers fall into the three mark ranges. Many candidates were obviously well-
Page 27 of 28
prepared on network topologies and gave lengthy answers on the comparative
merits of ring, bus and star topologies but this was not what the question was
asking. This points to a need for candidates to practice exam technique more
deeply.
Q30.
Page 28 of 28