Score: 0/0
Question 1 of ∞
State two advantages of connecting computers together into networks.
Sharing files and resources (including devices like printers) across the network is a lot easier
The computers can be centrally managed, so software can be updated remotely on all computers at once
Accounts can be stored centrally, so users can log in from any device on the network
Other reasonable advantage
What does a switch do?
Sends data packets to devices on the network.
Give three advantages of a star topology.
There are fewer data collisions on star topology networks than on bus topology networks
Data transmission is usually quicker on star topology networks
Star topology networks are more secure because the data is only sent to its intended recipient
It is easier to add new devices to a star topology network
What is a network protocol?
A set of rules
For how devices communicate across a network
Table 1 shows the protocols in three of the layers of the TCP/IP model.
Table 1
| Layer |
Protocols |
| Application |
HTTP, HTTPS, FTP, SMTP, IMAP |
| Transport |
TCP and UDP |
| Internet |
IP |
Describe in detail the role of one protocol from each layer in Table 1.
Three marks available per layer. In each layer: detailed description scores 3; some description scores 2; statements made scores 1.
Example of detailed description [3]:
HTTPS is an extension of HTTP and allows secure transfer of data between a
browser and a website by encrypting data. The web browser will check the website
server's security certificate and ensure it is legitimate. This means it's not possible to
see or eavesdrop on what you're browsing or for your data to be stolen.
Example of some description [2]:
HTTPS allows secure transfer of data between a browser and a website by
encrypting the data being transferred to stop your data being stolen. It does this by
checking a security certificate to see if the website is legitimate.
Example of statements [1]:
In HTTPS the S stands for secure and stops your data being stolen on a website. It
encrypts your data.
Indicative content:
HTTP
Provides a way for users to interact with web resources. Transmits messages between client and server
using hypertext.
HTTPS
As HTTP but in addition uses an encryption protocol to ensure communications are secure.
SMTP
Enables users to send (and receive) email messages. Initiates sessions between user and mail server.
Server then forwards messages. Uses a process called 'store and forward' to store messages and forward
as necessary. The server decides which server to send the message to and the inbox provider then
downloads the message and places it in the recipient's inbox. Often used in conjunction with IMAP.
IMAP
Stores email messages on an ISPs server but allows user to manipulate messages as though on a local
device. Local devices access the ISP server to access the messages. IMAP works with desktop clients and
webmail clients. Allows simultaneous logins from different devices to one account.
FTP
Allows secure transfer of files between client and server. Files are uploaded to and downloaded from the
server using FTP.
TCP
Connects network devices to the Internet. It defines how applications can create channels of
communication across a network. It manages how a message is assembled into smaller packets before
transmission and reassembles packets in the correct order at destination.
UDP
Communications protocol that establishes low latency and loss-tolerating connections between
applications. Enables the transfer of data before an agreement is provided by the receiving party. This
speeds up transfers. Can start transferring data before agreement is received from receiving party.
IP
Relays data across network boundaries. It defines how to address and route each packet to make sure it
reaches the right destination.
Mark 1
Mark 2
Mark 3
Mark 4
Mark 5
Mark 6
Mark 7
Mark 8
Mark 9
Explain how MAC address filtering works.
The switch or Wireless Access Point takes the unique MAC address of a device
And only allows it to connect if it is in the list of allowed addresses (whitelist)