Professional Documents
Culture Documents
1.3.3_-_Networks
1.3.3_-_Networks
1.3.3 - Networks
Please note that you may see slight differences between
this paper and the original.
Duration: Not set
Candidates answer on the Question paper.
INSTRUCTIONS TO CANDIDATES
• Write your name, centre number and candidate number in the boxes above. Please write clearly and in capital letters.
• Use black ink. HB pencil may be used for graphs and diagrams only.
• Answer all the questions, unless your teacher tells you otherwise.
• Read each question carefully. Make sure you know what you have to do before starting your answer.
• Where space is provided below the question, please write your answer there.
• You may use additional paper, or a specific Answer sheet if one is provided, but you must clearly show your candidate
number, centre number and question number(s).
[3]
[3]
[2]
[3]
(c) * The hotel is concerned about the security of its computer network.
Discuss the threats which potentially exist to the hotel’s computer network and how these threats could be
eliminated or reduced.
[4]
(ii) Define what is meant by the term ‘foreign key’, giving one example of where a foreign key would be used in
the hotel booking database.
Definition
Example
(iii) Describe two different ways that hashing could be used in this database.
[4]
Explain what is meant by the term ‘referential integrity’ and how this could potentially be broken.
[2]
3 In order to view a website, a user enters a website address into their web browser such as http://www.ocr.org.uk.
The website will then be displayed onto the user’s screen.
Explain how the Domain Name System (DNS) plays a role in websites being loaded.
[4]
The solicitors would like to set up a computer network to allow them to work together more effectively.
Each review includes a score out of 5. When the score is entered on the website it is checked in the browser to
ensure a number no higher than 5 has been entered. It is then checked again on the server.
[1]
(ii) Explain why it is important that the review score that the user entered is also checked server-side.
[2]
[2]
[2]
(ii) State the name of the four layers of the TCP/IP stack.
[4]
(i) In order to be able to access all the functionality of the meter, the computer needs a device driver. Describe
what is meant by the term ‘device driver’.
[2]
(ii) In order to transfer data, the meter and computer need an established set of rules for how they will
communicate.
State the term used for a set of rules for communication between two devices.
[1]
State the type of application that the user might use to analyse the data once downloaded.
[1]
Several of these photo frames can be placed around a house and connected in a peer to peer network.
[2]
9 Most films are now distributed to cinemas digitally. A studio allows cinemas to download its latest film 5 days
before the release date via a private download. It wants to ensure that no cinema shows it before the release
date.
Describe one technical measure the studio could use to ensure that films are not shown early.
[2]
The computers in the architect firm’s office are connected to a LAN which is connected to the Internet.
Give one advantage and one disadvantage to the architects’ firm of a client-server set up rather than a peer
to peer setup.
Advantage
Disadvantage
[2]
(ii) The LAN is connected to the Internet via a firewall. Describe the term ‘firewall’.
[1]
[1]
[3]
[5]
[2]
(ii) Explain why the programmers have chosen to store the user's IP address.
[2]
State what the value of statement would be after line 03 of the code in Fig. 8 .1 is run.
[1]
(ii) State what the value of hashInDB would be after line 04 of the code in Fig. 8.1 is run.
[1]
The username DenverJ34'; DROP TABLE users; –– is entered into the form.
(i) State what the value of statement would be after line 03 is run.
[1]
[2]
(iii) State the name of a law the user has broken by entering the username
DenverJ34'; DROP TABLE users; --
[1]
13(a) A dance group decide they are going to use the Internet to promote their work.
Explain why a connection with a high bit rate is important for this task.
[3]
[3]
(ii) Explain one advantage of layering logical protocols separately from physical protocols.
[2]
[2]
[2]
(b) Describe one piece of hardware that each shop will need to connect their LAN to the company's WAN.
[2]
The new network will enable the company to roll out a mobile phone application that allows people to place their
orders before they arrive at the shop. The company is deciding whether to use a menu-driven interface or a
natural language interface.
Producing CGI requires lots of processing power and so the company has a large number of high-performance
computers.
* The company is working on scenes from the latest Stellar Scuffles film. There is strict security around the film,
and there are worries about unauthorised people gaining access to the company's network and putting clips from
the film on the Internet.
Discuss to what extent each of the following laws is intended to address the issue of someone accessing and
distributing clips of the film online:
[9]
Elegant Bags puts its website on its servers which are given a public IP address. It also purchases the domain
name elegantbagsonline.co.uk.
Explain the automated process that takes place that allows customers to access the site when they enter the
domain name into their browser.
[3]
17 InterMovie is a service that allows users to stream movies over the Internet.
When users have played a movie it remains stored in a cache on the user’s computer. This means that someone
wanting to access the same film in future can stream it from other users rather than directly from the company’s
servers.
[1]
(ii) Explain why the company might have opted for this model.
[2]
[5]
(b) Explain two advantages of using packet switching instead of circuit switching to send a message between two
computer on a network.
[4]
(c) When a message is transmitted it is liable to corruption.
(i) A system of transmission uses a parity bit in each byte of data to identify when an error has occurred.
10111010 10100010
State which of the bytes has been corrupted and justify your answer.
[3]
to explain how a check sum is used to check data transmissions for errors.
[6]
[2]
(ii) State two advantages of having a LAN instead of a set of stand-alone machines.
[2]
[2]
[2]
The three networks are going to be combined to allow data to be stored in one location. The data will be
accessible at any computer if the correct access codes are used.
Explain how the following devices may be used in the above situation.
(i) A bridge
[2]
(ii) A gateway
[2]
21 The computers in a car showroom are connected in a network with all data being held in a central server. The
computers are used by the salesmen, but can also be used by customers to watch videos of the cars that are on
offer.
[2]
[2]
(b) TCP/IP uses packet switching.
[4]
Total 3
ii e.g. 2
AO1.1
only one point of failure
easier to manage users/access
Easier to backup
Easier to keep data secure.
Technicians can more easily remotely
install / monitor.
0 marks
No attempt to answer the question or
response is not worthy of credit.
Total 30
3 1 mark per bullet up to a maximum of 4 4 Award the mark for checking of cache at
marks AO1.1 any of the stages but limit to one mark for
(2) this aspect.
DNS is used to resolve IP AO1.2
corresponding to URL (2)
Request sent to DNS resolver.
Resolver checks its cache and if it
doesn’t hold the URL, it passes it in to
the TLD Name server which checks its
cache and returns the answer or
passes on to the..
Authoritative Name Server.
The IP address is returned back up to
the requesting client.
Or an error if no resolution can be
found.
Total 4
Total 9
Total 3
ii - Application 4 (AO1.1)
- Transport
- Internet
- Network Interface/(Data) Link/Physical Examiner’s Comments
(1 Mark per -, max 4)
Most candidates achieved three or four
marks on this question, the layers were
accepted in any order. Those who did not,
invariably scored zero marks.
Total 8
7 i - A program/software 2
- That controls a piece of hardware AO1.1
- Providing an interface/bridge between (2)
the device and (operating) system
(1 per -, max 2) Examiner’s Comments
ii Protocol(s) 1 cao
AO1.1
(1) Examiner’s Comments
Total 4
Total 2
Send the key / password out on the (AO2.2) Use Digital Rights Management / DRM…
release date (1)
..To keep content encrypted until given
date.
Examiner’s Comments
Some candidates lost credit on this
question by failing to mention encryption.
Total 2
Disadvantage:
– Central point of failure. (1)
Examiner’s Comments
(Max 1) To achieve this mark, candidates were
required to show an understanding that
firewalls monitor traffic going to and from a
network, many only discussed one-way
traffic.
iii Prevent unauthorised access to a 1 Accept for MP1 malicious attacks / traffic
network. (1)
To restrict applications that are used
internally that have internet (AO 1.2)
access. (1)
To restrict websites that can be
accessed from within the
company. (1)
To protect the company’s data /
intellectual property. (1)
Examiner’s Comments
(Max 1) Most candidates gave ‘to stop malicious
attacks’ which was awarded as an
interpretation of ‘to protect company data’.
Total 4
Examiner’s Comment
Most candidates achieve zero to two marks
on this question. Explanations generally
contained errors or omissions.
A fundamental explanation would suffice
for full marks e.g. ‘Transmission Control
Protocol / Internet Protocol is a set of rules
used for communicating across the
internet’.
Total 3
ii 0e5a511 1
Total 15
13 a Three from: 3
Examiner's Comments
□ Video streaming requires a large This question was answered better than
amount of data… [1] exam questions on this topic in previous
□ …In a short period of time [1] exam series. With many candidates
□ Video streaming is time sensitive [1] referring to the pertinent points.
□ Or else there are interruptions in the
video [1]
b i Three from: 3
Examiner's Comments
ii □ The physical layer can be changed 2 Allow opposite the software can be
[1] changed without making alterations to the
□ Without rewriting the software physical layer.
working on the logical layers [1]
Examiner's Comments
Total 8
Examiner's Comments
□ A WAN covers a large geographical
area.[1] These questions were generally well
□ A WAN often uses third party answered, although some candidates
connections.[1] described a LAN as having few computers
□ Less secure than a LAN [1] with a WAN having many.
OR Examiner's Comments
Total 6
15 Mark Band 3–High Level (7-9 marks) 9 AO1: Knowledge and Understanding
The candidate demonstrates a thorough The following is indicative of possible that
knowledge and understanding of to what candidates may refer to but is not
extent all three of the laws apply to this prescriptive or exhaustive:
scenario; the material is generally accurate
and detailed. The candidate is able to Any individual or organisation that
apply their knowledge and understanding produces media has their ownership of that
directly and consistently to the context media protected by the Copyright, Designs
provided. Evidence / examples will be and Patents Act. (Accept Copyright Act)
explicitly relevant to the explanation. The This means other parties are not allowed to
candidate provides a thorough discussion reproduce or redistribute it without
which is well-balanced. Evaluative permission.
comments are consistently relevant and
well-considered.
Examiner's Comments
Total 9
Total 3
ii Peer to peer means there isn’t a 2 Up to 2 marks for a valid explanation that
reliance on the company’s server (1) demonstrates application of knowledge
and its connection to the Internet (1). and understanding to given context.
This means it hasn’t got to invest in lots
of hardware and bandwidth (1) and the
system is likely to be more fault
tolerant (1).
Total 3
18 a Data is split into equal sized blocks 5 For ‘reordered’ accept reorganised or
(called packets) similar, but NOT ‘reassembled’.
Each packet has a header of
information (including destination Examiner's Comments
address and the place of the packet in
the complete message) Another question which is ideal to be
(Each packet is placed on the network answered as numbered points. Some
and) each may travel by a different candidates confused circuit and packet
route switching but most earned two or three
(At each node on the network the marks. The difficult point was that each
destination address is read and the) time the packet arrived at a node another
best route is found ‘best route’ needed to be found.
Packets need to be reordered at the
destination
c i 10101010 3
Three bytes have an odd number of
ones and as there is only one error odd
parity is being used
This byte has an even number of ones.
ii The bytes are added together… 6 Accept any indication that addition has
…101110110 been done, not just any old calculation
Any carry out of the byte is ignored…
…01110110
This is sent with the data Accept: The value is calculated at the
The same sum is done at the receiving receiving end and returned to sender for
end and the results compared comparison. This would get the last two
mark points
Examiner's Comments
Total 18
Total 8
ii –Provides a link between two dissimilar 2 Accept connect a LAN to a WAN for 1st
networks bullet point 2nd mark must be in context.
–Links the school networks to the Internet
Examiner's Comments
Total 4
Total 2
Total 6