2.1 Networks including the Internet
AS Level · 3 questions found
What this topic covers
Section titled “What this topic covers”- LAN vs WAN characteristics; purpose/benefits of networking devices
- Client-server vs peer-to-peer; thin-client vs thick-client
- Topologies: bus, star, mesh, hybrid — packet transmission and justification
- Cloud computing: public/private clouds, benefits and drawbacks
- Wired vs wireless: copper, fibre-optic, WiFi, microwave, satellite
- LAN hardware: switch, server, NIC, WNIC, WAP, bridge, repeater
- Router function; Ethernet; CSMA/CD collision detection/avoidance
- Bit streaming: real-time vs on-demand; broadband speed impact
- WWW vs internet; internet hardware: modem, PSTN, dedicated lines, cell phone network
- IP addresses: IPv4/IPv6, subnetting, public/private, static/dynamic
- URL, DNS and locating web resources
Past paper questions
Section titled “Past paper questions” Q5


5
A bank allows customers to access their accounts using an application that they can download
onto a device such as a smartphone.
(a) The system that allows customers to access their accounts using the application is a
client-server model.
Describe the roles of the different devices in this model.
............................................................................................................................................. [4]
(b) The bank wants to protect the integrity of its data while transferring the data to other banks.
Parity check is one example of data verification.
Complete the description of parity check when Computer A is transmitting data to Computer B.
Computer A and Computer B agree on whether to use ......................................................
parity. Computer A divides the data into groups of ...................................................... . The
number of 1s in each group is counted. If the agreed parity is ................................................
and the group has an even number of 1s, a parity bit of 1 is appended, otherwise a parity bit
of 0 is appended.
In a parity ...................................................... check the bytes are grouped together, for
example in a grid. The number of 1s in each column (bit position) is counted. A bit is assigned
to each column to make the column match the parity. These parity bits are transmitted with
the data as a parity ...................................................... .
[5]
(c) The bank also needs to keep its customers’ data private and secure.
(i) The bank’s network has a firewall.
Explain how a firewall can help protect the customers’ data.
..................................................................................................................................... [3]
(ii) Customers need to use biometric authentication to access their accounts.
One biometric authentication method is facial recognition.
Facial recognition uses Artificial Intelligence (AI).
Describe how AI is used in facial recognition.
..................................................................................................................................... [4]
Show mark scheme
5(a) [4 marks]
1 mark
each:
Identification of server in the bank scenario
Description e.g. Receives requests, processes the requests
Identification of client in bank scenario
Description e.g. Sends request to the server, waits and outputs the
response
each:
Identification of server in the bank scenario
Description e.g. Receives requests, processes the requests
Identification of client in bank scenario
Description e.g. Sends request to the server, waits and outputs the
response
5(b) [5 marks]
1 mark
for each correctly completed term:
odd or even
7-bits
odd
block
byte
Computer A and Computer B agree on whether to use
odd or even
parity.
Computer A divides the data into groups of
7-bits
. The number of 1s in each
group is counted. If the agreed parity is
odd
and the group has an even
number of 1s a parity bit of 1 is appended, otherwise a parity bit of 0 is
appended.
In a parity
block
check the bytes are grouped together, for example in a grid.
The number of 1s in each column (bit position) is counted. A bit is assigned to
each column to make the column match the parity. These parity bits are
transmitted with the data as a parity
byte
.
for each correctly completed term:
odd or even
7-bits
odd
block
byte
Computer A and Computer B agree on whether to use
odd or even
parity.
Computer A divides the data into groups of
7-bits
. The number of 1s in each
group is counted. If the agreed parity is
odd
and the group has an even
number of 1s a parity bit of 1 is appended, otherwise a parity bit of 0 is
appended.
In a parity
block
check the bytes are grouped together, for example in a grid.
The number of 1s in each column (bit position) is counted. A bit is assigned to
each column to make the column match the parity. These parity bits are
transmitted with the data as a parity
byte
.
5(c)(i) [3 marks]
1 mark
each to
max 3
:
Compares all incoming and outgoing transmissions
... against set criteria/whitelist/blacklist
Blocks all transmissions that do not meet rules
Blocks data entering from specific ports
Blocks unauthorised/unknown internal software transmitting data
each to
max 3
:
Compares all incoming and outgoing transmissions
... against set criteria/whitelist/blacklist
Blocks all transmissions that do not meet rules
Blocks data entering from specific ports
Blocks unauthorised/unknown internal software transmitting data
5(c)(ii) [4 marks]
1 mark
each to
max 4
:
e.g.
Captures an image of the face
Uses image recognition
Trained to identify the features of a face in an image
… using a large number of images
Analyse images for facial features
Uses the probability of a match
each to
max 4
:
e.g.
Captures an image of the face
Uses image recognition
Trained to identify the features of a face in an image
… using a large number of images
Analyse images for facial features
Uses the probability of a match
Q3


3
An assessment board scans exam papers and stores the digitised papers on a server. Exam
markers download the digitised papers to mark. The exam markers then upload the mark for each
paper.
(a) The assessment board needs to make sure the data stored on the server is secure.
(i) Authentication methods can help to protect the server against hackers.
Identify one other security measure that helps to protect the server from hackers.
Describe how the security measure works.
Security measure ..............................................................................................................
Description ........................................................................................................................
[3]
(ii) Identify one security measure that helps to protect the data when it is being transmitted
to its destination. Describe how the security measure works.
Security measure ..............................................................................................................
Description ........................................................................................................................
[3]
(b) The exam markers use software that operates as a thin-client to mark the exam papers.
Complete the table by identifying two characteristics of a thin-client.
Describe how each characteristic will be used in this software.
Thin-client characteristic
Description of use in this software
1
2
[4]
(c) Data transmitted on the internet passes through multiple different systems.
(i) Describe the role of routers in the transmission of data through the internet.
..................................................................................................................................... [2]
(ii) Describe the role of the PSTN (Public Switched Telephone Network) in the transmission
of data through the internet.
..................................................................................................................................... [2]
Show mark scheme
3(a)(i)
1 mark
for security measure
1 mark
each to
max 2
for how the chosen measure works:
Firewall
Checks
incoming
connections
... against criteria
Blocks data from entering specific ports
Blocks data that does not meet whitelist that meets blacklist
Proxy server
Prevents devices accessing the web server directly
Intercepts any requests
Forwards the request using its own IP address
Screens returning data before sending it to the user
for security measure
1 mark
each to
max 2
for how the chosen measure works:
Firewall
Checks
incoming
connections
... against criteria
Blocks data from entering specific ports
Blocks data that does not meet whitelist that meets blacklist
Proxy server
Prevents devices accessing the web server directly
Intercepts any requests
Forwards the request using its own IP address
Screens returning data before sending it to the user
3(a)(ii) [3 marks]
1 mark
for security measure
1 mark
each to
max 2
for description of the chosen measure:
Encryption
Encodes/scrambles data
... so if it is intercepted it cannot be
understood
Algorithm/key is required to decode
the data
for security measure
1 mark
each to
max 2
for description of the chosen measure:
Encryption
Encodes/scrambles data
... so if it is intercepted it cannot be
understood
Algorithm/key is required to decode
the data
3(b) [4 marks]
1 mark
for characteristic
1 mark
for description of application to examination software:
Thin-client characteristic
Description of use in this software
Data is not stored on the
Exam papers are stored on the server and
client computer
not on the examiner’s computer // exam
papers are not permanently stored on the
examiners’ computers
Client computer is reliant on
Examiners cannot mark if their device
access to server
cannot access the server / the server ‘goes
down’
The marking software will not operate
Client computer heavily
without network/internet access
reliant on network/internet
connection
Client computer requires few
Examiners can use devices with low
local resources/memory
resources and the marking software will still
function
Client computer performs
The marking software transmits requests,
minimal functions/processes
the server responds and sends the
response to the user
for characteristic
1 mark
for description of application to examination software:
Thin-client characteristic
Description of use in this software
Data is not stored on the
Exam papers are stored on the server and
client computer
not on the examiner’s computer // exam
papers are not permanently stored on the
examiners’ computers
Client computer is reliant on
Examiners cannot mark if their device
access to server
cannot access the server / the server ‘goes
down’
The marking software will not operate
Client computer heavily
without network/internet access
reliant on network/internet
connection
Client computer requires few
Examiners can use devices with low
local resources/memory
resources and the marking software will still
function
Client computer performs
The marking software transmits requests,
minimal functions/processes
the server responds and sends the
response to the user
3(c)(i) [2 marks]
1 mark
each to
max 2
:
Receives
packets
from internet
Analyses the destination IP address of each packet
Forwards the
packet
towards its destination
... using the routing table
Maintains/updates the routing table
Finds the most efficient route to the destination
each to
max 2
:
Receives
packets
from internet
Analyses the destination IP address of each packet
Forwards the
packet
towards its destination
... using the routing table
Maintains/updates the routing table
Finds the most efficient route to the destination
3(c)(ii) [1 mark]
1 mark
each to
max 2
:
The PSTN consists of many different types of communication lines
… therefore the digital data may need to be converted into a different
form/analogue signal
Data is transmitted in both directions at the same time // duplex data
transmission
Using a PSTN the communication passes through different switching
centres/ISPs
each to
max 2
:
The PSTN consists of many different types of communication lines
… therefore the digital data may need to be converted into a different
form/analogue signal
Data is transmitted in both directions at the same time // duplex data
transmission
Using a PSTN the communication passes through different switching
centres/ISPs
Q5


5
A multimedia design company has an office with a LAN (local area network). The LAN can have
up to 20 devices connected with cables and other devices connected using wireless access.
(a) The company has private cloud storage for its employees to store their work.
(i) Define the term private cloud.
..................................................................................................................................... [1]
(ii) Describe the benefits to the company of using private cloud storage instead of public
cloud storage.
..................................................................................................................................... [3]
(b) Part of the internal structure of the wired LAN is a star topology.
Explain how packets are transmitted between two devices in a star topology.
............................................................................................................................................. [2]
(c) A different part of the network uses the Ethernet protocol.
(i) A collision is detected.
Describe how the collision is managed using Carrier Sense Multiple Access/Collision
Detection (CSMA/CD).
..................................................................................................................................... [2]
(ii) Identify two drawbacks of using CSMA/CD.
1 ........................................................................................................................................
2 ........................................................................................................................................
[2]
(d) The devices in the office have static private IP addresses.
State what is meant by a static private IP address.
............................................................................................................................................. [1]
,
,
,
,
Show mark scheme
5(a)(i) [1 mark]
1 mark
for:
Dedicated/bespoke services/storage on a remote server only available to
company
for:
Dedicated/bespoke services/storage on a remote server only available to
company
5(a)(ii) [3 marks]
1 mark
each to
max 3
:
e.g.
Not reliant on a third party
… gives greater
control
over security/privacy
… gives greater
control
over backup
Storage can be tailored/scalable to company requirements// an example
e.g. the amount of storage accessible/ facilitating the sharing of files
each to
max 3
:
e.g.
Not reliant on a third party
… gives greater
control
over security/privacy
… gives greater
control
over backup
Storage can be tailored/scalable to company requirements// an example
e.g. the amount of storage accessible/ facilitating the sharing of files
5(b) [2 marks]
1 mark
each:
Sending computer transmits packets directly to switch/router/central
device
Switch/router/central device
checks destination address
of packet and
forwards directly to that device
each:
Sending computer transmits packets directly to switch/router/central
device
Switch/router/central device
checks destination address
of packet and
forwards directly to that device
5(c)(i) [2 marks]
1 mark
each to
max 2
:
Jamming signal is transmitted by the
sending device
Transmission is aborted
The
sending device
waits a
random
time before trying to send data
again ...
... if further collisions occur the wait time is increased
each to
max 2
:
Jamming signal is transmitted by the
sending device
Transmission is aborted
The
sending device
waits a
random
time before trying to send data
again ...
... if further collisions occur the wait time is increased
5(c)(ii) [1 mark]
1 mark
each to
max 2
:
Random time increased each time so can be infinite waiting
May be constant jamming signal so nothing ever sends
Certain nodes cannot be prioritised
High power consumption
Only suitable for short distance network // limited distance
Not scalable // more nodes means exponentially longer waiting times
each to
max 2
:
Random time increased each time so can be infinite waiting
May be constant jamming signal so nothing ever sends
Certain nodes cannot be prioritised
High power consumption
Only suitable for short distance network // limited distance
Not scalable // more nodes means exponentially longer waiting times
5(d)
1 mark
for:
Static means the IP for that device does not change
and
Private means it can
only be accessed/seen/used within the LAN
for:
Static means the IP for that device does not change
and
Private means it can
only be accessed/seen/used within the LAN