Professional Documents
Culture Documents
Networks
Networks
Table of Contents
Old Syllabus (2006):..................................................................................................................................1
Old Syllabus Questions and MS (2006-2013):............................................................................................2
New Syllabus (2014-)................................................................................................................................9
New Syllabus Questions (2014-)..............................................................................................................11
3.4.1 Define local area network (LAN), wide area network (WAN), server and client.
3.4.2 Explain basic network topologies.
Students must be able to explain and illustrate star and bus networks as well as hybrids involving
both these networks.
3.4.3 Explain the hardware required in networking.
Hardware should include communications links (cables, microwave, fibre optics and so on) hub,
switch, node and router.
3.4.4 Define the terms “standard protocol”, “data integrity” and “data security” in the context of data
transmission across a network.
Students must know that standard protocols are a set of rules that are internationally recognized in
the transmission of data. The difference between data security and data integrity must also be
recognized. Students do not need to know specific or technical details such as the ISO (OSI) system
of layers, TCP/IP and so on.
3.4.5 Explain the software involved in networking.
Students must understand the role of communications software in connecting local and wide area
networks and the need to deal with protocols and data security.
3.4.6 Describe suitable methods to ensure data integrity in the transmission of data.
Error-checking codes such as check sums (block character checks) and parity checks must be
understood. The reasons for retransmission should be understood. The quality of communication
lines should be considered.
3.4.7 Describe suitable methods to ensure data security
6.4.1 Outline the role of the computers used in the separate type of networks: WAN, LAN and the Internet.
The roles of providers, servers and clients should be understood for each of these networks. Students
should be able to select the appropriate type of network for a given situation. They must understand
the role of gateways.
6.4.2 Describe the features of communications needed for networking.
Ethernet, public and private telephone lines, ISDN, ADSL, fibre optic and wireless methods should
all be familiar and students should be able to select the most suitable method of communication in a
given situation, and to state the advantages of each method. Technical details will not be required.
6.4.3 Describe packet switching.
Students need to be aware that when a message is dissembled into packets, the packets may take
different paths and pass through different nodes to arrive at the same destination, and that packets
can be discarded. Virtual circuits are not required.
Aryan Bhasin
Old Syllabus Questions and MS (2006-2013):
Outline two precautions that a mobile device user can take to prevent their data from being compromised if they lose
their mobile device.
Do not store sensitive data on the smartphone;So that it is not there to be found if the device is lost;
Do not store username/password account logins (or “remember me” cookies) on the device;So somebody finding the
device will not be able to access your accounts;
Compare the use of Ethernet with Bluetooth for data communication in smartphones
Bluetooth is much slower than Ethernet;Ethernet requires a physical connection, Bluetooth does not;Ethernet is
more secure than Bluetooth;An Ethernet network requires additional hardware (routers, hubs, etc). Bluetooth does
not;
Many mobile phones now have GPS integrated into them so that the user’s location can be sent to data services.
(e) Discuss the advantages and disadvantages of letting a mobile device transmit the user’s location.
Advantages:
Emergency services can locate a distress call;Friends can see where you are and meet you;Advertisements could be
tailored for things that are near you;
Disadvantages:
Illegal surveillance is possible;Advertisers could profile your physical habits as well as your online;Loss of location
information (eg in a tunnel) could create erroneous data in systems;
Outline one way in which this use can harm the health of mobile phone users.
By being too engaging;Causing the user to not pay attention to the real world;
By taking up too much of the users’ time; Causing them to exercise or socialize less;
The IP routing/handling hardware and software design is standard; So designs can be re-used thereby reducing unit
Aryan Bhasin
costs;
The “translation” between the cellular and Internet protocols is no longer needed;Which makes the network faster,
overall;
[4 marks]
Discuss the effects that the widespread ownership of smartphones is having on students.
Positive:
1. Contact teachers with queries
2. Research topics
3. Replace expensive textbooks
4. Make study schedules
5. Store PowerPoint presentations
Negative:
• Become a distraction in class
• Reliance on smartphones as knowledge source
• Plagiarism issues
• Cheating in exams
Aryan Bhasin
Define the terms client and server in terms of a computer networ
10. (a)
use of passwords;different permissions for different users; any example of physical security;etc.
Explain one advantage of a star network topology over a bus network topology.
Outline one key task a packet switched network protocol must be able to achieve
Aryan Bhasin
State two basic network topologies.
In relation to computer networks, (a) define the meaning of the term wide area network (WAN). [2
marks] (b) explain one advantage of using packet switching in a WAN.
7. Describe how a check sum could ensure data integrity in the transmission of data
Aryan Bhasin
7. Explain two ways of reducing the time required to transmit data in a computer network.
Aryan Bhasin
13. Identify three pieces of information that a data packet must contain.
Aryan Bhasin
11. State two resources that could be shared on a LAN. [2 marks]
Aryan Bhasin
Database/data files;
Software;
Backing storage devices;
Output devices / printer; etc.
12. State two possible communication links that could be used to connect the LAN to a WAN.
Fibre optic cable;
Digital line/ISDN line/ADSL;
Satellite link;
Outline one advantage and one disadvantage to protest groups of communicating by social networks.
Aryan Bhasin
5. A school network is connected to the Internet.
(a) Outline one threat to the security of the school’s data that may arise from the use of the Internet.
[2 marks]
Aryan Bhasin
(b) Outline two implications of a school administrator being able to monitorstudents’ use of the
Internet. [4 marks]
Aryan Bhasin
New Syllabus (2014-)
Network fundamentals
3.1.1 Identify different types of networks. 2 Examples include local area network
(LAN), virtual local area network
(VLAN), wide area network (WAN),
storage area network (SAN),
wireless local area network
(WLAN), internet, extranet, virtual
private network (VPN), personal
area network (PAN), peer-to-peer
(P2P).
Aryan Bhasin
S/E, INT Globalization has been
accelerated by the technical advances
linked to network development.
Data transmission
Explain why compression of data is often S/E, INT Compression has enabled
3.1.9 necessary when transmitting across a 3 information to be disseminated more
network. rapidly.
Wireless networking
Aryan Bhasin
Describe the hardware and software
3.1.13 2
components of a wireless network.
Aryan Bhasin
9. (a) Define the term protocol. [1]
(b) Outline why protocols are necessary. [2]
Aryan Bhasin
Aryan Bhasin
3. Outline one example of the use of a virtual private network (VPN). [3]
Aryan Bhasin
2. By making direct reference to the technologies used, explain how a virtual private network (VPN)
allows a travelling salesperson to connect securely to their company’s network. [4]
Aryan Bhasin
8. Explain, in terms of resources, how Voice over IP provides a collaborative working environment for
a company with multiple locations nationwide.
Aryan Bhasin
Aryan Bhasin
Aryan Bhasin
3. Outline one advantage and one disadvantage of wireless networks. [4]
Aryan Bhasin
5. Many different people and organizations upload scientific materials to the internet. A student uses
data from the internet in a science project. Outline two ethical issues concerning this use of the
internet. [4]
Aryan Bhasin
Aryan Bhasin