← Back to CS Hub
Topic 4 — Paper 1

Networks & Security

Network types, topologies, protocols & cyber security — understand how computers communicate and stay safe.

0
Activities
0
Correct
0
Streak

📖 Core Theory

Key definitions, concepts, and terminology for Topic 4

🔌
Network Types
LAN
Local Area Network — covers a small geographical area like a school or office. Usually owned and maintained by a single organisation.
WAN
Wide Area Network — covers a large geographical area, connects LANs together (e.g., the internet). Often uses third-party infrastructure.
Client-Server
A network model where a central server provides services (files, email, web pages) to client devices. The server manages security and resources.
Peer-to-Peer
A network model where all devices have equal status and share resources directly with each other. No central server is needed.
🔬
Network Topologies
Star Topology
All devices connect to a central switch/hub. If one cable fails, only that device is affected. If the switch fails, the whole network goes down.
Mesh Topology
Every device connects to every other device (full mesh) or many others (partial mesh). Highly redundant but expensive to set up.
Bus Topology
All devices connect to a single backbone cable with terminators at each end. Cheap but if the backbone fails, the entire network goes down.
📡
Wired & Wireless
Wi-Fi
Wireless networking using radio waves, based on IEEE 802.11 standards. Provides mobility but can suffer from interference and is less secure than wired.
Ethernet
Wired networking standard using cables (typically Cat5e/Cat6). Provides faster, more reliable and more secure connections than wireless.
Bluetooth
Short-range wireless technology for connecting nearby devices (headphones, keyboards). Low power consumption, range typically under 10 metres.
📜
Protocols & Data Transmission
Protocol
A set of rules that govern how data is transmitted across a network. Protocols ensure devices can communicate even if made by different manufacturers.
TCP/IP
Transmission Control Protocol/Internet Protocol — the main protocol stack for internet communication. TCP handles reliable delivery; IP handles addressing.
HTTP / HTTPS
HyperText Transfer Protocol (Secure) — used for accessing web pages. HTTPS encrypts the data for secure browsing.
FTP
File Transfer Protocol — used for uploading and downloading files to/from a server.
SMTP
Simple Mail Transfer Protocol — used for sending emails from a client to a mail server, or between mail servers.
POP / IMAP
Protocols for receiving emails. POP downloads emails and removes them from the server. IMAP synchronises emails across multiple devices.
Packet Switching
Data is broken into packets, sent independently across the network via potentially different routes, and reassembled at the destination.
IP Address
A unique numerical address that identifies a device on a network. Can be IPv4 (e.g., 192.168.1.1) or IPv6.
MAC Address
A unique hardware address burned into a network interface card. Used for device identification on a local network. Cannot be changed by software.
Key Point

The TCP/IP model has 4 layers: Application, Transport, Internet, Network Interface. Each layer has a specific role in preparing and transmitting data.

Key Point

A packet contains: source IP, destination IP, packet number, payload (data), and a checksum for error detection.

🔒
Threats & Security
Firewall
Hardware or software that monitors and filters network traffic based on security rules. Blocks unauthorised access while allowing legitimate traffic.
Encryption
Scrambling data so only authorised parties with the decryption key can read it. Protects data during transmission and storage.
Malware
Malicious software designed to damage, disrupt or gain unauthorised access to systems. Includes viruses, worms, trojans, ransomware, and spyware.
Phishing
Fraudulent attempt to obtain sensitive information (passwords, bank details) by impersonating a trusted source via email or fake websites.
SQL Injection
Inserting malicious SQL code into input fields to manipulate a database. Can be used to view, modify or delete data.
Brute Force
Systematically trying every possible combination to crack a password. Longer, more complex passwords take exponentially longer to crack.
🌎
Real-World Examples & Analogies
Network Types — School Analogy

LAN (Local Area Network)

Like your school’s internal network — all computers in one building connected together, owned by the school. Uses Ethernet cables or WiFi.

WAN (Wide Area Network)

Like the internet connecting your school to schools across the country. Uses third-party infrastructure (BT, Virgin, etc.). The internet is the biggest WAN.

Real Example

When you access Google from school, your school LAN connects to the WAN (internet) via a router. The router is the gateway between the two networks.

Topology Analogies

Star Topology

Like a classroom where every student talks through the teacher (central switch/server). If one student is absent, others still work. If the teacher is absent, nobody communicates.

Real Example

Most home WiFi networks are star — all devices connect to the router, which is the central point.

Bus Topology

Like a single road where all houses share the same road. Cheap to set up, but if the road is blocked, nobody can travel. Data collisions happen when two devices transmit at once.

Mesh Topology

Like a group chat where everyone has everyone else’s phone number. If one person’s phone dies, everyone else can still message each other.

Real Example

Smart home devices often use Zigbee mesh networks — each device relays signals to its neighbours, so even distant devices stay connected.

Client-Server vs Peer-to-Peer — Real Life

Client-Server → Netflix

You (client) request a film from Netflix’s servers. The server stores everything centrally, manages security, and handles all requests.

  • Advantages: Centrally managed, backed up, secure
  • Disadvantages: Expensive server hardware, single point of failure if the server goes down

Peer-to-Peer → Bluetooth File Sharing

Like sharing music files directly between friends’ phones via Bluetooth. Each device is equal — both client and server.

  • Advantages: No central server needed, cheap to set up
  • Disadvantages: Hard to manage security, each device must be powerful enough to share resources
Packet Switching — Post Office Analogy

Sending data over a network is like posting a long letter that’s been split into numbered postcards (packets):

  1. Each postcard has: the destination address (IP), the return address, and a sequence number.
  2. The postcards might take different routes through the postal system (routers decide the best path based on traffic).
  3. At the destination, the postcards are put back in correct order using the sequence numbers.
  4. If any postcard is lost, the receiver asks for it to be resent.
Key Point

A packet contains: source IP address, destination IP address, sequence number (for reassembly), payload (the actual data), and a checksum (for error detection). Routers read the destination IP to decide where to forward each packet.

📚
Detailed Notes
Star Topology — Advantages & Disadvantages

Advantages:

  • If one cable fails, only that device is affected — the rest of the network continues working.
  • Easy to add or remove devices without disrupting the network.
  • Each device has a dedicated connection, so there are no data collisions.
  • Better performance under heavy traffic than bus topology.

Disadvantages:

  • If the central switch/hub fails, the entire network goes down.
  • Requires more cable than bus topology (one cable per device to the switch).
  • More expensive to install due to the switch and extra cabling.
Mesh Topology — Advantages & Disadvantages

Advantages:

  • High redundancy — if one connection fails, data can take an alternative route.
  • Very reliable; ideal for critical systems (e.g., military, banking).
  • No single point of failure in a full mesh.
  • Data can be transmitted simultaneously from multiple devices.

Disadvantages:

  • Most expensive topology to install — requires many cables and ports.
  • Complex to set up and manage.
  • Full mesh requires n(n-1)/2 connections, which grows rapidly.
Bus Topology — Advantages & Disadvantages

Advantages:

  • Cheap to install — requires less cable than star or mesh.
  • Simple to set up for small networks.
  • Easy to extend by adding devices to the backbone cable.

Disadvantages:

  • If the backbone cable fails, the entire network goes down.
  • Performance degrades as more devices are added (shared bandwidth).
  • Data collisions can occur as all devices share the same cable.
  • Difficult to troubleshoot faults.
Client-Server vs Peer-to-Peer Comparison

Client-Server:

  • Central server manages files, security and user accounts.
  • Easier to back up data centrally.
  • Better security — access rights controlled from the server.
  • More expensive — requires dedicated server hardware and software.
  • If the server fails, clients cannot access shared resources.

Peer-to-Peer:

  • No central server needed — cheaper to set up.
  • Each device is responsible for its own security and backups.
  • Easy to set up for small networks (e.g., home networks).
  • Less secure — no centralised control over access.
  • Difficult to manage as the network grows.
Walkthrough — Sending an Email (Protocols in Action)

Follow an email from sender to recipient to see how protocols work together:

  1. You compose an email in Gmail (application layer)
  2. SMTP protocol packages your message and sends it to your email server
  3. TCP breaks the email into packets, adds sequence numbers for reassembly
  4. IP adds source and destination IP addresses to each packet
  5. Packets travel across the internet via routers (each router reads the IP and forwards the packet along the best route)
  6. At the destination, TCP reassembles packets in the correct order
  7. The recipient’s email server receives the email via SMTP
  8. When they open their inbox, POP3 or IMAP retrieves the email
Key Point

SMTP = sending emails  •  POP3 = downloading emails (deletes from server)  •  IMAP = viewing/syncing emails (keeps on server). In exams, always name the specific protocol — don’t just say “a protocol.”

TCP/IP 4-Layer Model Explained

Layer 4 — Application: Provides network services to the user (e.g., HTTP, FTP, SMTP, POP/IMAP). This is where data is created.

Layer 3 — Transport: TCP breaks data into packets and ensures reliable delivery. Adds port numbers and manages flow control. Requests re-sends of missing packets.

Layer 2 — Internet: IP adds source and destination IP addresses. Routers use this layer to direct packets across the network.

Layer 1 — Network Interface: Handles the physical transmission of data using Ethernet, Wi-Fi, etc. Adds MAC addresses for local delivery.

Key Point

Data moves down through the layers when sending (each layer adds its own header) and back up through the layers when receiving (each layer strips its header).

Walkthrough — Loading a Webpage (www.bbc.co.uk):

  • Application Layer: Your browser sends an HTTP GET request for www.bbc.co.uk
  • Transport Layer: TCP breaks the request into packets, assigns port 80 (HTTP) or 443 (HTTPS)
  • Internet Layer: IP addresses are added (your IP → BBC server IP), routers forward packets across networks
  • Network Interface Layer: Data is converted to electrical signals on Ethernet cable or WiFi radio waves. MAC addresses used for local delivery.

The BBC server processes the request, and the webpage data travels back through the same 4 layers in reverse.

Common Cyber Threats and Protection Methods

Threats:

  • Malware — Viruses, worms, trojans, ransomware, spyware. Can delete files, spy on users, or lock systems for ransom.
  • Phishing — Fake emails/websites that trick users into revealing passwords or financial information.
  • SQL Injection — Malicious code entered into web forms to access or manipulate databases.
  • Brute Force — Automated tools try every password combination until the correct one is found.
  • Social Engineering — Manipulating people into revealing confidential information through deception.

Protection Methods:

  • Firewall — Monitors traffic and blocks suspicious activity.
  • Encryption — Scrambles data so intercepted information cannot be read.
  • Strong passwords — Long, complex passwords with mixed characters are harder to crack.
  • Two-factor authentication (2FA) — Requires a second form of verification (e.g., SMS code).
  • Regular updates — Patches fix known security vulnerabilities in software.
  • Anti-malware software — Scans for and removes malicious software.
  • Input validation — Checking user input to prevent SQL injection attacks.

Real-World Cyber Attack Examples:

  • Phishing: In 2020, Twitter employees were tricked by phone phishing, leading to hackers accessing celebrity accounts (Barack Obama, Elon Musk) and posting Bitcoin scam tweets.
  • SQL Injection: Hackers insert code like ' OR 1=1 -- into a login form to bypass authentication and access the entire database.
  • Brute Force: Trying every possible password combination. A 4-digit PIN has 10,000 combinations — a computer can try all of them in seconds.
  • DDoS (Distributed Denial of Service): Thousands of compromised computers (a botnet) flood a website with requests until it crashes and becomes unavailable.
  • Malware types: Virus (attaches to files, spreads when run), Worm (self-replicates across networks without user action), Trojan (disguised as legitimate software), Ransomware (encrypts files, demands payment to unlock).

Protection Methods — Explained with Analogies:

  • Firewall: Monitors all incoming/outgoing traffic, blocks suspicious connections — like a security guard checking IDs at the door.
  • Encryption: Scrambles data so intercepted messages are unreadable — like writing in a secret code only the recipient knows.
  • Anti-malware: Scans files for known virus signatures and suspicious behaviour, quarantines threats.
  • Access controls: Usernames, passwords, and biometrics limit who can access what resources.
  • Penetration testing: Hiring ethical hackers to find vulnerabilities before criminals do.
  • Network policies: Rules about password length, software installation, USB device usage, and acceptable use.
💡 Key Exam Tips for Topic 4

• When comparing topologies, give specific advantages/disadvantages — don’t just say “more reliable.” Say why it is more reliable.

• For protocol questions, name the specific protocol (HTTP, SMTP, TCP, IP) — don’t just say “a protocol.”

• Packet switching questions should mention: packets, different routes, sequence numbers, and reassembly at the destination.

• Security questions often ask for TWO methods — have several ready: firewall, encryption, anti-malware, authentication, penetration testing.

• Remember: LAN = small area (one site), WAN = large area (multiple sites, uses third-party links).

🔍 Explore & Visualise

Interactive diagrams and walkthroughs

🔌
Topology Comparison

Compare the three main network topologies. Click each button to reveal advantages and disadvantages.

Star Topology

SW
A
B
C
D
E

Advantages:

  • If one cable fails, only that device is affected
  • Easy to add/remove devices
  • No data collisions — dedicated connections
  • Better performance under heavy use

Disadvantages:

  • Central switch is a single point of failure
  • Uses more cable than bus
  • More expensive to install

Mesh Topology

A
B
C
D
E

Advantages:

  • High redundancy — multiple paths for data
  • No single point of failure
  • Very reliable for critical systems
  • Data can be transmitted simultaneously

Disadvantages:

  • Most expensive to install
  • Complex to set up and manage
  • Requires many cables: n(n-1)/2

Bus Topology

A
B
C
D
E
T
T

Advantages:

  • Cheap to install — minimal cable
  • Simple to set up for small networks
  • Easy to extend

Disadvantages:

  • Backbone failure takes down whole network
  • Performance drops with more devices
  • Data collisions on shared cable
  • Difficult to troubleshoot
📦
Packet Switching Walkthrough

Step through how data is transmitted using packet switching.

Step 1: Data is Split into Packets

The data is broken into small packets. Each packet has a header containing the source IP address, destination IP address, and a packet number so they can be reassembled.

[Packet 1] Src: 192.168.1.10 | Dst: 85.42.7.3 | #1 | "Hello "
[Packet 2] Src: 192.168.1.10 | Dst: 85.42.7.3 | #2 | "World"
[Packet 3] Src: 192.168.1.10 | Dst: 85.42.7.3 | #3 | "!"

Step 2: Packets Sent Independently

Each packet is sent independently across the network. They may take completely different routes to reach the same destination, depending on network traffic and availability.

Packet #1 → Route A → Router 3 → Router 7 → Destination
Packet #2 → Route B → Router 1 → Router 5 → Destination
Packet #3 → Route C → Router 2 → Router 4 → Destination

Step 3: Routers Direct Packets

Routers examine the destination IP address in each packet header and forward it along the best available path at that moment. If one route is congested, packets are sent via an alternative route.

Router checks destination IP → Consults routing table
→ Forwards packet along fastest available path
→ Each router repeats this process (hop by hop)

Step 4: Packets Arrive Out of Order

Because packets take different routes, they may arrive at the destination in a different order from how they were sent. Some packets may even arrive before others that were sent first.

Arrived: Packet #2 ✓ | Packet #3 ✓ | Packet #1 ✓
Order received: #2, #3, #1 (out of order!)

Step 5: TCP Reassembles Packets

TCP at the destination uses the packet numbers to reassemble the packets in the correct order. If any packets are missing or corrupted (detected by the checksum), TCP requests them to be re-sent.

TCP checks packet numbers: #1, #2, #3 ✓
Reassembles in order: "Hello " + "World" + "!" = "Hello World!"
All packets received ✓ — Data complete
📜
Protocol Matcher

Click each protocol to reveal what it does.

🧩 Guided Practice

Apply your knowledge with interactive exercises

📂
Categorise: Star vs Mesh vs Bus

Drag each item into the correct topology category.

Items to sort:

🔒
Categorise: Threats vs Protection

Drag each item into the correct category.

Items to sort:

✏️
Fill in the Blanks: TCP/IP Layers

Fill in the 4 layers of the TCP/IP model in order from top to bottom.

🔢
Order the Steps: Packet Switching

Drag the steps into the correct order.

Available Steps

Correct Order

🧠 Retrieval Practice

Test your memory by matching terms with definitions

🃏
Memory Match

Find all 8 matching pairs. Click two cards to flip them.

📝 Exam Practice

Build answers using sentence banks, then reveal the mark scheme

⚡ Challenge

No hints, no help — prove your mastery

Time Remaining:
5:00

📊 Performance Review

See how you performed across each sub-topic

Overall Performance

0%

Complete activities to see your results