You are on page 1of 24

Networks

Table of Contents
Old Syllabus (2006):..................................................................................................................................1
Old Syllabus Questions and MS (2006-2013):............................................................................................2
New Syllabus (2014-)................................................................................................................................9
New Syllabus Questions (2014-)..............................................................................................................11

Old Syllabus (2006):

3.4.1 Define local area network (LAN), wide area network (WAN), server and client.
3.4.2 Explain basic network topologies.
 Students must be able to explain and illustrate star and bus networks as well as hybrids involving
both these networks.
3.4.3 Explain the hardware required in networking.
 Hardware should include communications links (cables, microwave, fibre optics and so on) hub,
switch, node and router.
3.4.4 Define the terms “standard protocol”, “data integrity” and “data security” in the context of data
transmission across a network.
 Students must know that standard protocols are a set of rules that are internationally recognized in
the transmission of data. The difference between data security and data integrity must also be
recognized. Students do not need to know specific or technical details such as the ISO (OSI) system
of layers, TCP/IP and so on.
3.4.5 Explain the software involved in networking.
 Students must understand the role of communications software in connecting local and wide area
networks and the need to deal with protocols and data security.
3.4.6 Describe suitable methods to ensure data integrity in the transmission of data.
 Error-checking codes such as check sums (block character checks) and parity checks must be
understood. The reasons for retransmission should be understood. The quality of communication
lines should be considered.
3.4.7 Describe suitable methods to ensure data security
6.4.1 Outline the role of the computers used in the separate type of networks: WAN, LAN and the Internet.
 The roles of providers, servers and clients should be understood for each of these networks. Students
should be able to select the appropriate type of network for a given situation. They must understand
the role of gateways.
6.4.2 Describe the features of communications needed for networking.
 Ethernet, public and private telephone lines, ISDN, ADSL, fibre optic and wireless methods should
all be familiar and students should be able to select the most suitable method of communication in a
given situation, and to state the advantages of each method. Technical details will not be required.
6.4.3 Describe packet switching.
 Students need to be aware that when a message is dissembled into packets, the packets may take
different paths and pass through different nodes to arrive at the same destination, and that packets
can be discarded. Virtual circuits are not required.

Aryan Bhasin
Old Syllabus Questions and MS (2006-2013):

Outline two precautions that a mobile device user can take to prevent their data from being compromised if they lose
their mobile device.

Assign a password to the device;So it cannot be accessed by an unauthorized user;

Do not store sensitive data on the smartphone;So that it is not there to be found if the device is lost;

Do not store username/password account logins (or “remember me” cookies) on the device;So somebody finding the
device will not be able to access your accounts;

Compare the use of Ethernet with Bluetooth for data communication in smartphones

Bluetooth is much slower than Ethernet;Ethernet requires a physical connection, Bluetooth does not;Ethernet is
more secure than Bluetooth;An Ethernet network requires additional hardware (routers, hubs, etc). Bluetooth does
not;

Many mobile phones now have GPS integrated into them so that the user’s location can be sent to data services.

(e)  Discuss the advantages and disadvantages of letting a mobile device transmit the user’s location.

Advantages:

Emergency services can locate a distress call;Friends can see where you are and meet you;Advertisements could be
tailored for things that are near you;

Disadvantages:

Illegal surveillance is possible;Advertisers could profile your physical habits as well as your online;Loss of location
information (eg in a tunnel) could create erroneous data in systems;

Outline one way in which this use can harm the health of mobile phone users.

By being too engaging;Causing the user to not pay attention to the real world;

By taking up too much of the users’ time; Causing them to exercise or socialize less;

Explain two consequences of the change of protocols for 4G phones.

Seamless integration with internet service; Allows more effective communication;

The IP routing/handling hardware and software design is standard; So designs can be re-used thereby reducing unit

Aryan Bhasin
costs;

The “translation” between the cellular and Internet protocols is no longer needed;Which makes the network faster,
overall;

[4 marks]

Discuss the effects that the widespread ownership of smartphones is having on students.

Positive:
1. Contact teachers with queries
2. Research topics
3. Replace expensive textbooks
4. Make study schedules
5. Store PowerPoint presentations
Negative:
• Become a distraction in class
• Reliance on smartphones as knowledge source
• Plagiarism issues
• Cheating in exams

Aryan Bhasin
Define the terms client and server in terms of a computer networ

State two functions included in a network data communications protocol.

10. (a)

use of passwords;different permissions for different users; any example of physical security;etc.

(b) fire wall; encryption;

Explain one advantage of a star network topology over a bus network topology.

Outline one key task a packet switched network protocol must be able to achieve
Aryan Bhasin
State two basic network topologies.

Star; Bus; Ring;

Outline the need for a protocol in data transmission across a network.

To establish standard method/agreed way;

For transferring data between devices;

In relation to computer networks, (a) define the meaning of the term wide area network (WAN). [2
marks] (b) explain one advantage of using packet switching in a WAN.

3. Outline three characteristics of a communications network. [3 points]

7. Describe how a check sum could ensure data integrity in the transmission of data

Aryan Bhasin
7. Explain two ways of reducing the time required to transmit data in a computer network.

11. Outline the role of a gateway in a Wide Area Network.

Aryan Bhasin
13. Identify three pieces of information that a data packet  must contain.

Aryan Bhasin
11. State two resources that could be shared on a LAN. [2 marks]

Aryan Bhasin
Database/data files;
Software;
Backing storage devices;
Output devices / printer; etc.

12. State two possible communication links that could be used to connect the LAN to a WAN.
Fibre optic cable;
Digital line/ISDN line/ADSL;
Satellite link;

Outline one advantage and one disadvantage to protest groups of communicating by social networks.

Aryan Bhasin
5. A school network is connected to the Internet.
(a) Outline one threat to the security of the school’s data that may arise from the use of the Internet.
[2 marks]

Aryan Bhasin
(b) Outline two implications of a school administrator being able to monitorstudents’ use of the
Internet. [4 marks]

Aryan Bhasin
New Syllabus (2014-)

Network fundamentals

3.1.1 Identify different types of networks. 2 Examples include local area network
(LAN), virtual local area network
(VLAN), wide area network (WAN),
storage area network (SAN),
wireless local area network
(WLAN), internet, extranet, virtual
private network (VPN), personal
area network (PAN), peer-to-peer
(P2P).

Aryan Bhasin
S/E, INT Globalization has been
accelerated by the technical advances
linked to network development.

INT Standards enable compatibility


Outline the importance of standards in
3.1.2 2 through a common “language”
the construction of networks.
internationally.

Awareness of the OSI sevenlayer


Describe how communication over
model is required, but an
3.1.3 networks is broken down into different 2
understanding of the functioning of
layers.
each layer is not.

Identify the technologies required to


3.1.4 2
provide a VPN.

S/E, AIM 9 The use of a VPN has


3.1.5 Evaluate the use of a VPN. 3
led to changes in working patterns.

Data transmission

3.1.6 Define the terms: protocol, data packet. 1

Including data integrity, flow


3.1.7 Explain why protocols are necessary. 3 control, deadlock, congestion, error
checking.

Explain why the speed of data


3.1.8 3
transmission across a network can vary.

Explain why compression of data is often S/E, INT Compression has enabled
3.1.9 necessary when transmitting across a 3 information to be disseminated more
network. rapidly.

Characteristics include: speed,


Outline the characteristics of different reliability, cost and security.
3.1.10 2
transmission media. Transmission media include: metal
conductor, fibre optic, wireless.

Explain how data is transmitted by


3.1.11 3
packet switching.

Wireless networking

S/E wireless networks have led to


Outline the advantages and disadvantages
3.1.12 2 changes in working patterns, social
of wireless networks.
activities and raised health issues.

Aryan Bhasin
Describe the hardware and software
3.1.13 2
components of a wireless network.

Include: WiFi; Worldwide


Interoperability for Microwave
Describe the characteristics of wireless Access (WiMAX); 3G mobile; future
3.1.14 2 networks.
networks.
S/E, INT Connectivity between
different locations.

Include encryption types, userID,


trusted media access control (MAC)
Describe the different methods of addresses.
3.1.15 2
network security. S/E Wireless networks have led to
concerns about the security of the
user’s data.

Evaluate the advantages and


3.1.16 disadvantages of each method of network 3
security.

New Syllabus Questions (2014-)

8. Identify two key features of a peer-to-peer (P2P) network. [2]


Award up to [2 marks max]. Examples of features: No central server;
Resources are more widely available (storage, bandwidth, computing power);
Redundancy/recovery;
Supports file sharing for collaborative work;

Aryan Bhasin
9. (a) Define the term protocol. [1]
(b) Outline why protocols are necessary. [2]

Aryan Bhasin
Aryan Bhasin
3. Outline one example of the use of a virtual private network (VPN). [3]

Aryan Bhasin
2. By making direct reference to the technologies used, explain how a virtual private network (VPN)
allows a travelling salesperson to connect securely to their company’s network. [4]

Aryan Bhasin
8. Explain, in terms of resources, how Voice over IP provides a collaborative working environment for
a company with multiple locations nationwide.

Aryan Bhasin
Aryan Bhasin
Aryan Bhasin
3. Outline one advantage and one disadvantage of wireless networks. [4]

Aryan Bhasin
5. Many different people and organizations upload scientific materials to the internet. A student uses
data from the internet in a science project. Outline two ethical issues concerning this use of the
internet. [4]

Points to be discussed: The data/information is deliberately incorrect;


The data/information has not been validated;
Intellectual property issues;
Plagiarism;

Aryan Bhasin
Aryan Bhasin

You might also like