TUTORIAL
Computer Science
Mr Bob Beechook Tel 57530751
3.2 Communication and Internet technologies
1. What is a protocol? \ [1]
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
2. TCP/IP consists of layers. Name them. [2]
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
3. Why is TCP/IP organised as layers of protocol? [3]
1……………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
2……………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
3……………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
4. What is a protocol suite? [1]
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
5. Name the protocols that make up the TCP/IP protocol suite. [2]
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
xxxxxxxxxxx
June 2018/31/4
6. The TCP/IP protocol suite is used on the Internet.
(a) The table has statements about transmitting data across the Internet.
Put a tick (✓) in each row to identify whether the responsibility belongs to TCP or IP. [5]
(b) Identify two other internet protocols. State a use for each protocol. [4]
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
(c) State the name of the TCP/IP layer that uses IP addresses. [1]
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
(d) Emails are transmitted across the Internet using packet switching and routing tables.
(i) Give four items of data in an IP data packet. [4]
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
(ii) Describe two benefits of using packet switching. [4]
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
(iii) Give two items of data stored in a routing table. [2]
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
7. a. Match the following terms associated with the use of BIT torrent. [5]
1. Bit torrent A. Group of computers involved in the uploading and downloading of a
client computer file
2. Tracker B. Computer that holds the complete file
3. Swarm C. Computer holding part of a computer file being shared
D. An application program that allows users to upload and download
4. Leecher
computer files
5. Seeder E. Server that keeps track of computers and files being shared
b. What type of communication does bit torrent use? [1]
………………………………………………………………………………………………………………………………………………………….
xxxxxxxxxxx
Nov 2016/31/5
8. The TCP/IP protocol suite can be viewed as a stack with four layers.
(a) (i) name the layers that make up TCP/IP
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
(b) A computer is currently running two processes:
• Process 1 is downloading a web page.
• Process 2 is downloading an email.
(i) Describe two tasks that the Transport layer performs to ensure that the incoming data is
downloaded correctly. [4]
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
(ii) Name a protocol that will be used by Process 1. [1]
………………………………………………………………………………………………………………………………………………………….
(iii) Name a protocol that will be used by Process 2. [1]
………………………………………………………………………………………………………………………………………………………….
xxxxxxxxxxxx
June 2018/P33/3
9. Star and bus are two types of topology that can be used in a Local Area Network (LAN).
(a) (i) State one benefit and one drawback of the star topology. [2]
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
(ii) State one benefit and one drawback of the bus topology. [2]
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
(b) The sequence of steps 1 to 7 describes what happens when the LAN transmits data from
Computer X to Computer Y using circuit switching. Four statements (4 to 7) are missing from
the sequence.
A Computer X sends the data.
B The sender signals node to deallocate resources.
C Computer Y sends a receipt signal.
D If available, Computer X sets up path between nodes.
Write one letter (A to D) in the appropriate space to complete the sequence.
1 Computer X sends a connection request to Computer Y.
2 Computer Y sends ready or busy signal.
3 If busy, Computer X waits and then resends the connection request to Computer Y.
4 ……………
5 ……………
6 ……………
7 …………… [3]
(c) (i) Protocols are essential for successful transmission of data over a network. The TCP/IP
protocol suite operates on many layers.
State the appropriate layer for each protocol in the following table. [3]
(ii) Peer-to-peer (P2P) file sharing uses the BitTorrent protocol.
Explain how the BitTorrent protocol allows files to be shared. [3]
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
xxxxxxxxxxx
Nov 2015/31/3
10. An email is sent from one email server to another using packet switching.
(a) State two items that are contained in an email packet apart from the data. [2]
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
(b) Explain the role of routers in sending an email from one email server to another. [3]
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
(c) Sending an email message is an appropriate use of packet switching.
Explain why this is the case. [2]
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
(d) Packet switching is not always an appropriate solution. Name an alternative communication
method of transferring data in a digital network. [1]
………………………………………………………………………………………………………………………………………………………….
(e) Name an application for which the method identified in part (d) is an appropriate solution.
Justify your choice. [3]
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
You may Skip this question
xxxxxxxxxxxx
June 2016 p31/1
11. A Local Area Network (LAN) consists of four computers and one server. The LAN uses a bus
topology.
(a) Complete the diagram below to show how the computers and the File server could be
connected.
(b) Computer C sends a data packet to Computer A.
Three statements are given below. State whether the statements are true or false.
Computer C uses the IP address of Computer A to indicate that the packet is for
Computer A.
Computer B can read the packet sent from Computer C to Computer A.
The File server routes the packet to Computer A.
(c) Computer A starts transmitting a packet to Computer C. At exactly the same time, the File
server starts transmitting a packet to Computer D. This causes a problem.
(i) State the name given to this problem. [1]
……………………………………………………………………………………………………………………………………………………….
(ii) Give three steps taken by both Computer A and the File server to allow them to transmit
their packets successfully. [3]
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
(d) Adding a switch to the LAN changes its topology. Explain how the use of a switch removes the
problem identified in part (c)(i). [4]
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
xxxxxxxxxxx
Nov 2017/p31/1
12. A Local Area Network (LAN) consists of three computers, one server and a switch. The LAN uses
a star topology.
(a) Complete the following diagram to show how the computers, the server and the switch could
be connected. [1]
(b) There are four statements in the following table. For each statement, place a tick (✓) in the
appropriate column to indicate whether it is true or false. [4]
(c) The LAN shown in part (a) will be connected to the Internet.
(i) A router will be attached to one of the devices on the LAN.
State the device used. Give a reason for your choice. [2]
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
(ii) Explain why a router is required. [2]
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
(iii) After the router has been connected, Computer A sends several packets to an interne
web server.
Explain how the packets are transmitted from the router to the web server. [3]
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
xxxxxxxxxxxx
June 2017/p31/5
(a) A web browser is used to request and display a page stored on an internet web server.
Explain how each of the following items is used in this event.
(i) Packet [2]
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
(ii) Router [2]
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
(iii) TCP/IP [2]
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
(b) The Internet can be used for video conferencing. Data can be transmitted over the Internet
using either packet switching or circuit switching.
(i) State two problems that could arise if video conferencing were to use packet switching. [2]
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
(ii) Explain what is meant by circuit switching. [2]
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
………………………………………………………………………………………………………………………………………………………….
(iii) Explain how the use of circuit switching overcomes the problems you have identified in
part (i). [3]
………………………………………………………………………………………………………………………………………………………….