Professional Documents
Culture Documents
Markscheme
Award [2 max]
Physical layer;
Data Link layer (DLL);
Network layer;
Transport layer;
Session layer;
Presentation layer;
Application layer;
2. [Maximum mark: 15] 23M.1.SL.TZ1.11
Many organizations use a virtual private network (VPN) to enable employees
working remotely to access files that are held on the organization’s server.
Markscheme
Award [2 max]
(VPN) tunnelling (server);
(VPN aware) router (and firewall);
Encryption (protocol) (Accept examples IPSec/ SSL / TSL);
VPN client software (installed on the employee’s computer);
(b) Identify two factors that may affect the speed of data
transmission. [2]
Markscheme
Award [2 max]
physical distance/ the number of network devices which have to be
crossed;
the performance of each of the devices (between sender and receiver), for
example weak processor;
quality/characteristics of network equipment (such as the router or
transmission media/cable/fibre/wireless);
number of network users (and their demand at any particular time);
Accept other reasonable answers, such as the type of encryption used or the encryption strength/ server
bandwidth/ size of the user data/ type of protocol used, etc.;
Award [3 max]
(Because) compression reduces the size of a file/ size of data/ the number of
packets to be transmitted;
Which reduces transmission time/ consumes less bandwidth;
And can result in significant cost savings;
Markscheme
Award [2 max]
Encryption scrambles readable text;
So, it can only be read/understood by the person who has the decryption
key;
Markscheme
Award [2 max]
A firewall monitors incoming and outgoing network traffic;
and decides whether to allow or block specific traffic (based on a defined
set of security rules)/ restricts access to parts of a network / prevents
unauthorised access of confidential data);
Markscheme
Award [4 max]
Award [2 max] for positive aspects, 1 mark for stating any of the positive aspects (of working from home)
and 1 mark for discussion.
Award [2 max] for negative aspects, 1 mark for stating any of the negative aspects (of working from
home) and 1 mark for discussion.
Note: When a change to the work pattern is identified it can be an advantage or a disadvantage. For
example, working at home can improve interaction with the family but also provide a distraction to work.
Markscheme
Award [2 max]
Physical layer;
Data Link layer (DLL);
Network layer;
Transport layer;
Session layer;
Presentation layer;
Application layer;
4. [Maximum mark: 15] 23M.1.SL.TZ2.11
Many organizations use a virtual private network (VPN) to enable employees
working remotely to access files that are held on the organization’s server.
Markscheme
Award [2 max]
(VPN) tunnelling (server);
(VPN aware) router (and firewall);
Encryption (protocol) (Accept examples IPSec/ SSL / TSL);
VPN client software (installed on the employee’s computer);
(b) Identify two factors that may affect the speed of data
transmission. [2]
Markscheme
Award [2 max]
physical distance/ the number of network devices which have to be
crossed;
the performance of each of the devices (between sender and receiver), for
example weak processor;
quality/characteristics of network equipment (such as the router or
transmission media/cable/fibre/wireless);
number of network users (and their demand at any particular time);
Accept other reasonable answers, such as the type of encryption used or the encryption strength/ server
bandwidth/ size of the user data/ type of protocol used, etc.;
Award [3 max]
(Because) compression reduces the size of a file/ size of data/ the number of
packets to be transmitted;
Which reduces transmission time/ consumes less bandwidth;
And can result in significant cost savings;
Markscheme
Award [2 max]
Encryption scrambles readable text;
So, it can only be read/understood by the person who has the decryption
key;
Markscheme
Award [2 max]
A firewall monitors incoming and outgoing network traffic;
and decides whether to allow or block specific traffic (based on a defined
set of security rules)/ restricts access to parts of a network / prevents
unauthorised access of confidential data);
Markscheme
Award [4 max]
Award [2 max] for positive aspects, 1 mark for stating any of the positive aspects (of working from home)
and 1 mark for discussion.
Award [2 max] for negative aspects, 1 mark for stating any of the negative aspects (of working from
home) and 1 mark for discussion.
Note: When a change to the work pattern is identified it can be an advantage or a disadvantage. For
example, working at home can improve interaction with the family but also provide a distraction to work.
5. [Maximum mark: 15] 23M.1.HL.TZ1.11
Many organizations use a virtual private network (VPN) to enable employees
working remotely to access files that are held on the organization’s server.
Markscheme
Award [2 max]
(VPN) tunnelling (server);
(VPN aware) router (and firewall);
Encryption (protocol) (Accept examples IPSec/ SSL / TSL);
VPN client software (installed on the employee’s computer);
(b) Identify two factors that may affect the speed of data
transmission. [2]
Markscheme
Award [2 max]
physical distance/ the number of network devices which have to be
crossed;
the performance of each of the devices (between sender and receiver), for
example weak processor;
quality/characteristics of network equipment (such as the router or
transmission media/cable/fibre/wireless);
number of network users (and their demand at any particular time);
Accept other reasonable answers, such as the type of encryption used or the encryption strength/ server
bandwidth/ size of the user data/ type of protocol used, etc.;
Award [3 max]
(Because) compression reduces the size of a file/ size of data/ the number of
packets to be transmitted;
Which reduces transmission time/ consumes less bandwidth;
And can result in significant cost savings;
Markscheme
Award [2 max]
Encryption scrambles readable text;
So, it can only be read/understood by the person who has the decryption
key;
Markscheme
Award [2 max]
A firewall monitors incoming and outgoing network traffic;
and decides whether to allow or block specific traffic (based on a defined
set of security rules)/ restricts access to parts of a network / prevents
unauthorised access of confidential data);
Markscheme
Award [4 max]
Award [2 max] for positive aspects, 1 mark for stating any of the positive aspects (of working from home)
and 1 mark for discussion.
Award [2 max] for negative aspects, 1 mark for stating any of the negative aspects (of working from
home) and 1 mark for discussion.
Note: When a change to the work pattern is identified it can be an advantage or a disadvantage. For
example, working at home can improve interaction with the family but also provide a distraction to work.
6. [Maximum mark: 15] 23M.1.HL.TZ2.11
Many organizations use a virtual private network (VPN) to enable employees
working remotely to access files that are held on the organization’s server.
Markscheme
Award [2 max]
(VPN) tunnelling (server);
(VPN aware) router (and firewall);
Encryption (protocol) (Accept examples IPSec/ SSL / TSL);
VPN client software (installed on the employee’s computer);
(b) Identify two factors that may affect the speed of data
transmission. [2]
Markscheme
Award [2 max]
physical distance/ the number of network devices which have to be
crossed;
the performance of each of the devices (between sender and receiver), for
example weak processor;
quality/characteristics of network equipment (such as the router or
transmission media/cable/fibre/wireless);
number of network users (and their demand at any particular time);
Accept other reasonable answers, such as the type of encryption used or the encryption strength/ server
bandwidth/ size of the user data/ type of protocol used, etc.;
Award [3 max]
(Because) compression reduces the size of a file/ size of data/ the number of
packets to be transmitted;
Which reduces transmission time/ consumes less bandwidth;
And can result in significant cost savings;
Markscheme
Award [2 max]
Encryption scrambles readable text;
So, it can only be read/understood by the person who has the decryption
key;
Markscheme
Award [2 max]
A firewall monitors incoming and outgoing network traffic;
and decides whether to allow or block specific traffic (based on a defined
set of security rules)/ restricts access to parts of a network / prevents
unauthorised access of confidential data);
Markscheme
Award [4 max]
Award [2 max] for positive aspects, 1 mark for stating any of the positive aspects (of working from home)
and 1 mark for discussion.
Award [2 max] for negative aspects, 1 mark for stating any of the negative aspects (of working from
home) and 1 mark for discussion.
Note: When a change to the work pattern is identified it can be an advantage or a disadvantage. For
example, working at home can improve interaction with the family but also provide a distraction to work.
7. [Maximum mark: 15] 23M.1.HL.TZ2.11
Many organizations use a virtual private network (VPN) to enable employees
working remotely to access files that are held on the organization’s server.
Markscheme
Award [2 max]
(VPN) tunnelling (server);
(VPN aware) router (and firewall);
Encryption (protocol) (Accept examples IPSec/ SSL / TSL);
VPN client software (installed on the employee’s computer);
(b) Identify two factors that may affect the speed of data
transmission. [2]
Markscheme
Award [2 max]
physical distance/ the number of network devices which have to be
crossed;
the performance of each of the devices (between sender and receiver), for
example weak processor;
quality/characteristics of network equipment (such as the router or
transmission media/cable/fibre/wireless);
number of network users (and their demand at any particular time);
Accept other reasonable answers, such as the type of encryption used or the encryption strength/ server
bandwidth/ size of the user data/ type of protocol used, etc.;
Award [3 max]
(Because) compression reduces the size of a file/ size of data/ the number of
packets to be transmitted;
Which reduces transmission time/ consumes less bandwidth;
And can result in significant cost savings;
Markscheme
Award [2 max]
Encryption scrambles readable text;
So, it can only be read/understood by the person who has the decryption
key;
Markscheme
Award [2 max]
A firewall monitors incoming and outgoing network traffic;
and decides whether to allow or block specific traffic (based on a defined
set of security rules)/ restricts access to parts of a network / prevents
unauthorised access of confidential data);
Markscheme
Award [4 max]
Award [2 max] for positive aspects, 1 mark for stating any of the positive aspects (of working from home)
and 1 mark for discussion.
Award [2 max] for negative aspects, 1 mark for stating any of the negative aspects (of working from
home) and 1 mark for discussion.
Note: When a change to the work pattern is identified it can be an advantage or a disadvantage. For
example, working at home can improve interaction with the family but also provide a distraction to work.
8. [Maximum mark: 15] 22N.1.SL.TZ0.9
A company has a local area network (LAN). Ethernet (a wired network) and WiFi
(a wireless network) are the two ways to enable LAN connections.
The LAN is accessible to all employees through their personal accounts. At the
office, employees can use either desktop computers for wired access to the LAN
or personal laptops to connect wirelessly.
Markscheme
Markscheme
whilst
Ethernet is more reliable as the strength of the signal does not depend on
the distance from the router/ wired LAN support longer distances;
wired is immune to interference;
there is no issue with the topology/shape of the surrounding;
but the Ethernet cable may be cut/broken affecting reliability;
(c) Outline why a wireless network may be less secure than a wired
network. [2]
Markscheme
Employees who are not in the office can access the company’s resources over the
internet using a virtual private network (VPN).
Markscheme
Encryption;
If data intercepted, it will not be readable;
encrypting each encapsulated data packet’s content with an encryption
key (the key is shared only between the VPN’s server and clients);
Tunnelling software;
A VPN hides a user’s data by encrypting it with a tunnel created between
the user’s device and the VPN’s web server (The user then takes on the IP
address of the web server (rather than their true IP), and this leads to one
advantage of a VPN (namely that a user can appear to be in a different
geographic location than they are actually located in);
Markscheme
(a) Outline one ethical issue with the student posting these images
and videos. [2]
Markscheme
(b) Outline one technical issue that may prevent the images and
videos from being viewed. [2]
Markscheme
Markscheme
Award [2 max].
WAN covers a much larger area (national/international), LANs usually cover
a smaller area (such as a single site);
Nodes connected to WANs often make use of connections through public
networks (such as the telephone system), nodes connected to LANs are
usually connected through private infrastructure;
LANs are more secure than WANs (due to how WANs transmit the data /how
far the data would need to travel);
A higher bandwidth is available for transmission in a LAN than a WAN/
LANs can have a higher data transfer rate than a WAN;
LAN is typically cheaper than WAN to implement/ maintain (as the
equipment required for LAN is less expensive);
WAN includes a large number of devices connected together, LAN includes
less;
WANs are typically slower than LANs due to the distance data must travel;
WAN requires hardware to connect different networks, such as a router, LAN
can be simple and does not need to connect to other networks;
11. [Maximum mark: 2] 22M.1.SL.TZ0.4
Outline the reason for compression when transmitting data. [2]
Markscheme
Award [2 max].
The reason for compression when transmitting data is to save on transfer
times;
As it reduces the number of bits needed to represent data (when compared
with the original data);
Note to examiners: Award [1] for a reason (for example, to save data usage for sending files over the
internet, to save storage capacity, to speed up file transfer, to decrease costs for network bandwidth, etc.),
and award [1] for an expansion.
Markscheme
Award [2 max]
Standards ensure compatibility between nodes on the network;
Through the use of common techniques/protocols/language;
13. [Maximum mark: 2] 21M.1.SL.TZ0.6
Identify two reasons why fibre optic cable would be preferred over
wireless connectivity. [2]
Markscheme
Award [2 max]
Fibre optics allow faster transmission speeds;
Fibre optic cables are more secure/harder to break into;
Fibre optic cable transmission is more reliable/less likely to suffer
interference;
Fibre optics allow transmission over longer distance;
Fibre optics allow greater bandwidth;
Markscheme
Award [1 max]
A unit of data made into a single unit (that travels along a given network
path);
A data packet travels through a network as a unit i.e. with all parts kept
together;
15. [Maximum mark: 15] 21M.1.SL.TZ0.12
A school currently has a cabled network but wants to add wireless networking
across the whole campus.
Markscheme
Award [4 max]
(Wireless) router;
A central hub for all the computers to connect to;
Enables wireless network packet forwarding and routing;
Wireless repeaters;
To expand the reach of the network;
Mark as 2 and 2.
Markscheme
Award [2 max]
The ability to use their own devices at school;
The ability to access the school network from anywhere in the school;
No cables laid, so reduces the risk of tripping over cables;
Numbers of connections are not limited to cable ports, so greater numbers
of students can connect at any given time;
There are concerns that unauthorized people could access the data on the
wireless network.
Markscheme
Award [4 max]
Use of encryption;
So that data cannot be understood if it is intercepted;
Mark as 2 and 2.
The school has decided to implement a virtual private network (VPN) to provide
access to its network.
Markscheme
Award [2 max]
Client VPN software (to make a secure remote connection);
VPN-aware routers and firewalls (to permit VPN traffic to pass);
VPN appliance/server (to handle incoming VPN traffic);
Encryption protocol IPSec or SSL;
Markscheme
Award [3 max]
Enhanced security of data;
for example, using encryption;
This prevents unauthorised access;
Markscheme
Award [4 max]
(Wireless) router;
A central hub for all the computers to connect to;
Enables wireless network packet forwarding and routing;
Wireless repeaters;
To expand the reach of the network;
Mark as 2 and 2.
Markscheme
Award [2 max]
The ability to use their own devices at school;
The ability to access the school network from anywhere in the school;
No cables laid, so reduces the risk of tripping over cables;
Numbers of connections are not limited to cable ports, so greater numbers
of students can connect at any given time;
There are concerns that unauthorized people could access the data on the
wireless network.
Markscheme
Award [4 max]
Use of encryption;
So that data cannot be understood if it is intercepted;
Mark as 2 and 2.
The school has decided to implement a virtual private network (VPN) to provide
access to its network.
Markscheme
Award [2 max]
Client VPN software (to make a secure remote connection);
VPN-aware routers and firewalls (to permit VPN traffic to pass);
VPN appliance/server (to handle incoming VPN traffic);
Encryption protocol IPSec or SSL;
Markscheme
Award [3 max]
Enhanced security of data;
for example, using encryption;
This prevents unauthorised access;
Markscheme
Award [3 max].
controls the flow of data in the network;
inspects address of data packets;
directs to the appropriate network path/ selects a path between networks
(by inspecting address of data packets);
securely transmits data packets (across that path toward the intended
destination);
Users have been troubled by slow speeds when accessing the internet.
Markscheme
Award [4 max].
malicious software/spyware/malware / viruses;
attacking the system;
Note: There are many types of internet connection: wireless connections, wireless hotspots, mobile
internet, broadband connections, fixed wireless and satellite connection, cable, DSL;
hardware malfunction;
internet speed can considerably slow down if modem-router configuration
is not correct / updated;
external factors;
during the peak hours of daytime the most visited websites encounter
more network traffic than what has been anticipated;
NOTE: Accept examples. For example, too many students try to connect to an e-learning site at the same
time.
Mark as 2 and 2
(c) Outline two measures that the school could take to safeguard
its data from unlawful access via the internet. [4]
Markscheme
Award [4 max].
Preventing unauthorized access/No access without user names/passwords;
which should be regularly changed/made difficult to guess;
Mark as 2 and 2
Note: Accept appropriate measures such as physical security measures / access control / data security /
network and communication security / user awareness and education, etc.
Markscheme
Award [4 max].
Award [1] for looping through the inventory file;
Award [1] for reading the supply data record (ID number, name, maximum quantity, minimum quantity and
remaining quantity);
Award [1] for checking if the quantity remaining is less than minimum quantity;
Award [1] If so, calculate the quantity to be ordered (number to buy) / as the maximum quantity minus the
quantity remaining;
Award [1] for outputting the name/ID number of the office supply and the number to buy;
Example 1:
Example 2:
Markscheme
Award [4 max]
File sharing/resource sharing;
instead of using a disk or USB key to carry files from one computer to
another files can be shared directly using a network/all computers in the
network can share resources such as printers, scanners;
Communication;
students/teachers can communicate with people around the world via the
network;
Interactive teamwork;
software (like Microsoft Office) enables many users to contribute to a
document concurrently;
Flexible access;
network allows students to access files from different computers
(throughout the network) (one can begin work on a project on one
computer and finish up on another);
Software cost;
software products are available for networks at a substantial savings in
comparison to buying individually licensed software;
Software management;
load software on the server saves time compared to installing and tracking
files on independent computers/upgrades are also easier because changes
only have to be done once on the file server instead of on individual
computers;
Markscheme
Award [2 max]
A network router is a hardware device that is connected to multiple
channels for different networks;
through an interface that is situated on each network;
Markscheme
Award [2 max]
Network interface cards are used to connect each computer to the network;
so they can communicate with the network router to receive information
packets;
Markscheme
Award [2 max]
Protocols define the rules that govern network communication (for
example, packet format, type and size, what happens when an error occurs,
and which part of the network is supposed to handle the error and how);
Protocols work in layers (the highest being what the user sees, and the
lowest being the wire that the information is transferred along) and these
layers communicate with each other according to the rules (allowing
communication to occur accurately and efficiently);
Markscheme
Award [1 max]
Data encryption refers to calculations/algorithms that transform plain text
into a form that is non-readable to unauthorized parties (authorized
recipient of an encrypted text uses a key and the algorithm to decrypt the
data/ to transform it to the original plain text version);
Markscheme
Award [4 max]
Each (wireless network) adapter has a unique label called a MAC address;
One disadvantage is that the whitelist should be amended any time a new
device is purchased / when access to guests should be granted;
Also this method is useless against hackers who use programs which
intercept data passing through network and report the MAC address of any
device communicating on the network;
Markscheme
Award [2 max].
To provide a set of rules/procedures;
To enable two or more different electronic devices/computers/entities to
understand each other during data transfer / enable successful
communication;
20. [Maximum mark: 2] 19M.1.SL.TZ0.12
Identify two characteristics of a personal area network (PAN). [2]
Markscheme
Award [2 max].
Smallest type of network;
Consists of connected devices in close proximity to the individual using
them;
Connected via Bluetooth/wireless;
Suitable example: smartphone to car connection;
Markscheme
Award [3 max].
A message/the data is broken into a number of parts;
Which are sent independently;
…over the optimum route for each packet;
The individual parts are reassembled at the destination;
Each packet contains the (IP) address of both the sender and recipient;
22. [Maximum mark: 15] 19M.1.SL.TZ0.15
A company that provides training for teachers plans to set up a training room in
its offices with a network of 15 computers. Each computer has 1 TB of storage
and 16 GB of random access memory (RAM).
Markscheme
Award [2 max].
RAM is volatile / contents erased when power is switched off;
Access speed is fast / faster than hard drive;
Data / instructions can be read from and written to it / /RAM can be
overwritten;
Size is limited;
Markscheme
Markscheme
Award [2 max].
Word processor;
Spreadsheet;
Database management system;
Email;
Web browser;
Allow any general purpose application that is appropriate for a ‘training room computer’
The company has decided to allow the teachers to use their own devices in its
training room by adding wireless networking.
Markscheme
Award [2 max].
May save money;
Due to not having to supply all the training computers;
Markscheme
Award [2 max]
May cause security issues;
Due to multiple users having network access from their “unsecured”
devices;
May interfere with running of training sessions;
As some machines may not be compatible;
Markscheme
Award [2 max]
Encryption;
Scrambles the contents of the network transmissions so that if they are
intercepted they can’t be understood (without the decryption key);
Firewall;
Checks traffic coming into the network and leaving the network, and can
block suspicious data;
Markscheme
Award [4 max].
Mark as [2] and [2].
Note to examiners: Answers must relate to wireless networks and not be a comparison between cabled and
wireless networks.
Markscheme
Award [1] for identifying the nature of a network and [1] for a development of the first point up to [2 max].
Markscheme
Award [4 max].
Markscheme
Markscheme
Award [1] for identifying how VPN will allow employees to communicate and [1]for a development up to
[2 max].
Markscheme
Award [1] for identifying an issue and [1] for an expansion up to [2 max].
Markscheme
Award [1] for identifying the nature of a network and [1] for a development of the first point up to [2 max].
Markscheme
Award [1] for a definition of the term bandwidth and [1] for a description of an issue caused by low
bandwidth up to [2 max].
(a.i) Identify one hardware security measure that will ensure that
confidential data from the Head Office cannot be accessed. [1]
Markscheme
Retina scans;
Locked doors;
Alarms;
Protection of equipment within the building;
(a.ii) Identify one software security measure that will ensure that
confidential data from the Head Office cannot be accessed. [1]
Markscheme
Use of passwords;
Different access rights;
Encryption;
The company also uses the internet to enable communication with employees
working on exploration and production in many remote geographical areas.
Markscheme
The sub-sea oil and gas exploration and production unit of the company relies
on thousands of kilometres of pipeline which are monitored by a computer
control system which can detect leaks.
Markscheme
Award [3 max].
The process of detecting leaks is carried out by sensors which are continuously
monitoring changes in the flow and pressure of the liquids in the pipes.
If any of sensor values are outside of the acceptable parameters stored on a disk
in the office, the following error routines are performed:
an alarm is sounded on the computer at the office
an email message is sent to managers in the Head Office.
(d) Explain the relationship between sensors, output transducers
and processor in this situation. [4]
Markscheme
Award [4 max].
Markscheme
Award [5 max].
Example 1
Example 2
28. [Maximum mark: 2] 18M.1.SL.TZ0.6
Identify two characteristics of a data packet. [2]
Markscheme
Award 2 marks if two of the contents of a packet are given and expanded.
29. [Maximum mark: 3] 18M.1.SL.TZ0.7
Explain why protocols are used in network communications. [3]
Markscheme
The LAN will connect the room where the server is installed to new computers in
the additional office space. The network engineer produced the following Gantt
chart for this task.
Markscheme
(b) Identify two tasks that will be carried out concurrently. [1]
Markscheme
Test the cabling AND Connect the new computers with the cabling;
(c) Identify two tasks that will be carried out sequentially. [1]
Markscheme
Any pair of tasks that are NOT a correct answer to part (b);
(d) After 5 years the company decided to replace the LAN with a
wireless local area network (WLAN).
Markscheme
Allows BYOD:
Which could lead to greater productivity (as familiarity with device);
Reduces wiring;
Therefore improved safety for employees;
Markscheme
Markscheme
The LAN will connect the room where the server is installed to new computers in
the additional office space. The network engineer produced the following Gantt
chart for this task.
Markscheme
(b) Identify two tasks that will be carried out concurrently. [1]
Markscheme
Test the cabling AND Connect the new computers with the cabling;
(c) Identify two tasks that will be carried out sequentially. [1]
Markscheme
Any pair of tasks that are NOT a correct answer to part (b);
(d) After 5 years the company decided to replace the LAN with a
wireless local area network (WLAN).
Markscheme
Allows BYOD:
Which could lead to greater productivity (as familiarity with device);
Reduces wiring;
Therefore improved safety for employees;
Markscheme
Markscheme
Markscheme
Award up to [1 max].
Wireless router/modem;
Access points;
Switch;
Wireless repeater/extender/booster;
The advantages of this WLAN are user-mobility and economical access points.
Markscheme
Award [1] for identifying a disadvantage and [1] for an expansion, for two disadvantages up to [4 max].
Note: Accept any reasonable points, provided they are appropriately elaborated.
Markscheme
Award up to [3 max].
Give each user appropriate login details/passwords;
Different access rights for students, teachers, school administrators (file-
level and share-level security);
All passwords and files should be encrypted;
Use the latest WiFi protocol/WPA2;
Require MAC address authentication;
Password protect the documents;
Note: the focus of the question is on confidential data (firewalls not accepted)
Markscheme
Set of rules for data transmission;
Markscheme
Award up to [3 max] for a general description of how data is transferred by packet switching. ([1 max] if
this general description is very simplistic and refers to just the Header/Data/Trailer already shown in the
question paper).
Award up to [3 max] for added detail that references the contents of the given data packet in the answer.
Network switches and routers determine how best to transfer the packet
between a number of intermediate devices (routers and switches) on the
path to its destination (rather than flowing directly over a single wire on the
path to its destination);