UNIT1 - Topic 2 - Networks
UNIT1 - Topic 2 - Networks
Q1.
Some questions must be answered with a cross in a box ( ). If you change your mind about an
answer, put a line through the box ( ) and then mark your new answer with a cross ( ).
Website traffic statistics show that mobile devices, such as smartphones, are now used more often than
desktop PCs.
Mobile devices communicate over the internet using the transmission control protocol and internet
protocol (TCP/IP).
.............................................................................................................................................
Q2.
Website traffic statistics show that mobile devices, such as smartphones, are now used more often than
desktop PCs.
Phone calls can be made over the internet using voice over internet protocol (VOIP).
TCP/IP and VOIP both use packets to carry data, but only VOIP can be used for making a phone call.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q3.
Website traffic statistics show that mobile devices, such as smartphones, are now used more often than
desktop PCs.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
(ii) The mobile device will send its media access control (MAC) address to the hotspot.
Explain why the MAC address is used in making the connection.
(2)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q4.
Some questions must be answered with a cross in a box ( ). If you change your mind about an
answer, put a line through the box ( ) and then mark your new answer with a cross ( ).
A company that sells flowers has replaced its paper-based transaction system with an IT system.
When flowers are delivered to a customer, the driver records the event on a tablet.
On return to the company's premises the delivery records are transferred from the tablet to the company's
IT system.
(i) Identify the method that will transfer the records in the shortest time, once a connection has been
made.
(1)
A Bluetooth
B USB C cable
C Ethernet cable
D Micro USB cable
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q5.
Paula has a network with a home office and wants to add an entertainment room.
The existing home office has a PC and network-attached storage device (NAS). These are connected by
Ethernet and will remain as they are.
The internet connection comes into the house in the home office. It will be shared with the rest of the
network.
The rest of the house has a single Ethernet connection from the home office.
Paula has a laptop that connects to the network by Wi-Fi. This must still be possible.
The entertainment room will have a media server, a sound system, a projector and a television. These must
all have Ethernet connections.
The sound system will be controlled by the projector via Bluetooth.
The television will be able to mirror a screen display from any mobile device that has Wi-Fi enabled.
(a) Complete the diagram to show a network design that will meet Paula's requirements.
You must:
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
(c) When a video is sent to the projector it requires an Ethernet cable connection but the audio track for that video
can be sent to the sound system via Bluetooth.
Explain why the video must be sent by Ethernet but the audio only needs Bluetooth.
(2)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q6.
The design of the new system needs to specify the hardware, software, and processes required.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q7.
The buses run on four routes, stopping at tourist attractions. Speakers by each seat give a commentary on what can
be seen as a bus travels around its route.
The bus company controls the buses and ticketing from servers at the main bus station.
There is a hot backup system at a secondary bus station. The hot backup duplicates the main system. It is updated in
real time and can take over immediately if needed.
A mesh Wi-Fi network links bus stations, buses, and bus stops.
Tickets may be purchased at numerous shops around the city. A ticket is a plastic card holding details of the routes
and the date for which it is valid.
Ticket outlets and buses have near field communication (NFC) devices that can read from and write to the tickets.
Each bus stop has a display screen. The screen shows the route and estimated arrival time of the next five buses.
Each bus has a GPS receiver. The buses report their position every minute and the servers update the display screens.
Indicate:
Q8.
(i) Give one advantage of Ethernet over WiFi for connecting devices on a LAN.
(1)
.............................................................................................................................................
.............................................................................................................................................
(ii) Give one advantage of WiFi over Ethernet for connecting devices on a LAN.
(1)
.............................................................................................................................................
.............................................................................................................................................
Q9.
Answer the question with a cross in the box you think is correct . If you change your mind about an
answer, put a line through the box and then mark your new answer with a cross .
The completed LAN uses a client-server network model, with six PCs connected to a server via a switch.
(i) Identify the statement that only applies to a client-server network model.
(1)
A A network of computers where services must be requested from an internet service provider
B A network of computers where any computer can provide services to any other computer
C A network of computers where services must be requested from one computer
D A network of computers where all services are provided over the internet
Mikhail connects his laptop to the LAN. He uses media access control (MAC) addressing to prevent unauthorised
mobile devices connecting to the LAN.
.............................................................................................................................................
(ii) Describe how MAC addressing can be used to prevent unauthorised mobile devices connecting to the LAN.
(2)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q11.
Mikhail's employees often need to transfer large video files over the network.
The Ethernet cables connecting the LAN are rated at 10 gigabits per second.
(i) Construct an expression to show how long it should take, in seconds, to transfer a 20 gibibyte file.
You do not need to do the calculation.
(3)
(ii) In practice, file transfer speeds do not reach 10 gigabits per second.
Give two reasons why file transfer speeds do not reach 10 gigabits per second in this cable network.
(2)
1 ..........................................................................................................................................
.............................................................................................................................................
2 ..........................................................................................................................................
.............................................................................................................................................
Q12.
.............................................................................................................................................
Q13.
Visitors to the botanic garden can pay the entry fee by using a near-field
communication (NFC) card.
(i) Describe two security risks of using NFC transmission for this purpose.
(4)
1 ..........................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
2 ..........................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
(ii) Explain one method of protecting the data being transmitted by NFC.
(2)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q14.
A railway museum consists of two buildings and several outdoor exhibition spaces.
The museum wants a new network to provide extra facilities for visitors.
Q15.
A railway museum consists of two buildings and several outdoor exhibition spaces.
The museum wants a new network to provide extra facilities for visitors.
Explain what measures could be taken to reduce the threat of hackers from the internet.
(6)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q16.
The Open Systems Interconnection (OSI) model is a 7-layer model of communications protocols. It is used to
connect computers over the internet.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q17.
The Open Systems Interconnection (OSI) model is a 7-layer model of communications protocols. It is used to
connect computers over the internet.
Q18.
The Open Systems Interconnection (OSI) model is a 7-layer model of communications protocols. It is used to
connect computers over the internet.
(i) Explain one difference between the TCP/IP model and the OSI model. Do not include details of layer names or
functions.
(4)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
(ii) Most internet traffic uses Internet Protocol version 4 (IPv4) but this is being replaced by IPv6.
Give two reasons why IPv6 is replacing IPv4.
(2)
1 ..........................................................................................................................................
.............................................................................................................................................
2 ..........................................................................................................................................
.............................................................................................................................................
Q19.
In the country of Varma Loko, main roads often run through small villages. The Transport Ministry has installed a
traffic management system in each village.
One crossroads in each village has a set of traffic lights controlling the main road and the side roads. The system is
controlled by a computer.
• The default setting is for the lights on the main road to be green (go) and the lights on the side roads to be red
(stop).
• Proximity and speed sensors are used to detect the two conditions for when the lights will change.
The conditions are:
• when a vehicle stops at a red light on the side road
• when a vehicle enters the village on a main road over the speed limit.
• An emergency vehicle can send a radio signal to change the lights.
• If a vehicle moves past a red light on any road, a digital camera takes a photo and uploads it to the local police
headquarters via the internet.
You only need to show devices and connections for the lower side road and the right-hand part of the main road.
You should:
Q20.
An online-only bank needs to store large amounts of data about its customers.
Each customer can generate many transactions every day.
The bank wants to introduce multi-factor authentication to control access to its computer systems.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q21.
Campers retrieve their schedules from a file server. The file transfer program operates at Layer 7 (Application) of the
OSI 7-Layer Model.
Describe how the file transfer program passes data from the file server to its peer on the user's device.
(3)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
(Total for question = 3 marks)
Q22.
The camp is upgrading its network infrastructure to offer the latest in digital games and network access.
The computers in the games room will be used to play multi-player games. The campers play only against each
other. They cannot play with people outside the room as the computers cannot connect to the internet. The games
require a very quick network response time.
The computers in the office are used by the administration staff. All of the camp's files are stored centrally on the
site. The administration team generates a great deal of network traffic between themselves. The network traffic
generated by the administration team must not slow down the rest of the camp's network.
The common room is a separate hut 200 metres away from the main building. Campers can use their own tablets and
phones to access the Internet in the common room.
Complete the diagram to show a design for a network infrastructure that will meet these requirements.
(9)
(Total for question = 9 marks)