Академический Документы
Профессиональный Документы
Культура Документы
Figure 6 shows the topology of a particular computer network that is divided up into
segments.
Figure 6
File Server
Segment
192.168.0
Wireless
Access Point
Router 1
Segment
192.168.1
C
A
Router 2
Router and
Firewall
Switch
157.44.12.3
Segment
192.168.2
Internet
9 (a)
9 (a) (i)
What physical network topology is used within segment 192.168.2 to connect the
computers to the switch?
............................................................................................................................................
(1 mark)
9 (c)
When the computers in segment 192.168.2 were configured on the network, they were
programmed with a subnet mask.
What is the purpose of a subnet mask, and what would the subnet mask be in this
case?
Purpose: ............................................................................................................................
............................................................................................................................................
Subnet mask: .....................................................................................................................
............................................................................................................................................
(2 marks)
9 (d)
9 (e)
The computers in segment 192.168.1 use Carrier Sense Multiple Access with Collision
Detection (CSMA/CD) to determine when to transmit data.
Explain how the CSMA/CD method is used, including what happens in the event of a
collision occurring.
In this question you will also be assessed on your ability to use good English and to
organise your answer clearly in complete sentences, using specialist vocabulary where
appropriate.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
(6 marks)
____
14
(a)
(i)
(a)
(ii)
(a)
(iii)
(b)
Star;
(c)
(d)
15
(e)
Subject-related points:
(Applies to) bus (topology);
Computer monitors/listens to (data signal on cable/bus);
If (data) signal present // if cable/bus busy continue to wait;
When no (data) signal present // when cable/bus idle start to transmit;
Whilst transmitting, computer monitors cable/bus to check for collision //
to check if signal is identical to what it is sending;
Collision occurs if two computers (start) sending at same time // if two
packets/frames in transit at same time;
If collision detected, jamming signal/signal warning of collision sent;
To ensure other (transmitting) computers aware of problem // to stop
other computers sending data;
Computer that detected collision also stops sending data;
Then waits a random period before attempting to retransmit/repeating
transmission/this process;
Period is random to reduce likelihood of collision recurring (between
computers that caused collision);
If a collision occurs again then waits a longer random time before
attempting to transmit again;
Use of exponential back-off algorithm to determine wait time;
Mark Bands and Description
5-6
To achieve a mark in this band, candidates must meet
the subject criterion (SUB) and 4 of the 5 quality of
written communication criteria (QWCx).
SUB Candidate has produced a detailed description
of how CSMA/CD works, including what
happens if there is a collision (at least 5 points).
QWC1 Text is legible.
QWC2 There are few, if any, errors of spelling,
punctuation and grammar. Meaning is clear.
QWC3 The candidate has selected and used a form
and style of writing appropriate to the purpose
and has expressed ideas clearly and fluently.
QWC4 Sentences and paragraphs follow on from one
another clearly and coherently.
QWC5 Appropriate specialist vocabulary has been
used.
3-4
To achieve a mark in this band, candidates must meet
the subject criterion (SUB) and 4 of the 5 quality of
written communication criteria (QWCx).
SUB Candidate has produced a reasonable
description which may or may not cover what
happens in the event of a collision (at least 3
points).
QWC1 Text is legible.
QWC2 There may be occasional errors of spelling,
punctuation and grammar. Meaning is clear.
QWC3 The candidate has, in the main, used a form and
style of writing appropriate to the purpose, with
occasional lapses. The candidate has
expressed ideas clearly and reasonably fluently.
QWC4 The candidate has used well-linked sentences
and paragraphs.
QWC5 Appropriate specialist vocabulary has been
16
Figure 5 shows the topology of a particular computer Local Area Network (LAN) that is
divided up into segments.
Figure 5
File Server
Segment
192.168.0
Router 1
Router 2
Router and
Firewall
Segment
Segment
192.168.1
192.168.1
B
Segment
Segment
192.168.2
192.168.2
150.14.12.88
150.14.12.88
Internet
Internet
8 (a)
8 (a) (i)
:.........................................................................................
: ........................................................................................
(2 marks)
8 (b)
When the computers in segment 192.168.2 were configured on the LAN, they were
programmed with a subnet mask.
What subnet mask should have been used?
..........................................................................................................................................
(1 mark)
8 (c)
The LAN has a bus topology and has been divided into segments.
Explain why the LAN has been segmented.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
(2 marks)
8 (d)
Alternatively, the LAN could have been constructed using a star topology.
8 (d) (i)
State one advantage of using a bus topology and explain how the advantage is
achieved.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
(1 mark)
8 (d) (ii) State one advantage of using a star topology and explain how the advantage is
achieved.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
(1 mark)
Question 8 continues on the next page
(a)
(i)
(a)
(ii)
(b)
255.255.255.0;
(c)
(d)
(d)
(i)
(ii)
Max
2
Max
1
Improved security as: data only travels down one link // is not sent
throughout network // is not sent to all nodes;
Improved reliability as if one link fails the other links/nodes are not
affected;
Speed of link remains constant // speed not affected by number of
connections/collisions // faster connection as: no collisions/links not
shared;
A cable for link
R responses about terminal/computer failure
Must have explanation as well as advantage for mark
Max
1
10
5
Do not write
outside the
box
Segment
192.168.0
File
server
Router 1
Segment 192.168.1
Router 2
Segment
192.168.2
Switch
Gateway
Internet
Web server
5 (a)
5 (a) (i)
(10)
M/Jun13/COMP3
Do not write
outside the
box
11
5 (c)
When the computers in segment 192.168.1 were configured on the network, they were
programmed with a subnet mask.
What subnet mask would have been used?
............................................................................................................................................
(1 mark)
5 (d)
The student has been accessing data from the file server computer that is labelled D
on Figure 8. This file server uses a server operating system.
Explain what a server operating system is.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
(1 mark)
5 (e)
Some other students using laptops are connected to the LAN by Wi-Fi through the
Wireless Access Point that is labelled E on Figure 8. Wireless communication is
less secure than communication using cables.
5 (e) (i)
Describe one measure that could be implemented by the Wireless Access Point to
improve the security of the network.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
(1 mark)
5 (e) (ii) Explain why Wi-Fi has been chosen for this connection rather than Bluetooth.
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
(1 mark)
Question 5 continues on the next page
Turn over
(11)
M/Jun13/COMP3
12
Do not write
outside the
box
Figure 8 is repeated below so that you can answer question part 5 (f) without having to
turn back in the question paper booklet.
Figure 8 (repeated)
Segment
192.168.0
File
server
Router 1
Segment 192.168.1
Router 2
Segment
192.168.2
Switch
Gateway
Internet
Web server
The student now uploads a file from her computer to a web server over the Internet.
5 (f)
Write a detailed description of how one packet of data that the student is uploading
to the web server will be routed from her computer in the United Kingdom to the web
server that is located in Chicago in the United States of America. You may assume
that the web browser software on the students computer has already looked up, using
a domain name server, the IP address of the web server.
Your description should cover:
how the packet will be routed within the LAN from the students computer to the
gateway and
how, once it has reached the gateway, the packet will be routed across the Internet
to the web server that the data is being uploaded to.
In your answer you will be assessed on your ability to use good English, and to
organise your answer clearly in complete sentences, using specialist vocabulary where
(8 marks)
appropriate.
(12)
M/Jun13/COMP3
Do not write
outside the
box
13
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
Your answer to question 5 (f) may be continued on the next page
Turn over
(13)
M/Jun13/COMP3
14
Do not write
outside the
box
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
5 (g)
____
18
(14)
M/Jun13/COMP3
(a)
(i)
(a)
(ii)
(a)
(iii)
8 of 24
(b)
Bus (topology/network);
A Line
(c)
255.255.255.0 / FFFFFF00 /
11111111 11111111 11111111 00000000;
(d)
(e)
(e)
(i)
(ii)
9 of 24
(f)
Either:
(Possible) repackaging of packet to use
different protocol (e.g. Gateway may change
protocol)
Route determined using the (Network ID part
of the destination) IP address (Note: can infer
"IP address" if just "address" is stated, if
previously candidate has written about an IP
address)
Use of router tables / criteria to determine
next hop / (step of) path
Router decrementing "time to live" of packet
Source and destination MAC addresses
changed at each router // MAC addresses
used for each hop
How subnet mask used (MAX 2 points):
AND operation of subnet mask with students
computers IP address
AND operation of subnet mask with web
servers IP address
Result (of AND operation) is the network ID;
Network IDs compared
If they are the same, then the computers are
on the same subnet
10 of 24
11 of 24
12 of 24
(g)
13 of 24
C131901_CPT5
10/23/03
8:36 AM
Page 14
Figure 6 below shows the local area network (LAN) of the supermarket chains head office.
It consists of three Ethernet bus segments with IP addresses 192.80.0, 192.80.1 and 192.80.2
connected together by routers.
IP addresses that begin with 192 are private addresses.
The head office hosts an on-line ordering service for customers on a Web server with public
IP address 213.97.56.21.
The Web server and the local area network are connected to the Internet through a router and
firewall.
The local area network is a server-based network.
There is one file server and domain controller and one print server.
192.80.1.5
Segment
192.80.0
192.80.1.2
192.80.0.1
192.80.1.3
File server
& Domain
controller
192.80.1.4
Segment
192.80.1
Router 192.80.1.1
Print
Server
192.80.0.2
Router 192.80.2.1
192.80.2.2 192.80.2.3
192.80.2.4 192.80.2.5
Web server
213.97.56.21
192.80.0.3
Router
213.97.56.19
&
Firewall
Internet
Figure 6
M/0104/CPT5
Segment
192.80.2
C131901_CPT5
10/23/03
8:36 AM
Page 15
LEAVE
MARGIN
BLANK
15
(d)
Draw a diagram to show how segment 192.80.1 would be wired using a switch..
(2 marks)
(e) Why must the router-firewall and the Web server have public IP addresses?
...........................................................................................................................................
...........................................................................................................................................
(1 mark)
(f) The computer with IP address 192.80.1.3 uses the TCP/IP protocol to send a document
to be printed to the print server. Describe how the TCP/IP protocol is used to route the
document to its destination. Your description should cover the role of the two routers
and network card addresses.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(5 marks)
C131901_CPT5
10/23/03
8:36 AM
Page 16
16
LEAVE
MARGIN
BLANK
END OF QUESTIONS
(d)
One mark for central hub and one mark for computers connected to
hub as shown
NB If hub incorrect answer scores zero
If hub correct but computers incorrect answer scores one mark
Router can be replaced by a computer labelled with router's IP address
Router
Switch
2
(e)
(f)
(g)
(h)
To block access to/from the internal private network from/to the Internet;
To stop certain kinds of access to the Web server, e.g. telnet;
To close ports to prevent users from connecting to them;
To block connections on unwanted ports;
To prevent unauthorised access to the private computers;
A. Filtering
to max
2
Total
15
Grand Total
65
C156474_CPT5_Jan_2008
5/10/07
09:24
Page 10
LEAVE
MARGIN
BLANK
10
6 The head office of an organisation consists of several large offices, each with many
computers linked as a local area network (LAN). The LAN also links to the Internet via a
router and firewall. In each office, the computers are linked as a segment as shown in
Figure 4.
Figure 4
(ii)
Router
&
Firewall
Node A
(iii)
Router
Node B
172.31.15.3
Node A
Node B
Router
..................
Internet
(i)
Node C .............
172.31.15.4
Node C .............
172.31.19.4
Node X
Segment 172.31.15
Node Y
Segment 172.31.19
Segment 172.31.1
Node A
Router
Node B
Node C .............
172.31.45.4
Node Z
Segment 172.31.45
(a) IP addresses that begin with 172.31 are non-routable addresses. Why are these used
within the LAN?
.............................................................................................................................................
.............................................................................................................................................
(1 mark)
(b) The network manager has registered IP address 212.99.34.23 with the Internet registrar.
Referring to Figure 4, write suitable IP addresses for
(10)
(i)
....................................................................................................................................
(ii)
....................................................................................................................................
(iii)
....................................................................................................................................
(3 marks)
M/Jan08/CPT5
C156474_CPT5_Jan_2008
5/10/07
09:24
Page 11
LEAVE
MARGIN
BLANK
11
(c) Give two reasons for segmenting this LAN.
1 ...........................................................................................................................................
.............................................................................................................................................
2 ...........................................................................................................................................
.............................................................................................................................................
(2 marks)
(d)
10
(11)
M/Jan08/CPT5
(a)
(b)
(i)
212.99.34.23
(b)
(ii)
172.31.1.1
(b)
(iii)
(c)
(d)
(d)
(i)
(ii)
The binary
numbers are
provided so
you can
check the
answers
when a
candidate
uses them to
explain.
They are not
worth marks
by
themselves.
C150995_CPT5
6/12/06
13:35
Page 10
LEAVE
MARGIN
BLANK
10
6 A school Local Area Network (LAN) uses the TCP/IP protocol to communicate between
computers.
(a) What is a protocol?
.............................................................................................................................................
.............................................................................................................................................
(1 mark)
(b) Complete the diagram of the TCP/IP protocol stack below:
Application Layer
(i)
(1 mark)
(ii)
(1 mark)
(iii) Give one example of a type of application found in the Application Layer.
....................................................................................................................................
(1 mark)
(c) This LAN uses the Ethernet protocol as its Data Link Layer, which uses Ethernet MAC
(Media Access Control) addressing to route Ethernet frames. What is an Ethernet
MAC address?
.............................................................................................................................................
(1 mark)
(d) The school now wants to connect to the Internet. Every computer in the LAN is given
an IP address with a network ID of 192.168.4 and a subnet mask of 255.255.255.0.
(i) Give one example of an IP address for this LAN.
....................................................................................................................................
(1 mark)
(ii) How many different host IDs are there?
....................................................................................................................................
(1 mark)
M/Jan07/CPT5
C150995_CPT5
6/12/06
13:35
Page 11
LEAVE
MARGIN
BLANK
11
(iii) What could the school do if it needs more host IDs?
....................................................................................................................................
....................................................................................................................................
(1 mark)
(iv) IP addresses starting with 192.168 are private addresses. Why were private
addresses chosen for the individual computers on the network?
....................................................................................................................................
....................................................................................................................................
(1 mark)
(e) The school registers the IP address 222.125.105.15 with the Internet registrar. How can
this IP address be used to connect to the Internet?
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
(2 marks)
11
Turn over
M/Jan07/CPT5
(a)
a set of rules/procedures;
(b)
(i)
Transport (Layer);
(ii)
Network (Layer);
(iii) telnet;
http (client) // web server // IRC Client Server;
(c)
email;
internet/web browser;
FTP;
snmp;
TFTP;
SMTP;
https;
max 1
(d)
(i)
(ii)
(iii) change the subnet mask // get another network ID // get class A or B
network ID;
split the network into subnets; R segments
max 1
max 1
Total
(e)
max 2
Total
10
11
C144685_CPT5.qxd
16/8/05
11:32 am
Page 8
LEAVE
MARGIN
BLANK
8
6 A small organisation, Acme Consultants, with four stand-alone computers in an office, want
to set up a peer-to-peer network in order to share the printer connected to one of the
computers.
(a) What is peer-to-peer networking?
.............................................................................................................................................
.............................................................................................................................................
(1 mark)
(b) If an Ethernet switch is used to set up the network, draw a labelled diagram of the
physical layout of the network.
(2 marks)
(c) It is decided to set the IP addresses for each computer manually and use a subnet mask
of 255.255.255.0.
(i) The following IP addresses were used for the computers:
Computer A: 192.168.5.2
Computer B: 192.168.5.3
Computer C: 192.168.4.4
Computer D: 192.168.5.5
Why is this not satisfactory?
....................................................................................................................................
(1 mark)
(ii) What should be the network ID of this network?
....................................................................................................................................
(1 mark)
(iii) What possible values could the host IDs take?
....................................................................................................................................
(1 mark)
M/Jan06/CPT5
C144685_CPT5.qxd
16/8/05
11:32 am
Page 9
LEAVE
MARGIN
BLANK
9
(d) Acme Consultants now want to connect their network to the Internet using an ADSL
line. A router is used to connect the network switch to the ADSL modem.
(i) What is the purpose of the router?
....................................................................................................................................
....................................................................................................................................
(1 mark)
(ii) The IP addresses 192.168.5.1 and 222.125.105.15 are assigned to the router.
Which of the IP addresses needs to be registered with the Internet registrar and why?
IP address: ...................................................................................................................
Reason...........................................................................................................................
......................................................................................................................................
(2 marks)
Figure 4
?
General
You can get IP settings assigned automatically if your network supports
this capability. Otherwise, you need to ask your network administrator for
the appropriate IP settings.
Obtain an IP address automatically
Use the following IP address:
IP address:
Subnet mask:
Default gateway:
(iii) Figure 4 above shows part of the TCP/IP configuration window displayed on the
monitor of computer A. What IP address should be entered for the Default
gateway?
......................................................................................................................................
(1 mark)
10
Turn over
M/Jan06/CPT5
max 1
b)
Computer/PC
Computer/PC
Switch
Computer/PC
Computer/PC
Printer
1 mark for switch with 4 computers/PCs connected; 1 mark for printer connected to computer;
1
R a specific
IP address
(since 0 means all addresses on subnet, and 255 is reserved as broadcast address)
d) i) a router is a device that receives datagrams/packets from one computer and uses the IP
addresses that they contain to pass on these packets, correctly formatted, to another computer;
a router is a device that uses IP addresses to route packets/datagrams;
router keeps LAN traffic segregated from connection to ISP;
iii) 192.168.5.1
1 Total 10
C138312_CPT5
15/9/04
8:26 am
Page 14
LEAVE
MARGIN
BLANK
14
10 Figure 4 shows the TCP/IP protocol stack applied to a LAN (Local Area Network).
Application
FTP protocol
FTP
client
FTP
server
Transport
TCP protocol
TCP
TCP
Network
IP protocol
IP
Link
IP
Ethernet protocol
Ethernet
driver
Ethernet
driver
Ethernet cable
Figure 4
(a) What is a protocol?
...........................................................................................................................................
...........................................................................................................................................
(1 mark)
(b) What is the topology of this local area network?
...........................................................................................................................................
(1 mark)
(c) State a suitable type of network cable for the physical connections of this LAN.
...........................................................................................................................................
(1 mark)
M/0105/CPT5
C138312_CPT5
15/9/04
8:26 am
Page 15
15
LEAVE
MARGIN
BLANK
M/0105/CPT5
12
Mark Scheme
10.
GCE - Computing
(a)
A set of rules/procedures;
(b)
(c)
(d)
Need first octet or first and second octet or first, second and third octet to be
identical. Also must have four octets.
For example:
R without full stops
192.168.0.1
192.168.0.2
One mark for four octets;
One mark for same LAN;
(e)
(f)
(g)
(h)
(i)
(i)
192.168.0;
(ii)
1 or 2;
1
Total
12
141785_CPT5
12/13/04
11:39 AM
Page 14
14
Figure 4 shows the local area network(LAN) of the company.
It consists of three Ethernet bus segments with IP addresses 192.80.0.x, 192.80.1.x and
192.80.2.x connected together by routers.
IP addresses that begin with 192 are private addresses.
The business hosts its own web site on a Web server with public IP address 213.97.56.21.
The Web server and the local area network are connected to the Internet through a router and
firewall.
The local area network is a server-based network.
There is one file server and domain controller, and one database and application server.
Figure 4
M/0205/CPT5
LEAVE
MARGIN
BLANK
141785_CPT5
12/13/04
12:46 PM
Page 15
LEAVE
MARGIN
BLANK
15
(b) Draw a diagram to show how segment 192.80.2.x would be wired using a hub.
(2 marks)
(c) Why must the router-firewall and the Web server have public IP addresses?
...........................................................................................................................................
...........................................................................................................................................
(1 mark)
(d) The computer with IP address 192.80.2.4 uses the TCP/IP protocol to send a web page
to the Web server. Describe how the TCP/IP protocol is used to route the web page to
the Web server. Your description should cover the role of the two routers and network
card addresses.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
(5 marks)
141785_CPT5
12/13/04
11:39 AM
Page 16
16
LEAVE
MARGIN
BLANK
END OF QUESTIONS
M/0105/CPT5
(b) One mark for central hub and one mark for computers connected to hub as shown
NB If hub incorrect answer scores zero
If hub correct but computers incorrect answer scores one mark
Don't have to label
Router can be replaced by a computer labelled with router's
computers with
IP address
their IP addresses.
Router
Switch
A. IP addresses in
place of computers
+ router
2
(c) So that these are reachable from anywhere on the Internet//so that can be seen/reached
from the world outside;
A. So that they can be uniquely identified.
R. So can be reached by another branch of company
1
13
14
C160020_CPT5_June_2008
24/8/07
15:49
Page 8
Areas outside
the box will
not be scanned
for marking
8
8 The diagram shows a Local Area Network consisting of two subnets. A, F and G are desktop
PCs.
Subnet L
Subnet R
A
F
8
(a)
(a)
(a) (iii) What would be a suitable subnet mask for this network?
....................................................................................................................................
(1 mark)
(b)
(b)
(08)
M/Jun08/CPT5
(i)
(ii)
B 192.168.7.1
D 192.168.8.1
1 mark
(iii)
(iv)
(not 0 or 255)
(i)
(ii)
(i)
(ii)
253;
254;
255;
256;
*Because only the final byte is available for hosts is equivalent to there are 256 possible
combinations