25
Networks Table of Contents Old Syllabus (2006):................................................... 1 Old Syllabus Questions and MS (2006-2013):.............................2 New Syllabus (2014-)................................................... 9 New Syllabus Questions (2014-)........................................ 11 Old Syllabus (2006): 3.4.1 Define local area network (LAN), wide area network (WAN), server and client. 3.4.2 Explain basic network topologies. Students must be able to explain and illustrate star and bus networks as well as hybrids involving both these networks. 3.4.3 Explain the hardware required in networking. Hardware should include communications links (cables, microwave, fibre optics and so on) hub, switch, node and router. 3.4.4 Define the terms “standard protocol”, “data integrity” and “data security” in the context of data transmission across a network. Students must know that standard protocols are a set of rules that are internationally recognized in the transmission of data. The difference between data security and data integrity must also be recognized. Students do not need to know specific or technical details such as the ISO (OSI) system of layers, TCP/IP and so on. 3.4.5 Explain the software involved in networking. Students must understand the role of communications software in connecting local and wide area networks and the need to deal with protocols and data security. 3.4.6 Describe suitable methods to ensure data integrity in the transmission of data. Error-checking codes such as check sums (block character checks) and parity checks must be understood. The reasons for retransmission should be understood. The quality of communication lines should be considered. 3.4.7 Describe suitable methods to ensure data security 6.4.1 Outline the role of the computers used in the separate type of networks: WAN, LAN and the Internet. Aryan Bhasin

Aryan Bhasin - Old Syllabus (2006): · Web viewNew Syllabus Questions (2014-) 8. Identify two key features of a peer-to-peer (P2P) network. [2] Award up to [2 marks max]. Examples

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Networks

Table of ContentsOld Syllabus (2006):..................................................................................................................................1

Old Syllabus Questions and MS (2006-2013):............................................................................................2

New Syllabus (2014-)................................................................................................................................9

New Syllabus Questions (2014-)..............................................................................................................11

Old Syllabus (2006):3.4.1 Define local area network (LAN), wide area network (WAN), server and client.3.4.2 Explain basic network topologies.

Students must be able to explain and illustrate star and bus networks as well as hybrids involving both these networks.

3.4.3 Explain the hardware required in networking. Hardware should include communications links (cables, microwave, fibre optics and so on) hub,

switch, node and router.3.4.4 Define the terms “standard protocol”, “data integrity” and “data security” in the context of data transmission across a network.

Students must know that standard protocols are a set of rules that are internationally recognized in the transmission of data. The difference between data security and data integrity must also be recognized. Students do not need to know specific or technical details such as the ISO (OSI) system of layers, TCP/IP and so on.

3.4.5 Explain the software involved in networking. Students must understand the role of communications software in connecting local and wide area

networks and the need to deal with protocols and data security. 3.4.6 Describe suitable methods to ensure data integrity in the transmission of data.

Error-checking codes such as check sums (block character checks) and parity checks must be understood. The reasons for retransmission should be understood. The quality of communication lines should be considered.

3.4.7 Describe suitable methods to ensure data security6.4.1 Outline the role of the computers used in the separate type of networks: WAN, LAN and the Internet.

The roles of providers, servers and clients should be understood for each of these networks. Students should be able to select the appropriate type of network for a given situation. They must understand the role of gateways.

6.4.2 Describe the features of communications needed for networking. Ethernet, public and private telephone lines, ISDN, ADSL, fibre optic and wireless methods should

all be familiar and students should be able to select the most suitable method of communication in a given situation, and to state the advantages of each method. Technical details will not be required.

6.4.3 Describe packet switching. Students need to be aware that when a message is dissembled into packets, the packets may take

different paths and pass through different nodes to arrive at the same destination, and that packets can be discarded. Virtual circuits are not required.

Aryan Bhasin

Old Syllabus Questions and MS (2006-2013):

Outline two precautions that a mobile device user can take to prevent their data from being compromised if they lose

their mobile device.

Assign a password to the device;So it cannot be accessed by an unauthorized user;

Do not store sensitive data on the smartphone;So that it is not there to be found if the device is lost;

Do not store username/password account logins (or “remember me” cookies) on the device;So somebody finding the

device will not be able to access your accounts;

Compare the use of Ethernet with Bluetooth for data communication in smartphones

Bluetooth is much slower than Ethernet;Ethernet requires a physical connection, Bluetooth does not;Ethernet is

more secure than Bluetooth;An Ethernet network requires additional hardware (routers, hubs, etc). Bluetooth does

not;

Many mobile phones now have GPS integrated into them so that the user’s location can be sent to data services.

(e)  Discuss the advantages and disadvantages of letting a mobile device transmit the user’s location.

Advantages:

Emergency services can locate a distress call;Friends can see where you are and meet you;Advertisements could be

tailored for things that are near you;

Disadvantages:

Illegal surveillance is possible;Advertisers could profile your physical habits as well as your online;Loss of location

information (eg in a tunnel) could create erroneous data in systems;

Outline one way in which this use can harm the health of mobile phone users.

By being too engaging;Causing the user to not pay attention to the real world;

By taking up too much of the users’ time; Causing them to exercise or socialize less;

Explain two consequences of the change of protocols for 4G phones.

Seamless integration with internet service; Allows more effective communication;

Aryan Bhasin

The IP routing/handling hardware and software design is standard; So designs can be re-used thereby reducing unit

costs;

The “translation” between the cellular and Internet protocols is no longer needed;Which makes the network faster,

overall;

[4 marks]

Discuss the effects that the widespread ownership of smartphones is having on students.

Positive: 1. Contact teachers with queries 2. Research topics 3. Replace expensive textbooks 4. Make study schedules 5. Store PowerPoint presentations Negative: • Become a distraction in class • Reliance on smartphones as knowledge source • Plagiarism issues • Cheating in exams

Aryan Bhasin

Define the terms client and server in terms of a computer networ

State two functions included in a network data communications protocol.

10. (a)

use of passwords;different permissions for different users; any example of physical security;etc.

(b) fire wall; encryption;

Explain one advantage of a star network topology over a bus network topology.

Outline one key task a packet switched network protocol must be able to achieve

Aryan Bhasin

State two basic network topologies.

Star; Bus; Ring;

Outline the need for a protocol in data transmission across a network.

To establish standard method/agreed way;

For transferring data between devices;

In relation to computer networks, (a) define the meaning of the term wide area network (WAN). [2 marks] (b) explain one advantage of using packet switching in a WAN.

3. Outline three characteristics of a communications network. [3 points]

7. Describe how a check sum could ensure data integrity in the transmission of data

Aryan Bhasin

7. Explain two ways of reducing the time required to transmit data in a computer network.

11. Outline the role of a gateway in a Wide Area Network.

Aryan Bhasin

13. Identify three pieces of information that a data packet  must contain.

Aryan Bhasin

11. State two resources that could be shared on a LAN. [2 marks]

Aryan Bhasin

Database/data files; Software; Backing storage devices; Output devices / printer; etc.

12. State two possible communication links that could be used to connect the LAN to a WAN.Fibre optic cable; Digital line/ISDN line/ADSL; Satellite link;

Outline one advantage and one disadvantage to protest groups of communicating by social networks.

Aryan Bhasin

5. A school network is connected to the Internet. (a) Outline one threat to the security of the school’s data that may arise from the use of the Internet. [2 marks]

Aryan Bhasin

(b) Outline two implications of a school administrator being able to monitorstudents’ use of the Internet. [4 marks]

Aryan Bhasin

New Syllabus (2014-)

Network fundamentals

3.1.1 Identify different types of networks. 2 Examples include local area network (LAN), virtual local area network (VLAN), wide area network (WAN), storage area network (SAN), wireless local area network (WLAN), internet, extranet, virtual private network (VPN), personal area network (PAN), peer-to-peer (P2P).

Aryan Bhasin

S/E, INT Globalization has been accelerated by the technical advances linked to network development.

3.1.2 Outline the importance of standards in the construction of networks. 2

INT Standards enable compatibility through a common “language” internationally.

3.1.3 Describe how communication over networks is broken down into different layers.

2

Awareness of the OSI sevenlayer model is required, but an understanding of the functioning of each layer is not.

3.1.4 Identify the technologies required to provide a VPN. 2

3.1.5 Evaluate the use of a VPN. 3 S/E, AIM 9 The use of a VPN has led to changes in working patterns.

Data transmission

3.1.6 Define the terms: protocol, data packet. 1

3.1.7 Explain why protocols are necessary. 3 Including data integrity, flow control, deadlock, congestion, error checking.

3.1.8 Explain why the speed of data transmission across a network can vary. 3

3.1.9 Explain why compression of data is often necessary when transmitting across a network.

3 S/E, INT Compression has enabled information to be disseminated more rapidly.

3.1.10 Outline the characteristics of different transmission media. 2

Characteristics include: speed, reliability, cost and security.

Transmission media include: metal conductor, fibre optic, wireless.

3.1.11 Explain how data is transmitted by packet switching. 3

Wireless networking

3.1.12 Outline the advantages and disadvantages of wireless networks. 2

S/E wireless networks have led to changes in working patterns, social activities and raised health issues.

Aryan Bhasin

3.1.13 Describe the hardware and software components of a wireless network. 2

3.1.14 Describe the characteristics of wireless networks. 2

Include: WiFi; Worldwide Interoperability for Microwave Access (WiMAX); 3G mobile; future networks.

S/E, INT Connectivity between different locations.

3.1.15 Describe the different methods of network security. 2

Include encryption types, userID, trusted media access control (MAC) addresses.

S/E Wireless networks have led to concerns about the security of the user’s data.

3.1.16 Evaluate the advantages and disadvantages of each method of network security.

3

New Syllabus Questions (2014-)8. Identify two key features of a peer-to-peer (P2P) network. [2]Award up to [2 marks max]. Examples of features: No central server; Resources are more widely available (storage, bandwidth, computing power); Redundancy/recovery; Supports file sharing for collaborative work;

Aryan Bhasin

9. (a) Define the term protocol. [1] (b) Outline why protocols are necessary. [2]

Aryan Bhasin

Aryan Bhasin

3. Outline one example of the use of a virtual private network (VPN). [3]

Aryan Bhasin

2. By making direct reference to the technologies used, explain how a virtual private network (VPN) allows a travelling salesperson to connect securely to their company’s network. [4]

Aryan Bhasin

8. Explain, in terms of resources, how Voice over IP provides a collaborative working environment for a company with multiple locations nationwide.

Aryan Bhasin

Aryan Bhasin

Aryan Bhasin

3. Outline one advantage and one disadvantage of wireless networks. [4]

Aryan Bhasin

5. Many different people and organizations upload scientific materials to the internet. A student uses data from the internet in a science project. Outline two ethical issues concerning this use of the internet. [4]

Points to be discussed: The data/information is deliberately incorrect; The data/information has not been validated; Intellectual property issues; Plagiarism;

Aryan Bhasin

Aryan Bhasin