A university has buildings in two sites that are 5 miles apart - OCR - GCSE Computer Science - Question 7 - 2021 - Paper 1
Question 7
A university has buildings in two sites that are 5 miles apart.
(a) Describe the difference between a LAN and a WAN.
(b) Site A has 4 classrooms. Site B has 2 clas... show full transcript
Worked Solution & Example Answer:A university has buildings in two sites that are 5 miles apart - OCR - GCSE Computer Science - Question 7 - 2021 - Paper 1
Step 1
Describe the difference between a LAN and a WAN.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A Local Area Network (LAN) is a network that connects computers within a limited geographical area, like a university campus or a building. It typically offers high data transfer rates and low latency. In contrast, a Wide Area Network (WAN) covers a larger geographical area, such as multiple cities or countries, and often relies on leased telecommunication lines. WANs tend to have slower data transfer rates compared to LANs due to the distance and varying infrastructure involved.
Step 2
Complete the network diagram for site A of the University.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
The network diagram should showcase a star topology where each classroom in Site A (Classroom 1, Classroom 2, Classroom 3, Classroom 4) connects to a central switch. Each classroom will be labeled appropriately, and arrows can be used to indicate the connections. Alternatively, a visual representation should highlight how the classrooms connect to the switch.
Step 3
Explain how each of the following can contribute to the performance of a network.
96%
101 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Wifi frequency: Higher frequencies (like 5 GHz) can carry more data but have shorter range than lower frequencies, affecting coverage.
Interference: Other wireless devices or physical obstructions can cause interference, reducing the effective bandwidth.
Number of concurrent users: More users can lead to congestion, reducing the available bandwidth for each user.
Type of network traffic: Different traffic types (e.g., video vs. browsing) have varying bandwidth requirements, affecting overall performance.
Step 4
Identify one other factor that can contribute to the performance of a network.
98%
120 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
One other factor is 'Network Hardware Quality'. The performance can be significantly impacted by the quality of routers, switches, and cables used in the network.
Step 5
Describe how packet switching can be used when sending data from one site to the other.
97%
117 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Packet switching is a method of data transmission where data is broken into smaller packets for efficient transfer over the network. Each packet may take a different route to reach its destination, allowing for dynamic re-routing in case of network congestion or failure. Once all packets arrive at Site B, they are reassembled in the correct order, ensuring reliable communication.
Step 6
Describe the threat malware can pose to the university's network and give a prevention method that the university can use.
97%
121 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
Malware can compromise sensitive data, disrupt network services, and spread to other connected devices. A prevention method the university can use is to implement robust antivirus software across all devices, alongside regular updates and staff training on recognizing phishing attempts.
Step 7
Describe the threat a brute force attack can pose to the university's network and give a prevention method that the university can use.
96%
114 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!
Answer
A brute force attack involves systematically trying different passwords until the correct one is found, potentially compromising accounts. To prevent this, the university can implement account lockout policies after a certain number of failed login attempts and encourage the use of complex passwords.
Step 8
Tick one box in each row to identify whether the protocol is related to email, transferring files or accessing websites.
99%
104 rated
Only available for registered users.
Sign up now to view full answer, or log in if you already have an account!