You are on page 1of 69

All Networks Questions [270 marks]

1. [Maximum mark: 2] 23M.1.SL.TZ1.7


Identify two layers in the Open Systems Interconnection (OSI) seven-
layer model. [2]

Markscheme

Award [2 max]
Physical layer;
Data Link layer (DLL);
Network layer;
Transport layer;
Session layer;
Presentation layer;
Application layer;
2. [Maximum mark: 15] 23M.1.SL.TZ1.11
Many organizations use a virtual private network (VPN) to enable employees
working remotely to access files that are held on the organization’s server.

(a) State two technologies that are required to provide a virtual


private network (VPN). [2]

Markscheme

Award [2 max]
(VPN) tunnelling (server);
(VPN aware) router (and firewall);
Encryption (protocol) (Accept examples IPSec/ SSL / TSL);
VPN client software (installed on the employee’s computer);

(b) Identify two factors that may affect the speed of data
transmission. [2]

Markscheme

Award [2 max]
physical distance/ the number of network devices which have to be
crossed;
the performance of each of the devices (between sender and receiver), for
example weak processor;
quality/characteristics of network equipment (such as the router or
transmission media/cable/fibre/wireless);
number of network users (and their demand at any particular time);

Accept other reasonable answers, such as the type of encryption used or the encryption strength/ server
bandwidth/ size of the user data/ type of protocol used, etc.;

(c) Explain why data compression would be used when data is


transmitted. [3]
Markscheme

Award [3 max]
(Because) compression reduces the size of a file/ size of data/ the number of
packets to be transmitted;
Which reduces transmission time/ consumes less bandwidth;
And can result in significant cost savings;

A large amount of sensitive data is stored online and needs to be protected.

(d) Outline how encryption is used to protect data. [2]

Markscheme

Award [2 max]
Encryption scrambles readable text;
So, it can only be read/understood by the person who has the decryption
key;

Data encryption translates plain text into ciphertext;


That can be viewed/read in its original form only if it is decrypted with the
correct key;

(e) Describe the role of a firewall. [2]

Markscheme

Award [2 max]
A firewall monitors incoming and outgoing network traffic;
and decides whether to allow or block specific traffic (based on a defined
set of security rules)/ restricts access to parts of a network / prevents
unauthorised access of confidential data);

Note: Accept software and hardware firewalls.


A (software) firewall (is a program installed on each computer that)
monitors incoming and outgoing traffic/ controls the behaviour of
applications;
and filter/block traffic coming from unsecured or suspicious apps/
blacklisted apps;

A (hardware) firewall (is a piece of equipment installed between the


network and gateway that) regulates traffic through ports;
and prohibits suspicious data packets from passing through;

Employees are increasingly working from home.

(f ) Discuss the social impacts of this changed work pattern on


employees. [4]

Markscheme

Award [4 max]
Award [2 max] for positive aspects, 1 mark for stating any of the positive aspects (of working from home)
and 1 mark for discussion.
Award [2 max] for negative aspects, 1 mark for stating any of the negative aspects (of working from
home) and 1 mark for discussion.

Examples (Positive aspects):


Flexibility and agility
Increased productivity - due to fewer interruptions
Increased motivation
Autonomy
Improved health and wellbeing
Better work/life balance

Examples (negative aspects):


Working from home doesn't suit everyone
Employees feeling isolated
Home distractions
Negative impact on mental health
Not all jobs suit home working

Note: When a change to the work pattern is identified it can be an advantage or a disadvantage. For
example, working at home can improve interaction with the family but also provide a distraction to work.

3. [Maximum mark: 2] 23M.1.SL.TZ2.7


Identify two layers in the Open Systems Interconnection (OSI) seven-
layer model. [2]

Markscheme

Award [2 max]
Physical layer;
Data Link layer (DLL);
Network layer;
Transport layer;
Session layer;
Presentation layer;
Application layer;
4. [Maximum mark: 15] 23M.1.SL.TZ2.11
Many organizations use a virtual private network (VPN) to enable employees
working remotely to access files that are held on the organization’s server.

(a) State two technologies that are required to provide a virtual


private network (VPN). [2]

Markscheme

Award [2 max]
(VPN) tunnelling (server);
(VPN aware) router (and firewall);
Encryption (protocol) (Accept examples IPSec/ SSL / TSL);
VPN client software (installed on the employee’s computer);

(b) Identify two factors that may affect the speed of data
transmission. [2]

Markscheme

Award [2 max]
physical distance/ the number of network devices which have to be
crossed;
the performance of each of the devices (between sender and receiver), for
example weak processor;
quality/characteristics of network equipment (such as the router or
transmission media/cable/fibre/wireless);
number of network users (and their demand at any particular time);

Accept other reasonable answers, such as the type of encryption used or the encryption strength/ server
bandwidth/ size of the user data/ type of protocol used, etc.;

(c) Explain why data compression would be used when data is


transmitted. [3]
Markscheme

Award [3 max]
(Because) compression reduces the size of a file/ size of data/ the number of
packets to be transmitted;
Which reduces transmission time/ consumes less bandwidth;
And can result in significant cost savings;

A large amount of sensitive data is stored online and needs to be protected.

(d) Outline how encryption is used to protect data. [2]

Markscheme

Award [2 max]
Encryption scrambles readable text;
So, it can only be read/understood by the person who has the decryption
key;

Data encryption translates plain text into ciphertext;


That can be viewed/read in its original form only if it is decrypted with the
correct key;

(e) Describe the role of a firewall. [2]

Markscheme

Award [2 max]
A firewall monitors incoming and outgoing network traffic;
and decides whether to allow or block specific traffic (based on a defined
set of security rules)/ restricts access to parts of a network / prevents
unauthorised access of confidential data);

Note: Accept software and hardware firewalls.


A (software) firewall (is a program installed on each computer that)
monitors incoming and outgoing traffic/ controls the behaviour of
applications;
and filter/block traffic coming from unsecured or suspicious apps/
blacklisted apps;

A (hardware) firewall (is a piece of equipment installed between the


network and gateway that) regulates traffic through ports;
and prohibits suspicious data packets from passing through;

Employees are increasingly working from home.

(f ) Discuss the social impacts of this changed work pattern on


employees. [4]

Markscheme

Award [4 max]
Award [2 max] for positive aspects, 1 mark for stating any of the positive aspects (of working from home)
and 1 mark for discussion.
Award [2 max] for negative aspects, 1 mark for stating any of the negative aspects (of working from
home) and 1 mark for discussion.

Examples (Positive aspects):


Flexibility and agility
Increased productivity - due to fewer interruptions
Increased motivation
Autonomy
Improved health and wellbeing
Better work/life balance

Examples (negative aspects):


Working from home doesn't suit everyone
Employees feeling isolated
Home distractions
Negative impact on mental health
Not all jobs suit home working

Note: When a change to the work pattern is identified it can be an advantage or a disadvantage. For
example, working at home can improve interaction with the family but also provide a distraction to work.
5. [Maximum mark: 15] 23M.1.HL.TZ1.11
Many organizations use a virtual private network (VPN) to enable employees
working remotely to access files that are held on the organization’s server.

(a) State two technologies that are required to provide a virtual


private network (VPN). [2]

Markscheme

Award [2 max]
(VPN) tunnelling (server);
(VPN aware) router (and firewall);
Encryption (protocol) (Accept examples IPSec/ SSL / TSL);
VPN client software (installed on the employee’s computer);

(b) Identify two factors that may affect the speed of data
transmission. [2]

Markscheme

Award [2 max]
physical distance/ the number of network devices which have to be
crossed;
the performance of each of the devices (between sender and receiver), for
example weak processor;
quality/characteristics of network equipment (such as the router or
transmission media/cable/fibre/wireless);
number of network users (and their demand at any particular time);

Accept other reasonable answers, such as the type of encryption used or the encryption strength/ server
bandwidth/ size of the user data/ type of protocol used, etc.;

(c) Explain why data compression would be used when data is


transmitted. [3]
Markscheme

Award [3 max]
(Because) compression reduces the size of a file/ size of data/ the number of
packets to be transmitted;
Which reduces transmission time/ consumes less bandwidth;
And can result in significant cost savings;

A large amount of sensitive data is stored online and needs to be protected.

(d) Outline how encryption is used to protect data. [2]

Markscheme

Award [2 max]
Encryption scrambles readable text;
So, it can only be read/understood by the person who has the decryption
key;

Data encryption translates plain text into ciphertext;


That can be viewed/read in its original form only if it is decrypted with the
correct key;

(e) Describe the role of a firewall. [2]

Markscheme

Award [2 max]
A firewall monitors incoming and outgoing network traffic;
and decides whether to allow or block specific traffic (based on a defined
set of security rules)/ restricts access to parts of a network / prevents
unauthorised access of confidential data);

Note: Accept software and hardware firewalls.


A (software) firewall (is a program installed on each computer that)
monitors incoming and outgoing traffic/ controls the behaviour of
applications;
and filter/block traffic coming from unsecured or suspicious apps/
blacklisted apps;

A (hardware) firewall (is a piece of equipment installed between the


network and gateway that) regulates traffic through ports;
and prohibits suspicious data packets from passing through;

Employees are increasingly working from home.

(f ) Discuss the social impacts of this changed work pattern on


employees. [4]

Markscheme

Award [4 max]
Award [2 max] for positive aspects, 1 mark for stating any of the positive aspects (of working from home)
and 1 mark for discussion.
Award [2 max] for negative aspects, 1 mark for stating any of the negative aspects (of working from
home) and 1 mark for discussion.

Examples (Positive aspects):


Flexibility and agility
Increased productivity - due to fewer interruptions
Increased motivation
Autonomy
Improved health and wellbeing
Better work/life balance

Examples (negative aspects):


Working from home doesn't suit everyone
Employees feeling isolated
Home distractions
Negative impact on mental health
Not all jobs suit home working

Note: When a change to the work pattern is identified it can be an advantage or a disadvantage. For
example, working at home can improve interaction with the family but also provide a distraction to work.
6. [Maximum mark: 15] 23M.1.HL.TZ2.11
Many organizations use a virtual private network (VPN) to enable employees
working remotely to access files that are held on the organization’s server.

(a) State two technologies that are required to provide a virtual


private network (VPN). [2]

Markscheme

Award [2 max]
(VPN) tunnelling (server);
(VPN aware) router (and firewall);
Encryption (protocol) (Accept examples IPSec/ SSL / TSL);
VPN client software (installed on the employee’s computer);

(b) Identify two factors that may affect the speed of data
transmission. [2]

Markscheme

Award [2 max]
physical distance/ the number of network devices which have to be
crossed;
the performance of each of the devices (between sender and receiver), for
example weak processor;
quality/characteristics of network equipment (such as the router or
transmission media/cable/fibre/wireless);
number of network users (and their demand at any particular time);

Accept other reasonable answers, such as the type of encryption used or the encryption strength/ server
bandwidth/ size of the user data/ type of protocol used, etc.;

(c) Explain why data compression would be used when data is


transmitted. [3]
Markscheme

Award [3 max]
(Because) compression reduces the size of a file/ size of data/ the number of
packets to be transmitted;
Which reduces transmission time/ consumes less bandwidth;
And can result in significant cost savings;

A large amount of sensitive data is stored online and needs to be protected.

(d) Outline how encryption is used to protect data. [2]

Markscheme

Award [2 max]
Encryption scrambles readable text;
So, it can only be read/understood by the person who has the decryption
key;

Data encryption translates plain text into ciphertext;


That can be viewed/read in its original form only if it is decrypted with the
correct key;

(e) Describe the role of a firewall. [2]

Markscheme

Award [2 max]
A firewall monitors incoming and outgoing network traffic;
and decides whether to allow or block specific traffic (based on a defined
set of security rules)/ restricts access to parts of a network / prevents
unauthorised access of confidential data);

Note: Accept software and hardware firewalls.


A (software) firewall (is a program installed on each computer that)
monitors incoming and outgoing traffic/ controls the behaviour of
applications;
and filter/block traffic coming from unsecured or suspicious apps/
blacklisted apps;

A (hardware) firewall (is a piece of equipment installed between the


network and gateway that) regulates traffic through ports;
and prohibits suspicious data packets from passing through;

Employees are increasingly working from home.

(f ) Discuss the social impacts of this changed work pattern on


employees. [4]

Markscheme

Award [4 max]
Award [2 max] for positive aspects, 1 mark for stating any of the positive aspects (of working from home)
and 1 mark for discussion.
Award [2 max] for negative aspects, 1 mark for stating any of the negative aspects (of working from
home) and 1 mark for discussion.

Examples (Positive aspects):


Flexibility and agility
Increased productivity - due to fewer interruptions
Increased motivation
Autonomy
Improved health and wellbeing
Better work/life balance

Examples (negative aspects):


Working from home doesn't suit everyone
Employees feeling isolated
Home distractions
Negative impact on mental health
Not all jobs suit home working

Note: When a change to the work pattern is identified it can be an advantage or a disadvantage. For
example, working at home can improve interaction with the family but also provide a distraction to work.
7. [Maximum mark: 15] 23M.1.HL.TZ2.11
Many organizations use a virtual private network (VPN) to enable employees
working remotely to access files that are held on the organization’s server.

(a) State two technologies that are required to provide a virtual


private network (VPN). [2]

Markscheme

Award [2 max]
(VPN) tunnelling (server);
(VPN aware) router (and firewall);
Encryption (protocol) (Accept examples IPSec/ SSL / TSL);
VPN client software (installed on the employee’s computer);

(b) Identify two factors that may affect the speed of data
transmission. [2]

Markscheme

Award [2 max]
physical distance/ the number of network devices which have to be
crossed;
the performance of each of the devices (between sender and receiver), for
example weak processor;
quality/characteristics of network equipment (such as the router or
transmission media/cable/fibre/wireless);
number of network users (and their demand at any particular time);

Accept other reasonable answers, such as the type of encryption used or the encryption strength/ server
bandwidth/ size of the user data/ type of protocol used, etc.;

(c) Explain why data compression would be used when data is


transmitted. [3]
Markscheme

Award [3 max]
(Because) compression reduces the size of a file/ size of data/ the number of
packets to be transmitted;
Which reduces transmission time/ consumes less bandwidth;
And can result in significant cost savings;

A large amount of sensitive data is stored online and needs to be protected.

(d) Outline how encryption is used to protect data. [2]

Markscheme

Award [2 max]
Encryption scrambles readable text;
So, it can only be read/understood by the person who has the decryption
key;

Data encryption translates plain text into ciphertext;


That can be viewed/read in its original form only if it is decrypted with the
correct key;

(e) Describe the role of a firewall. [2]

Markscheme

Award [2 max]
A firewall monitors incoming and outgoing network traffic;
and decides whether to allow or block specific traffic (based on a defined
set of security rules)/ restricts access to parts of a network / prevents
unauthorised access of confidential data);

Note: Accept software and hardware firewalls.


A (software) firewall (is a program installed on each computer that)
monitors incoming and outgoing traffic/ controls the behaviour of
applications;
and filter/block traffic coming from unsecured or suspicious apps/
blacklisted apps;

A (hardware) firewall (is a piece of equipment installed between the


network and gateway that) regulates traffic through ports;
and prohibits suspicious data packets from passing through;

Employees are increasingly working from home.

(f ) Discuss the social impacts of this changed work pattern on


employees. [4]

Markscheme

Award [4 max]
Award [2 max] for positive aspects, 1 mark for stating any of the positive aspects (of working from home)
and 1 mark for discussion.
Award [2 max] for negative aspects, 1 mark for stating any of the negative aspects (of working from
home) and 1 mark for discussion.

Examples (Positive aspects):


Flexibility and agility
Increased productivity - due to fewer interruptions
Increased motivation
Autonomy
Improved health and wellbeing
Better work/life balance

Examples (negative aspects):


Working from home doesn't suit everyone
Employees feeling isolated
Home distractions
Negative impact on mental health
Not all jobs suit home working

Note: When a change to the work pattern is identified it can be an advantage or a disadvantage. For
example, working at home can improve interaction with the family but also provide a distraction to work.
8. [Maximum mark: 15] 22N.1.SL.TZ0.9
A company has a local area network (LAN). Ethernet (a wired network) and WiFi
(a wireless network) are the two ways to enable LAN connections.

The LAN is accessible to all employees through their personal accounts. At the
office, employees can use either desktop computers for wired access to the LAN
or personal laptops to connect wirelessly.

(a) Identify one additional hardware component in a wireless LAN. [1]

Markscheme

Award [1] max.


(Wireless) router;
Access points;
(Wireless) bridge or repeater;
(Wireless) controller;
Wireless adaptors/ Network interface cards (NICs) (that operate within the
employees’ computers);

(b) Distinguish between a wired network and a wireless network in


terms of reliability of transmission. [4]

Markscheme

Award [4] max.


The reliability of wireless depends on the strength of the wireless signal;
Depends on distance from router;
depends on the topology/shape of the surroundings;
a wireless LAN has slower data transfer;

whilst
Ethernet is more reliable as the strength of the signal does not depend on
the distance from the router/ wired LAN support longer distances;
wired is immune to interference;
there is no issue with the topology/shape of the surrounding;
but the Ethernet cable may be cut/broken affecting reliability;

(c) Outline why a wireless network may be less secure than a wired
network. [2]

Markscheme

Award [2] max.


wired network is only accessible with a physical cable connection and in
wireless networks signals are broadcasted outside of the building;
leaving it open to the public and potential hackers/ it is easy to intercept
transmissions;

a wireless network is more open to misuse;


as network administrator cannot directly monitor a specific machine;

Employees who are not in the office can access the company’s resources over the
internet using a virtual private network (VPN).

(d) Outline two features of a VPN that make it secure. [4]

Markscheme

Award [4] max.


Authentication;
Nobody outside the VPN should be able to use the VPN and affect the
security of the VPN, so only user name and password authentication is not
enough;
Strong user VPN authentication uses various methods, including
certificates, one-time passwords and software tokens;

Encryption;
If data intercepted, it will not be readable;
encrypting each encapsulated data packet’s content with an encryption
key (the key is shared only between the VPN’s server and clients);

Tunnelling software;
A VPN hides a user’s data by encrypting it with a tunnel created between
the user’s device and the VPN’s web server (The user then takes on the IP
address of the web server (rather than their true IP), and this leads to one
advantage of a VPN (namely that a user can appear to be in a different
geographic location than they are actually located in);

Multiple exit nodes;


Makes it hard to distinguish where the data sent is originated (protecting
privacy);

Mark as [2] and [2]


Award [1] for a feature and [1] for a reasonable expansion, x2.

(e) Packet switching is used for transmitting data.

Explain how data is transmitted by packet switching. [4]

Markscheme

Award [4] max.


Data is organized in specially formatted units (data packets);
Each data packet contains: data, address of the sender, address of the
receiver, size of packet, sequence number, control codes, etc.;
which are routed from source to destination using network switches and
routers;
network switches and routers determine how best to transfer the packet
between a number of intermediate devices (routers and switches) on the
path to its destination (rather than flowing directly over a single wire on the
path to its destination);
data packets are reassembled at destination;
9. [Maximum mark: 4] 22N.1.SL.TZ0.5
A student posts images and videos on a public website of her friends at a party.

(a) Outline one ethical issue with the student posting these images
and videos. [2]

Markscheme

Award [2] max.


the video/images could be viewed by anyone;
which may not be desirable since some people may not wish to have
themselves regarded by everyone;

anybody could download the images/video;


and they can be manipulated by outsiders;

posting images of other people at a private function requires their


permission;
did she get permission from her friends? ;
that they were fine with her posting and share their pictures with everyone;

(b) Outline one technical issue that may prevent the images and
videos from being viewed. [2]

Markscheme

Award [2] max.


there could be problems if the person at the event does not have the facility
to see the video/images;
because of, for example, inadequate internet connection / browser / video
player;

space on web server could cause problems;


if the size of files exceeds the allocation on server;
10. [Maximum mark: 2] 22M.1.SL.TZ0.3
Identify two differences between a wide area network (WAN) and a
local area network (LAN). [2]

Markscheme

Award [2 max].
WAN covers a much larger area (national/international), LANs usually cover
a smaller area (such as a single site);
Nodes connected to WANs often make use of connections through public
networks (such as the telephone system), nodes connected to LANs are
usually connected through private infrastructure;
LANs are more secure than WANs (due to how WANs transmit the data /how
far the data would need to travel);
A higher bandwidth is available for transmission in a LAN than a WAN/
LANs can have a higher data transfer rate than a WAN;
LAN is typically cheaper than WAN to implement/ maintain (as the
equipment required for LAN is less expensive);
WAN includes a large number of devices connected together, LAN includes
less;
WANs are typically slower than LANs due to the distance data must travel;
WAN requires hardware to connect different networks, such as a router, LAN
can be simple and does not need to connect to other networks;
11. [Maximum mark: 2] 22M.1.SL.TZ0.4
Outline the reason for compression when transmitting data. [2]

Markscheme

Award [2 max].
The reason for compression when transmitting data is to save on transfer
times;
As it reduces the number of bits needed to represent data (when compared
with the original data);

Compressing data involves modifying/restructuring files, so that they take


up less space;
And this results in cost savings in cloud storage;

To take up less bandwidth;


Because data compression reduces the size of files to be transmitted over a
network;

Note to examiners: Award [1] for a reason (for example, to save data usage for sending files over the
internet, to save storage capacity, to speed up file transfer, to decrease costs for network bandwidth, etc.),
and award [1] for an expansion.

12. [Maximum mark: 2] 22M.1.SL.TZ0.10


Outline one reason for the use of standards in the construction of
networks. [2]

Markscheme

Award [2 max]
Standards ensure compatibility between nodes on the network;
Through the use of common techniques/protocols/language;
13. [Maximum mark: 2] 21M.1.SL.TZ0.6
Identify two reasons why fibre optic cable would be preferred over
wireless connectivity. [2]

Markscheme

Award [2 max]
Fibre optics allow faster transmission speeds;
Fibre optic cables are more secure/harder to break into;
Fibre optic cable transmission is more reliable/less likely to suffer
interference;
Fibre optics allow transmission over longer distance;
Fibre optics allow greater bandwidth;

14. [Maximum mark: 1] 21M.1.SL.TZ0.9


Define the term data packet. [1]

Markscheme

Award [1 max]
A unit of data made into a single unit (that travels along a given network
path);
A data packet travels through a network as a unit i.e. with all parts kept
together;
15. [Maximum mark: 15] 21M.1.SL.TZ0.12
A school currently has a cabled network but wants to add wireless networking
across the whole campus.

(a) Describe two hardware components the school will need to


implement the wireless network. [4]

Markscheme

Award [4 max]

(Wireless) router;
A central hub for all the computers to connect to;
Enables wireless network packet forwarding and routing;

Wireless Network Interface Card (NIC);


To allow the computer to ‘talk to’ the (wireless) router;

Wireless access points;


allow Wi-Fi devices to connect to a wired network;

Wireless repeaters;
To expand the reach of the network;

Mark as 2 and 2.

(b) Identify two advantages to the students of the new wireless


network. [2]

Markscheme

Award [2 max]
The ability to use their own devices at school;
The ability to access the school network from anywhere in the school;
No cables laid, so reduces the risk of tripping over cables;
Numbers of connections are not limited to cable ports, so greater numbers
of students can connect at any given time;

There are concerns that unauthorized people could access the data on the
wireless network.

(c) Outline two methods the school could employ to prevent


network data from being accessed over their wireless system. [4]

Markscheme

Award [4 max]

Use of encryption;
So that data cannot be understood if it is intercepted;

Use of user authentication/usernames and passwords;


To prevent unauthorized access to the system;

Setting up a file of accepted MAC addresses;


To only allow access to the network by registered mobile devices;

Hide network ID;


So that the wireless network is not publicly seen;

Mark as 2 and 2.

The school has decided to implement a virtual private network (VPN) to provide
access to its network.

(d) Identify two technologies the school would require to provide


a VPN. [2]

Markscheme
Award [2 max]
Client VPN software (to make a secure remote connection);
VPN-aware routers and firewalls (to permit VPN traffic to pass);
VPN appliance/server (to handle incoming VPN traffic);
Encryption protocol IPSec or SSL;

(e) Explain one benefit to the staff of using a VPN to remotely


access the school network. [3]

Markscheme

Award [3 max]
Enhanced security of data;
for example, using encryption;
This prevents unauthorised access;

Remote access to data and resources (from any location);


Normal access of materials on the network;
as though the user was using the network on site;
16. [Maximum mark: 15] 21M.1.SL.TZ0.12
A school currently has a cabled network but wants to add wireless networking
across the whole campus.

(a) Describe two hardware components the school will need to


implement the wireless network. [4]

Markscheme

Award [4 max]

(Wireless) router;
A central hub for all the computers to connect to;
Enables wireless network packet forwarding and routing;

Wireless Network Interface Card (NIC);


To allow the computer to ‘talk to’ the (wireless) router;

Wireless access points;


allow Wi-Fi devices to connect to a wired network;

Wireless repeaters;
To expand the reach of the network;

Mark as 2 and 2.

(b) Identify two advantages to the students of the new wireless


network. [2]

Markscheme

Award [2 max]
The ability to use their own devices at school;
The ability to access the school network from anywhere in the school;
No cables laid, so reduces the risk of tripping over cables;
Numbers of connections are not limited to cable ports, so greater numbers
of students can connect at any given time;

There are concerns that unauthorized people could access the data on the
wireless network.

(c) Outline two methods the school could employ to prevent


network data from being accessed over their wireless system. [4]

Markscheme

Award [4 max]

Use of encryption;
So that data cannot be understood if it is intercepted;

Use of user authentication/usernames and passwords;


To prevent unauthorized access to the system;

Setting up a file of accepted MAC addresses;


To only allow access to the network by registered mobile devices;

Hide network ID;


So that the wireless network is not publicly seen;

Mark as 2 and 2.

The school has decided to implement a virtual private network (VPN) to provide
access to its network.

(d) Identify two technologies the school would require to provide


a VPN. [2]

Markscheme
Award [2 max]
Client VPN software (to make a secure remote connection);
VPN-aware routers and firewalls (to permit VPN traffic to pass);
VPN appliance/server (to handle incoming VPN traffic);
Encryption protocol IPSec or SSL;

(e) Explain one benefit to the staff of using a VPN to remotely


access the school network. [3]

Markscheme

Award [3 max]
Enhanced security of data;
for example, using encryption;
This prevents unauthorised access;

Remote access to data and resources (from any location);


Normal access of materials on the network;
as though the user was using the network on site;
17. [Maximum mark: 15] 20N.1.SL.TZ0.7
A school has a local area network (LAN) connecting its computers and peripheral
devices. The LAN also provides access to the internet.

(a) Describe the role of a router in this network. [3]

Markscheme

Award [3 max].
controls the flow of data in the network;
inspects address of data packets;
directs to the appropriate network path/ selects a path between networks
(by inspecting address of data packets);
securely transmits data packets (across that path toward the intended
destination);

Users have been troubled by slow speeds when accessing the internet.

(b) Outline two reasons why there might be a reduction in data


transmission speed at certain times. [4]

Markscheme

Award [4 max].
malicious software/spyware/malware / viruses;
attacking the system;

the type of connection;


valid outline for the slow down (depending on the type of connection);

Note: There are many types of internet connection: wireless connections, wireless hotspots, mobile
internet, broadband connections, fixed wireless and satellite connection, cable, DSL;

hardware malfunction;
internet speed can considerably slow down if modem-router configuration
is not correct / updated;

external factors;
during the peak hours of daytime the most visited websites encounter
more network traffic than what has been anticipated;

NOTE: Accept examples. For example, too many students try to connect to an e-learning site at the same
time.

Mark as 2 and 2

(c) Outline two measures that the school could take to safeguard
its data from unlawful access via the internet. [4]

Markscheme

Award [4 max].
Preventing unauthorized access/No access without user names/passwords;
which should be regularly changed/made difficult to guess;

Data should be encrypted;


Allowing only those with decrypting code access;

Teachers/students should be trained for safe practices;


to create a risk-conscious /security-aware culture within the school;

Installation of virus checkers/spyware software;


to prevent damage to data files or the system / to prevent data being
extracted from the files/system;

Mark as 2 and 2

Note: Accept appropriate measures such as physical security measures / access control / data security /
network and communication security / user awareness and education, etc.

(d) The inventory of office supplies used in the school is stored on


the computer as a single file.
Each of the office supplies in the inventory (such as paper, ink,
toner, printers, pens, staplers, pencils and scissors) has a unique
ID number, name, maximum quantity, minimum quantity and
remaining quantity.

Outline the steps in an algorithm that would output a list of


supplies with the quantity to be ordered. [4]

Markscheme

Award [4 max].
Award [1] for looping through the inventory file;
Award [1] for reading the supply data record (ID number, name, maximum quantity, minimum quantity and
remaining quantity);
Award [1] for checking if the quantity remaining is less than minimum quantity;
Award [1] If so, calculate the quantity to be ordered (number to buy) / as the maximum quantity minus the
quantity remaining;
Award [1] for outputting the name/ID number of the office supply and the number to buy;

Example 1:

while not end of inventory file


read supply data record from file
if remaining quantity < minimum quantity
then
numbertobuy = maximum quantity – remaining quantity
output ("Reorder ", ID, name, numbertobuy)
end if
end loop

Example 2:

for each item in the inventory loop


with item do
if remaining quantity < minimum quantity then
output "Reorder ", ID, name, (maximum quantity – remaining quant
end if
end do
end loop
18. [Maximum mark: 15] 19N.1.SL.TZ0.9
(a) Outline two advantages of a school using a computer network. [4]

Markscheme

Award [4 max]
File sharing/resource sharing;
instead of using a disk or USB key to carry files from one computer to
another files can be shared directly using a network/all computers in the
network can share resources such as printers, scanners;

Communication;
students/teachers can communicate with people around the world via the
network;

Interactive teamwork;
software (like Microsoft Office) enables many users to contribute to a
document concurrently;

Flexible access;
network allows students to access files from different computers
(throughout the network) (one can begin work on a project on one
computer and finish up on another);

Software cost;
software products are available for networks at a substantial savings in
comparison to buying individually licensed software;

Software management;
load software on the server saves time compared to installing and tracking
files on independent computers/upgrades are also easier because changes
only have to be done once on the file server instead of on individual
computers;

Improved network security;


if the school has its own network, it can monitor network traffic / can create
a security culture (everyone who has a username and password is
responsible for keeping data secure);

Mark as [2] and [2].

(b.i) Describe the purpose of the following hardware component of


a network: Router [2]

Markscheme

Award [2 max]
A network router is a hardware device that is connected to multiple
channels for different networks;
through an interface that is situated on each network;

Router acts as a processing unit for information packets;


it duplicates information packets for use during transmission from one
network to another;

The router uses a protocol or set of rules;


to determine which information packets are to be routed to certain
interfaces within the network;

(b.ii) Describe the purpose of the following hardware component of


a network: Network interface card (NIC) [2]

Markscheme

Award [2 max]
Network interface cards are used to connect each computer to the network;
so they can communicate with the network router to receive information
packets;

Interface cards determine the infrastructure of a local area network (LAN);


and allow all of the computers to connect to the network;
(c) Outline why protocols are necessary. [2]

Markscheme

Award [2 max]
Protocols define the rules that govern network communication (for
example, packet format, type and size, what happens when an error occurs,
and which part of the network is supposed to handle the error and how);

Computer networks consists of various types of equipment (such as routers,


switches, hubs and network interface cards) and the equipment comes
from different vendors, but they must all work together or the network does
not operate correctly;

Protocols work in layers (the highest being what the user sees, and the
lowest being the wire that the information is transferred along) and these
layers communicate with each other according to the rules (allowing
communication to occur accurately and efficiently);

(d) Define the term data encryption. [1]

Markscheme

Award [1 max]
Data encryption refers to calculations/algorithms that transform plain text
into a form that is non-readable to unauthorized parties (authorized
recipient of an encrypted text uses a key and the algorithm to decrypt the
data/ to transform it to the original plain text version);

(e) Evaluate the use of trusted media access control (MAC)


addresses as one method of network security. [4]

Markscheme
Award [4 max]
Each (wireless network) adapter has a unique label called a MAC address;

Routers uses these addresses to identify/authenticate computers (routers


include an option to whitelist or blacklist certain devices based on MAC
addresses, so access could be restricted to any device which is not in the
whitelist);

One disadvantage is that the whitelist should be amended any time a new
device is purchased / when access to guests should be granted;

Also this method is useless against hackers who use programs which
intercept data passing through network and report the MAC address of any
device communicating on the network;

19. [Maximum mark: 2] 19M.1.SL.TZ0.11


Outline one reason why protocols are used in communications
between computers. [2]

Markscheme

Award [2 max].
To provide a set of rules/procedures;
To enable two or more different electronic devices/computers/entities to
understand each other during data transfer / enable successful
communication;
20. [Maximum mark: 2] 19M.1.SL.TZ0.12
Identify two characteristics of a personal area network (PAN). [2]

Markscheme

Award [2 max].
Smallest type of network;
Consists of connected devices in close proximity to the individual using
them;
Connected via Bluetooth/wireless;
Suitable example: smartphone to car connection;

21. [Maximum mark: 3] 19M.1.SL.TZ0.13


Explain how data is transmitted by packet switching. [3]

Markscheme

Award [3 max].
A message/the data is broken into a number of parts;
Which are sent independently;
…over the optimum route for each packet;
The individual parts are reassembled at the destination;
Each packet contains the (IP) address of both the sender and recipient;
22. [Maximum mark: 15] 19M.1.SL.TZ0.15
A company that provides training for teachers plans to set up a training room in
its offices with a network of 15 computers. Each computer has 1 TB of storage
and 16 GB of random access memory (RAM).

(a) Identify two characteristics of RAM. [2]

Markscheme

Award [2 max].
RAM is volatile / contents erased when power is switched off;
Access speed is fast / faster than hard drive;
Data / instructions can be read from and written to it / /RAM can be
overwritten;
Size is limited;

(b) State the purpose of persistent storage on the computers. [1]

Markscheme

To store programs / files / data in a non-volatile device so it isn’t lost;


Stores more data as it has a larger capacity;

In order to minimize costs, the company decided only to install general


application software on the training computers.

(c) Identify two types of general application software that would


be installed on the training computers. [2]

Markscheme

Award [2 max].
Word processor;
Spreadsheet;
Database management system;
Email;
Web browser;

Allow any general purpose application that is appropriate for a ‘training room computer’

The company has decided to allow the teachers to use their own devices in its
training room by adding wireless networking.

(d.i) Outline one advantage to the company of implementing this


change. [2]

Markscheme

Award [2 max].
May save money;
Due to not having to supply all the training computers;

May be able to increase the size of the training group;


Which may generate more income;

Trainees / teachers likely to be more familiar with software on own machine


(and how new training software interacts with OS / user interface);
Making training sessions more efficient / allowing trainer to concentrate on
the training rather than using generic applications;

(d.ii) Outline one disadvantage to the company of implementing


this change. [2]

Markscheme

Award [2 max]
May cause security issues;
Due to multiple users having network access from their “unsecured”
devices;
May interfere with running of training sessions;
As some machines may not be compatible;

(e) Describe one method of security that may be used on this


wireless network. [2]

Markscheme

Award [2 max]
Encryption;
Scrambles the contents of the network transmissions so that if they are
intercepted they can’t be understood (without the decryption key);

User ID (and password);


Only allows authorized users to access the network;

Media Access Control (MAC) addresses;


Unique identification codes embedded in networkable equipment so that
only authorized equipment may access the network;

Firewall;
Checks traffic coming into the network and leaving the network, and can
block suspicious data;

(f ) Explain why the speed of data transmission on the wireless


network in the training room may vary. [4]

Markscheme

Award [4 max].
Mark as [2] and [2].

The speed of data transmission (on a wireless network) slows down;


The further the receiver is from the transmitter;
Passing through obstructions such as solid walls;
Can slow down transmissions (on a wireless network);

The bandwidth available for transmission on a wireless network is finite;


So, transmission speeds can be affected if the number of users on the
network increases;

Note to examiners: Answers must relate to wireless networks and not be a comparison between cabled and
wireless networks.

23. [Maximum mark: 2] 18N.1.SL.TZ0.1


Outline what is meant by the term computer network. [2]

Markscheme

Award [1] for identifying the nature of a network and [1] for a development of the first point up to [2 max].

A group of computers and other computing hardware devices that are


linked together through communication channels/cables/wirelessly;
To enable communication (sharing files, sharing information) between
systems/among a wide range of users;
24. [Maximum mark: 4] 18N.1.SL.TZ0.6
Describe how data is transmitted by packet switching. [4]

Markscheme

Award [4 max].

Packet switching entails data being separated into specially formatted


units (packets);
Each packet contains data and information such as packet number, address
that identifies the sending computer and intended recipient, etc.;
Packets are routed from source to destination using (different) network
switches and routers;
Using these addresses, network switches and routers determine how best to
transfer the packet on the path to its destination;
Packets are reassembled at the destination (using packet numbers);
If any of packets is missing it should be retransmitted;
25. [Maximum mark: 6] 18N.1.SL.TZ0.5
An international company is in the process of moving its Head Office from
Europe to Asia.

(a) Identify two possible compatibility issues as a part of data


migration. [2]

Markscheme

Award [1] for each possible compatibility issue identified up to [2 max].

Language differences/different character set;


Different conventions of representing various data/currencies, dates, etc.;
Incompatible software/incompatible hardware;

(b) Outline how a virtual private network (VPN) will allow


employees who are in Europe to communicate with the Head
Office in Asia. [2]

Markscheme

Award [1] for identifying how VPN will allow employees to communicate and [1]for a development up to
[2 max].

VPN allows secure communication with the Head Office in Asia;


A VPN is the company’s private network that uses a public network (in this
situation the Internet) to connect remote sites/employees together;
Privacy is protected using VPN tunneling;
VPN uses encrypted connections routed through the Internet from the
company's private network (Europe)to the remote site in Asia (or
employee);
Hiding IP addresses to prevent unwanted exposure and data leaks;
Data security is ensured by encryption – anyone intercepting the encrypted
data cannot read it;
(c) Outline one social issue associated with this process. [2]

Markscheme

Award [1] for identifying an issue and [1] for an expansion up to [2 max].

Employees who will not be willing to move to Asia;


Lost jobs / finding new job / income decreased;

Employees who will move to Asia;


Personal or family issues during the period of moving or in a new
environment / finances and cost of living / services such as schools,
hospitals, transport / language problems;
26. [Maximum mark: 4] 18N.1.HL.TZ0.1
(a) Outline what is meant by the term computer network. [2]

Markscheme

Award [1] for identifying the nature of a network and [1] for a development of the first point up to [2 max].

A group of computers and other computing hardware devices that are


linked together through communication channels/cables/wirelessly;
To enable communication (sharing files, sharing information) between
systems/among a wide range of users;

(b) Describe one problem resulting from low bandwidth in a


computer network. [2]

Markscheme

Award [1] for a definition of the term bandwidth and [1] for a description of an issue caused by low
bandwidth up to [2 max].

Bandwidth indicates the maximum amount of data that can be transferred


from one point to another in a unit of time;

Low bandwidth means slow network performance / extended duration


when transferring large amounts of data / loss of users’ time (money) / the
whole area (of the users) is not covered;
27. [Maximum mark: 15] 18N.1.HL.TZ0.10
An oil and gas company has a networked computer system for use of their
employees in the Head Office.

(a.i) Identify one hardware security measure that will ensure that
confidential data from the Head Office cannot be accessed. [1]

Markscheme

Award [1] for each hardware security measure identified up to [1 max].

Retina scans;
Locked doors;
Alarms;
Protection of equipment within the building;

(a.ii) Identify one software security measure that will ensure that
confidential data from the Head Office cannot be accessed. [1]

Markscheme

Award [1] for each software security measure identified up to [1 max].

Use of passwords;
Different access rights;
Encryption;

The company also uses the internet to enable communication with employees
working on exploration and production in many remote geographical areas.

(b) Identify one network security measure. [1]

Markscheme

Award [1] for each network security measure identified up to [1 max].


Encryption;
UserID;
Trusted MAC addresses;

The sub-sea oil and gas exploration and production unit of the company relies
on thousands of kilometres of pipeline which are monitored by a computer
control system which can detect leaks.

(c) Explain the environmental benefit of using a computer control


system to monitor the pipeline. [3]

Markscheme

Award [3 max].

In case of leaks (depending on severity of problem) which could cause


pollution (any environmental problem);
Computer control system can react quickly/turn on and off appropriate
devices immediately/many times in a short interval of time/(increased
efficiency);
Computer control systems are very reliable (will not be tired / will not lose
concentration);
(can continue to operate reliably 24 hours a day, 7 days a week) (increased
level of safety);
Control systems are reasonably cheap to run comparing to the cost
involved in situations which can harm environment (and human health)
(reduction of costs);

The process of detecting leaks is carried out by sensors which are continuously
monitoring changes in the flow and pressure of the liquids in the pipes.

This data is processed on a computer in the office.

If any of sensor values are outside of the acceptable parameters stored on a disk
in the office, the following error routines are performed:
an alarm is sounded on the computer at the office
an email message is sent to managers in the Head Office.
(d) Explain the relationship between sensors, output transducers
and processor in this situation. [4]

Markscheme

Award [4 max].

Input from flow/pressure sensors is analog;


AD convertors are used to convert this analog data into digital form;
Processor performs / logical and arithmetical / operations;
The result of processing is in digital form so it should be converted (by AD
convertors) into analog form;
This signal is sent to output transducers (a device that converts energy from
one form to another) (for example, alarm sounds in the office);

(e) Construct a system flowchart to represent the process described


above. [5]

Markscheme

Award [5 max].

Award [1] for sensor input.


Award [1] for manual input and validation/configuration.
Award [1] for a disk (which is holding data).
Award [1] for a monitoring process / checking whether input values exceed the allowed range or not.
Award [1] for error routines performed.

Example 1
Example 2
28. [Maximum mark: 2] 18M.1.SL.TZ0.6
Identify two characteristics of a data packet. [2]

Markscheme

It contains a set amount of data;


It contains a fixed structure (or identify elements of the structure other than
data);
It contains data that is to be sent via a communications channel;
It contains specific details for transmission e.g. address of sender and
receiver, error codes etc.;

Award 2 marks if two of the contents of a packet are given and expanded.
29. [Maximum mark: 3] 18M.1.SL.TZ0.7
Explain why protocols are used in network communications. [3]

Markscheme

Protocols are a set of rules;


(That are used) so that both sender and receiver are using/expecting the
same formats/methods;
To allow data to be transmitted successfully / without errors;
30. [Maximum mark: 15] 18M.1.SL.TZ0.11
A company has expanded its office space into nearby rooms and has decided to
set up a local area network (LAN) to support its operations.

The LAN will connect the room where the server is installed to new computers in
the additional office space. The network engineer produced the following Gantt
chart for this task.

(a) Define the term concurrent processing. [1]

Markscheme

Processes/task are carried out simultaneously/at the same time;

(b) Identify two tasks that will be carried out concurrently. [1]

Markscheme

Install connectors on wall of server room AND Install connector on wall of


new office space;
OR

Test the cabling AND Connect the new computers with the cabling;

(c) Identify two tasks that will be carried out sequentially. [1]

Markscheme

Any pair of tasks that are NOT a correct answer to part (b);

(d) After 5 years the company decided to replace the LAN with a
wireless local area network (WLAN).

Outline two advantages, to this company, of installing a WLAN. [4]

Markscheme

Award [1] for stating an advantage, [1] for expansion/example in context.


Mark as [2] and [2]

Answers may include:


Use on the move;
More versatile staff encouraged to collaborate etc.;

Allows BYOD:
Which could lead to greater productivity (as familiarity with device);

No extra equipment is needed for expansion after initial set-up;


Which will save the company time and money;

Reduces wiring;
Therefore improved safety for employees;

(e) A WLAN will introduce additional security issues for the


company.
Discuss any two of these issues and the ways in which the
[4]
company might resolve them.

Markscheme

Mark as [2] and [2].

The data can be intercepted as it goes through “the air”;


Can be resolved by strong encryption/protocols;
WPA-2 / a description of WPA-2;
Use of trusted MAC addresses;
Regular changes of router password; [2 max]

BYOD issues leading to insecure devices;


Clear company policy regarding use;
Use of sand-box;
Only approved devices allowed;
MAC addresses – only adding clean and tested devices brought in by staff;
Installation of MDM services;
Authentication (user ID + password on all devices including BYOD);
Security features added by company; [2 max]

(f ) The company is considering expanding their network to allow


employees to connect from anywhere in the world. The
expanded network would need to provide security and allow
the employees full functionality of the internal network.

Explain how setting up a virtual private network (VPN) would


provide a suitable solution. [4]

Markscheme

A VPN/tunneling allows the employee’s device to appear to be part of / a


node of the internal company network;
Thus affording him/her full access to the network resources;
Data that passes through a VPN can be encrypted;
So any unauthorized access will not be able to understand the data;

Tunnelling allows the company’s own protocols to be used/IPsec/TSL


ensure security;
Even though the data is passing over an outside network;

Multiple exit nodes / hidden IP addresses/encrypted connections;


Make it hard to distinguish where the data was generated;
31. [Maximum mark: 15] 18M.1.SL.TZ0.11
A company has expanded its office space into nearby rooms and has decided to
set up a local area network (LAN) to support its operations.

The LAN will connect the room where the server is installed to new computers in
the additional office space. The network engineer produced the following Gantt
chart for this task.

(a) Define the term concurrent processing. [1]

Markscheme

Processes/task are carried out simultaneously/at the same time;

(b) Identify two tasks that will be carried out concurrently. [1]

Markscheme

Install connectors on wall of server room AND Install connector on wall of


new office space;
OR

Test the cabling AND Connect the new computers with the cabling;

(c) Identify two tasks that will be carried out sequentially. [1]

Markscheme

Any pair of tasks that are NOT a correct answer to part (b);

(d) After 5 years the company decided to replace the LAN with a
wireless local area network (WLAN).

Outline two advantages, to this company, of installing a WLAN. [4]

Markscheme

Award [1] for stating an advantage, [1] for expansion/example in context.


Mark as [2] and [2]

Answers may include:


Use on the move;
More versatile staff encouraged to collaborate etc.;

Allows BYOD:
Which could lead to greater productivity (as familiarity with device);

No extra equipment is needed for expansion after initial set-up;


Which will save the company time and money;

Reduces wiring;
Therefore improved safety for employees;

(e) A WLAN will introduce additional security issues for the


company.
Discuss any two of these issues and the ways in which the
[4]
company might resolve them.

Markscheme

Mark as [2] and [2].

The data can be intercepted as it goes through “the air”;


Can be resolved by strong encryption/protocols;
WPA-2 / a description of WPA-2;
Use of trusted MAC addresses;
Regular changes of router password; [2 max]

BYOD issues leading to insecure devices;


Clear company policy regarding use;
Use of sand-box;
Only approved devices allowed;
MAC addresses – only adding clean and tested devices brought in by staff;
Installation of MDM services;
Authentication (user ID + password on all devices including BYOD);
Security features added by company; [2 max]

(f ) The company is considering expanding their network to allow


employees to connect from anywhere in the world. The
expanded network would need to provide security and allow
the employees full functionality of the internal network.

Explain how setting up a virtual private network (VPN) would


provide a suitable solution. [4]

Markscheme

A VPN/tunneling allows the employee’s device to appear to be part of / a


node of the internal company network;
Thus affording him/her full access to the network resources;
Data that passes through a VPN can be encrypted;
So any unauthorized access will not be able to understand the data;

Tunnelling allows the company’s own protocols to be used/IPsec/TSL


ensure security;
Even though the data is passing over an outside network;

Multiple exit nodes / hidden IP addresses/encrypted connections;


Make it hard to distinguish where the data was generated;
32. [Maximum mark: 15] 17N.1.SL.TZ0.12
A wireless local area network (WLAN) is used to extend access to a school’s wired
local area network.

(a) Identify one hardware component of the WLAN, other than


computers. [1]

Markscheme

Award up to [1 max].
Wireless router/modem;
Access points;
Switch;
Wireless repeater/extender/booster;

The advantages of this WLAN are user-mobility and economical access points.

(b) Outline two disadvantages of this WLAN. [4]

Markscheme

Award [1] for identifying a disadvantage and [1] for an expansion, for two disadvantages up to [4 max].

Data transfer will decrease (compared with a wired LAN);


Because the number of computers using the network increases;
(and because) WLAN has lower bandwidth than a wired LAN;

Less data security;


As devices from outside the school can access the network/intercept
transmissions;

More easily open to misuse;


As teacher/administrator cannot directly monitor a specific
student/teacher/ machine;
Intermittent connectivity due to physical barriers (walls);
Results in low transfer/speed and may hinder operations.

Note: Accept any reasonable points, provided they are appropriately elaborated.

(c) Identify three ways in which the network administrator can


reduce the risk of unauthorized access to confidential data. [3]

Markscheme

Award up to [3 max].
Give each user appropriate login details/passwords;
Different access rights for students, teachers, school administrators (file-
level and share-level security);
All passwords and files should be encrypted;
Use the latest WiFi protocol/WPA2;
Require MAC address authentication;
Password protect the documents;

Note: the focus of the question is on confidential data (firewalls not accepted)

The concept of packet data transmission is used within this network.


Figure 1 shows the simplified structure of a data packet.

Figure 1: The structure of a data packet

(d) Define the term protocol. [1]

Markscheme
Set of rules for data transmission;

(e) With reference to Figure 1, explain how data is transferred by


packet switching. [6]

Markscheme

Award up to [6] as follows:

Award up to [3 max] for a general description of how data is transferred by packet switching. ([1 max] if
this general description is very simplistic and refers to just the Header/Data/Trailer already shown in the
question paper).

Award up to [3 max] for added detail that references the contents of the given data packet in the answer.

Example of general description

Data is organized in specially formatted units (data packets) which are


routed from source to destination using network switches and routers;

Network switches and routers determine how best to transfer the packet
between a number of intermediate devices (routers and switches) on the
path to its destination (rather than flowing directly over a single wire on the
path to its destination);

Data packets are reassembled at the destination;

Example of referencing content

Addresses have to be in a standard format so that each switch/routing station


recognizes the address;
Address of sender identifies the sending computer, so that any packets not
received can be re-requested;
Address of receiver identifies intended recipient so it can be forwarded on
correctly;
The protocol used must be identified so that the correct rules are followed;
Size of packet / size of fields in packet – All packets/fields must have the same size so
that the data can be reassembled;
Sequence number so that packets can be reassembled in correct order;
Transmission codes to show whether the data packet is transmitted or re-
transmitted;
Control bits, to maintain the integrity of the data by ensuring that the data
received is the same as the data sent;
Error checking code – when an error is detected, an algorithm either corrects the
error or requests that the packet is resent;

© International Baccalaureate Organization, 2024

You might also like