1.
Difference 1 _____________________________________________________________
_______________________________________________________________________
Difference 2 _____________________________________________________________
_______________________________________________________________________
(Total 2 marks)
Shade two lozenges to show which statements are true about LANs.
2.
A LANs always use the Ethernet protocol.
(Total 2 marks)
_______________________________________________________________________
Difference 2 _____________________________________________________________
_______________________________________________________________________
(Total 2 marks)
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 2 marks)
1. _____________________________________________________________________
_______________________________________________________________________
2. _____________________________________________________________________
_______________________________________________________________________
(Total 2 marks)
_______________________________________________________________________
_______________________________________________________________________
(Total 1 mark)
1 _____________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
2 _____________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 2 marks)
1 _____________________________________________________________________
_______________________________________________________________________
2 _____________________________________________________________________
_______________________________________________________________________
3 _____________________________________________________________________
_______________________________________________________________________
(Total 3 marks)
A FTP
B HTTP
C SMTP
D UDP
(Total 1 mark)
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 2 marks)
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 2 marks)
Explain how a firewall can be used to improve the security of a computer network.
12.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 2 marks)
Authentication and MAC address filtering can be used to improve network security.
13.
Explain how one of these security methods works.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 2 marks)
(Total 2 marks)
Explain one data privacy concern an organisation would need to consider when setting up a
15. wireless network.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 2 marks)
The table below shows three layers of the TCP/IP model and some protocols that operate at
16. each of these layers.
Layer Protocol
HTTP
HTTPS
Application layer SMTP
IMAP
FTP
TCP
Transport layer
UDP
Internet layer IP
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 9 marks)
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 2 marks)
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 9 marks)
HTTP
UDP
IP
IMAP
(Total 4 marks)
Draw a simple diagram to show a star network topology containing four desktop computers.
20.
(Total 2 marks)
Draw a simple diagram to show a bus network topology containing four desktop computers.
21.
(Total 2 marks)
_______________________________________________________________________
2______________________________________________________________________
_______________________________________________________________________
(Total 2 marks)
Dubai College Page 8 of 33
State one disadvantage of using a star topology instead of a bus topology.
23.
_______________________________________________________________________
_______________________________________________________________________
(Total 1 mark)
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 2 marks)
A FTP
B HTTP
C IMAP
D SMTP
E TCP
F UDP
(Total 2 marks)
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 2 marks)
A Application layer
B Transport layer
C Internet layer
D Link layer
Description Letter
(Total 2 marks)
Give one reason why some schools allow this and one reason why some schools do not allow
this.
_______________________________________________________________________
_______________________________________________________________________
(Total 2 marks)
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 3 marks)
___________________________________________________________________
___________________________________________________________________
(1)
___________________________________________________________________
___________________________________________________________________
(1)
(Total 2 marks)
When two computers on a network communicate with each other they need to use the same
32. protocol.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 2 marks)
A HTTP
B HTTPS
C FTP
D SMTP
E IMAP
(1)
(b) Used to make a payment securely when purchasing goods from a website.
A HTTP
B HTTPS
C FTP
D SMTP
E IMAP
(1)
A HTTP
B HTTPS
C FTP
D SMTP
E IMAP
(1)
(Total 3 marks)
Transport
Link
Internet
Application
(Total 3 marks)
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(2)
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
(2)
(Total 4 marks)
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
Difference 2: ____________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 4 marks)
_______________________________________________________________________
_______________________________________________________________________
(Total 1 mark)
What are the names of the other two TCP/IP stack layers?
1. _____________________________________________________________________
_______________________________________________________________________
2. _____________________________________________________________________
_______________________________________________________________________
(Total 2 marks)
What is the purpose of the network (internet) layer within the TCP/IP stack?
39.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 2 marks)
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
(Total 2 marks)
• PAN centred round a person / up to 10 metres, WAN is (spread) over a large area; NE
personal on its own
• PAN and WAN use different protocols ( A. examples);
• PAN (typically) has one user, WAN has many users;
• PAN connects a few devices, WAN connects many devices;
• PAN owned by one person; WAN owned / managed by multiple large organisations;
• A bus network has all computers connected to a backbone / main cable, computers on a
star network connect to a central device / switch / hub;
• All devices / computers on a bus network see all data transmitted, on a (switched) star
network the data is only seen by the intended device;
• If the backbone / main cable on a bus network fails the whole network fails, on a star
network a single cable breaking is unlikely to affect the whole network;
• Bus backbone / main cable has a terminator at each end, network cards in star act as
terminators;
• Data collisions are less frequent on a star network;
[2]
• Internet (layer);
• Link (layer) // Network interface (layer) // Network access (layer);
• Bluetooth;
• Near-field Communication/NFC;
• IrDA/Infrared;
• Zigbee;
• Wireless USB;
• Ultra-wideband/UWB;
[1]
• LANs cover relatively small geographical areas // WANs usually cover a wide
geographic area;
• LANs often owned and controlled/managed by a single person/organisation //
WANs often under collective/distributed ownership;
• WANs are (usually) several LANs connected together;
• WANs (usually) have a much larger number of devices/users than LANs;
• LAN has a lower latency // WAN has higher latency;
• WANs are (usually) slower than LANs;
• the cost-per-byte for transmission is much higher on a WAN;
• LANs and WANs use different protocols;
[2]
Authentication:
2 There is some description of the role of one named protocol in each 4-6
layer.
Some correct technical language is used though there may be
errors.
1 Statements are made about the role of one named protocol in each 1-3
layer.
Little or no technical language is used or is used incorrectly.
0 No creditworthy material 0
Guidance to examiners
HTTPS is an extension of HTTP and allows secure transfer of data between a browser and
a website by encrypting data. The web browser will check the website server’s security
certificate and ensure it is legitimate. This means it’s not possible to see or eavesdrop on
what you’re browsing or for your data to be stolen.
HTTPS allows secure transfer of data between a browser and a website by encrypting the
data being transferred to stop your data being stolen. It does this by checking a security
certificate to see if the website is legitimate.
In HTTPS the S stands for secure and stops your data being stolen on a website. It
encrypts your data.
FTP Allows secure transfer of files between client and server. Files are
uploaded to and downloaded from the server using FTP.
[9]
• a collection/group of computers;
• connected/joined together;
Responses at the upper end of the level will contain descriptions of the
advantages and/or disadvantages of wired and/or wireless networks.
The security of at least one type of network is described. The
1 response makes some sense when read as a whole. 1-3
Responses at the lower end of the level will include a few statements
related to one or more of the required points. The response might be
disjointed and without any cohesion.
No creditworthy material. 0
[9]
HTTP ✓
UDP ✓
IP ✓
IMAP ✓
[2]
2 marks for all three points, 1 mark for one or two of the three points.
• Less likely to experience transmission errors / data traffic problems (contention issues);
• Faster transmission of data;
• A faulty connection only disables one computer (unless it’s the hub / switch);
• Fewer / no collisions (if a switch is used rather than a hub);
• Better security (potentially as data is not broadcast to all machines if a switch is used);
Sample guidance
Benefits:
Risks:
• Security of data – requires correct settings or anyone can see restricted data
• Spreading of malware
• Cost of infrastructure
• Cost of network admin required to run network
• Dependency on network hardware
[9]
If more than two lozenges shaded then marks are not awarded.
[2]
• It prevents unauthorised access into the network (by checking IP / MAC address / packet
content);
• It prevents unauthorised transmissions from inside the network to external locations;
• It monitors network traffic;
• It makes sure that only the right / authorised traffic is allowed;
• It opens / closes ports as necessary
Definition Letter
R. Duplicate answers.
[2]
Max 3 marks
[3]
Note: answer must cover both PAN and LAN to be awarded a mark
Max 1
1
Max 1
1
[2]
B HTTPS;
D SMTP;
Transport 2
Link 4
Network 3
Application 1
Max 2
2
Example answers
• A WAN is a Wide Area Network that links more than one remote geographical site /
location to another;
• A LAN is a Local Area Network that links together devices that are within one site \
location;
• The speed of data transmission across a LAN is likely to be higher than across a
WAN;
• WANs are typically public networks (and so data encryption is likely to be used);
• LANs (may not need data encryption) as they are typically private;
• LANs typically carry less traffic than WANs;
• This is because the number of users on a LAN can be controlled by the administrator
whereas public WANs could have an unlimited number of users;
• LAN Connections are generally more reliable as they are under the control and
maintenance of the network administrators;
• On a WAN it is possible that heavy traffic, peak usage times, viruses, weather or
physical damage could affect the connection reliability;
• WANs are typically under shared ownership;
• LANs are typically owned by a single person or organisation;
• LANs use different protocol suites (accept protocols) to WANs;
• Transport (layer);
• Data Link (layer);
• Link (layer);
• Network Interface / access (layer)