Network types, topologies, protocols & cyber security — understand how computers communicate and stay safe.
Key definitions, concepts, and terminology for Topic 4
The TCP/IP model has 4 layers: Application, Transport, Internet, Network Interface. Each layer has a specific role in preparing and transmitting data.
A packet contains: source IP, destination IP, packet number, payload (data), and a checksum for error detection.
LAN (Local Area Network)
Like your school’s internal network — all computers in one building connected together, owned by the school. Uses Ethernet cables or WiFi.
WAN (Wide Area Network)
Like the internet connecting your school to schools across the country. Uses third-party infrastructure (BT, Virgin, etc.). The internet is the biggest WAN.
When you access Google from school, your school LAN connects to the WAN (internet) via a router. The router is the gateway between the two networks.
Star Topology
Like a classroom where every student talks through the teacher (central switch/server). If one student is absent, others still work. If the teacher is absent, nobody communicates.
Most home WiFi networks are star — all devices connect to the router, which is the central point.
Bus Topology
Like a single road where all houses share the same road. Cheap to set up, but if the road is blocked, nobody can travel. Data collisions happen when two devices transmit at once.
Mesh Topology
Like a group chat where everyone has everyone else’s phone number. If one person’s phone dies, everyone else can still message each other.
Smart home devices often use Zigbee mesh networks — each device relays signals to its neighbours, so even distant devices stay connected.
Client-Server → Netflix
You (client) request a film from Netflix’s servers. The server stores everything centrally, manages security, and handles all requests.
Peer-to-Peer → Bluetooth File Sharing
Like sharing music files directly between friends’ phones via Bluetooth. Each device is equal — both client and server.
Sending data over a network is like posting a long letter that’s been split into numbered postcards (packets):
A packet contains: source IP address, destination IP address, sequence number (for reassembly), payload (the actual data), and a checksum (for error detection). Routers read the destination IP to decide where to forward each packet.
Advantages:
Disadvantages:
Advantages:
Disadvantages:
Advantages:
Disadvantages:
Client-Server:
Peer-to-Peer:
Follow an email from sender to recipient to see how protocols work together:
SMTP = sending emails • POP3 = downloading emails (deletes from server) • IMAP = viewing/syncing emails (keeps on server). In exams, always name the specific protocol — don’t just say “a protocol.”
Layer 4 — Application: Provides network services to the user (e.g., HTTP, FTP, SMTP, POP/IMAP). This is where data is created.
Layer 3 — Transport: TCP breaks data into packets and ensures reliable delivery. Adds port numbers and manages flow control. Requests re-sends of missing packets.
Layer 2 — Internet: IP adds source and destination IP addresses. Routers use this layer to direct packets across the network.
Layer 1 — Network Interface: Handles the physical transmission of data using Ethernet, Wi-Fi, etc. Adds MAC addresses for local delivery.
Data moves down through the layers when sending (each layer adds its own header) and back up through the layers when receiving (each layer strips its header).
Walkthrough — Loading a Webpage (www.bbc.co.uk):
The BBC server processes the request, and the webpage data travels back through the same 4 layers in reverse.
Threats:
Protection Methods:
Real-World Cyber Attack Examples:
' OR 1=1 -- into a login form to bypass authentication and access the entire database.Protection Methods — Explained with Analogies:
• When comparing topologies, give specific advantages/disadvantages — don’t just say “more reliable.” Say why it is more reliable.
• For protocol questions, name the specific protocol (HTTP, SMTP, TCP, IP) — don’t just say “a protocol.”
• Packet switching questions should mention: packets, different routes, sequence numbers, and reassembly at the destination.
• Security questions often ask for TWO methods — have several ready: firewall, encryption, anti-malware, authentication, penetration testing.
• Remember: LAN = small area (one site), WAN = large area (multiple sites, uses third-party links).
Interactive diagrams and walkthroughs
Compare the three main network topologies. Click each button to reveal advantages and disadvantages.
Advantages:
Disadvantages:
Advantages:
Disadvantages:
Advantages:
Disadvantages:
Step through how data is transmitted using packet switching.
The data is broken into small packets. Each packet has a header containing the source IP address, destination IP address, and a packet number so they can be reassembled.
Each packet is sent independently across the network. They may take completely different routes to reach the same destination, depending on network traffic and availability.
Routers examine the destination IP address in each packet header and forward it along the best available path at that moment. If one route is congested, packets are sent via an alternative route.
Because packets take different routes, they may arrive at the destination in a different order from how they were sent. Some packets may even arrive before others that were sent first.
TCP at the destination uses the packet numbers to reassemble the packets in the correct order. If any packets are missing or corrupted (detected by the checksum), TCP requests them to be re-sent.
Click each protocol to reveal what it does.
Apply your knowledge with interactive exercises
Drag each item into the correct topology category.
Drag each item into the correct category.
Fill in the 4 layers of the TCP/IP model in order from top to bottom.
Drag the steps into the correct order.
Test your memory by matching terms with definitions
Find all 8 matching pairs. Click two cards to flip them.
Build answers using sentence banks, then reveal the mark scheme
No hints, no help — prove your mastery
See how you performed across each sub-topic
Complete activities to see your results