TopMyGrade

Notes

Fundamentals of computer networks

A computer network is two or more computers connected so they can share data and resources. Networks underpin almost every digital service we use — the internet, email, cloud storage, online gaming and streaming all rely on networking principles.

Network types (CS5.1)

TypeScopeExample
LAN (Local Area Network)Single building or siteSchool network, home Wi-Fi
WAN (Wide Area Network)Geographically dispersedThe internet, a bank's branch network

Network models:

  • Client–server — dedicated servers provide resources (files, web pages, email); clients request them. Centralised management; easy to apply updates; single point of failure.
  • Peer-to-peer (P2P) — each device acts as both client and server. No central server; simple to set up; less secure and harder to manage.

Wired and wireless connectivity (CS5.2)

MediumSpeedRangeCostReliability
Copper cable (Ethernet)Up to 10 GbpsShort–mediumLowHigh (no interference)
Fibre opticUp to 400 Gbps+LongHigherVery high
Wi-FiUp to ~10 Gbps (Wi-Fi 6)~100 mLowModerate (interference)
Bluetooth~3 Mbps~10 mVery lowShort range only

Network topologies (CS5.3)

The topology is the arrangement of devices in a network.

  • Star topology — all devices connect to a central switch/hub. Fast, easy to add/remove devices, fault in one device doesn't affect others. Central switch is a single point of failure.
  • Mesh topology — every device connects to every other (full mesh) or multiple others (partial mesh). Highly resilient — many paths available; expensive to install.

Protocols (CS5.4)

A protocol is a set of rules for how data is transmitted. Key protocols:

ProtocolPurpose
HTTP / HTTPSWeb pages (S = encrypted with TLS)
FTPFile transfer
SMTPSending email
IMAPReceiving email (stays on server)
TCPReliable, ordered delivery of data
UDPFast, connectionless delivery (streaming, gaming)
IPAddressing and routing packets

Network security (CS5.5)

Protecting networks from unauthorised access:

  • Encryption — data scrambled so only the intended recipient can read it. Symmetric: same key to encrypt/decrypt. Asymmetric: public key encrypts, private key decrypts.
  • Firewalls — software or hardware that inspects incoming/outgoing traffic and blocks unauthorised connections
  • MAC address filtering — only devices with approved hardware addresses can connect to the network
  • Strong authentication — passwords, 2FA, certificates

The TCP/IP model (CS5.6)

The 4-layer TCP/IP model describes how data travels across a network:

LayerRoleExample protocols
ApplicationUser-facing servicesHTTP, FTP, SMTP, DNS
TransportEnd-to-end deliveryTCP, UDP
Network (Internet)Routing packetsIP
Link (Network Access)Physical transmissionEthernet, Wi-Fi

Each layer adds a header when sending (encapsulation) and removes it when receiving (decapsulation).

AI-generated · claude-opus-4-7 · v3-deep-computer-science

Practice questions

Try each before peeking at the worked solution.

  1. Question 12 marks

    LAN vs WAN

    Give two differences between a LAN and a WAN.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  2. Question 24 marks

    Client–server vs peer-to-peer

    Compare client–server and peer-to-peer network models. Give one advantage of each.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  3. Question 34 marks

    Star vs mesh topology

    Describe a star network topology and give one advantage and one disadvantage compared with a mesh topology.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  4. Question 44 marks

    TCP/IP layers

    Name the four layers of the TCP/IP model in order from top (application) to bottom (link), and state one protocol at each layer.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  5. Question 54 marks

    Asymmetric encryption

    Explain how asymmetric encryption is used when a user connects to a secure website (HTTPS).

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

Flashcards

CS5 — Fundamentals of computer networks

12-card SR deck for AQA GCSE Computer Science topic CS5

12 cards · spaced repetition (SM-2)