Chapter 2: Communication – 9618 AS Level Notes

2.1 Networks Including the Internet


Purpose and Benefits of Networking Devices

Why Create Networks?

Purpose of networking:

  • Share resources (printers, storage, internet connections)
  • Enable communication between users (email, messaging, video calls)
  • Centralise data management and backups
  • Provide access to shared applications
  • Enable collaborative working
  • Improve security through centralised control
  • Reduce costs by sharing expensive peripherals

Benefits of networking:

  • Resource sharing: Multiple users can access the same hardware/software
  • Communication: Easy and fast communication between users
  • Centralised management: IT staff can manage all devices from one location
  • Data backup: Centralised backup of all important data
  • Security: Consistent security policies across all devices
  • Cost-effective: Fewer peripherals needed (e.g., one printer for many users)
  • Scalability: Easy to add new users and devices

LAN vs WAN

Local Area Network (LAN)

Characteristics:

  • Covers a small geographical area (single building, office, school campus)
  • Owned and managed by a single organisation
  • High-speed connections (typically 1 Gbps to 100 Gbps)
  • Low cost to set up and maintain
  • Low error rates
  • Uses technologies like Ethernet and Wi-Fi

Examples:

  • School computer lab network
  • Office network in a company
  • Home network

Wide Area Network (WAN)

Characteristics:

  • Covers large geographical area (cities, countries, continents)
  • Connections are leased from telecommunications companies
  • Slower speeds compared to LANs (due to distance)
  • Higher cost to set up and maintain
  • Higher error rates
  • Uses technologies like fibre optics, satellites, leased lines

Examples:

  • The Internet (largest WAN)
  • Bank connecting branches across countries
  • Multinational company connecting global offices
FeatureLANWAN
Geographical areaSmall (building/campus)Large (city/country/global)
OwnershipSingle organisationMultiple organisations/leased
SpeedVery high (1-100 Gbps)Lower (Mbps to Gbps)
CostRelatively lowHigh
Error rateLowHigher
TechnologyEthernet, Wi-FiLeased lines, satellite, fibre

Network Models

Client-Server Model

How it works:

  • Central server provides services and resources
  • Clients request services from the server
  • Server manages security, data storage, and user access

Roles of computers:

  • Server: Powerful computer running server software; manages network resources, security, and data
  • Client: User’s computer; makes requests to server; has limited local storage/processing

Benefits:

  • Centralised management and security
  • Easy to backup all data (stored on server)
  • Users can access files from any client device
  • Scalable (add more clients easily)
  • Better security through central control
  • Easier software updates and maintenance

Drawbacks:

  • Server is a single point of failure (network stops if server fails)
  • Can be expensive to set up and maintain
  • Requires specialist IT staff
  • Network congestion if many clients request simultaneously
  • Server performance limits overall network performance

When to use:

  • Schools and universities
  • Large businesses and organisations
  • Banking systems
  • Email and web services
  • Database applications

Peer-to-Peer Model

How it works:

  • All computers are equal (peers)
  • Each computer can act as both client and server
  • No central server; resources shared directly between peers
  • Each user manages their own sharing and security

Roles of computers:

  • Every computer shares its own resources and accesses others’ resources
  • No dedicated server; any computer can provide services

Benefits:

  • No expensive server hardware needed
  • Easy and cheap to set up
  • No single point of failure (network continues if one computer fails)
  • Users control their own resources
  • Good for small networks (home, small office)

Drawbacks:

  • Poor security (users must manage their own)
  • No central backup; data distributed across devices
  • Performance depends on individual computers
  • Difficult to manage as network grows
  • Files may be duplicated across multiple computers
  • Users must remember where files are stored

When to use:

  • Small offices with few computers (under 10)
  • Home networks
  • File sharing (BitTorrent)
  • Collaborative applications where central server isn’t needed

Comparison Summary

AspectClient-ServerPeer-to-Peer
ManagementCentralisedDistributed
SecurityCentral controlUser responsibility
CostHigher (server hardware)Lower
ScalabilityGoodPoor
Single point of failureYes (server)No
BackupCentralisedDistributed
PerformanceServer-dependentPeer-dependent
Best forLarge organisationsSmall networks

Thin Client vs Thick Client

Thin Client

Definition: A computer that relies heavily on a server for processing and storage; essentially a terminal that displays information and sends input.

Characteristics:

  • Minimal local processing power
  • Limited or no local storage
  • Runs applications on the server
  • Data stored on server
  • Cheaper hardware
  • Longer lifespan (less to upgrade)
  • Lower power consumption

Examples:

  • Network terminals in libraries
  • Virtual Desktop Infrastructure (VDI) workstations
  • Older computers repurposed as thin clients
  • Chromebooks (in some configurations)

Thick Client (Fat Client)

Definition: A computer that performs most processing locally and uses the network primarily for data storage and communication.

Characteristics:

  • Powerful local processing
  • Local storage for applications and data
  • Runs applications locally
  • Can work offline
  • More expensive hardware
  • Requires regular upgrades
  • Higher power consumption

Examples:

  • Typical desktop PC in an office
  • Gaming computers
  • Development workstations
  • Most laptops

Differences Summary

FeatureThin ClientThick Client
ProcessingOn serverLocally
StorageOn serverLocal
Hardware costLowHigh
Offline workingNot possiblePossible
MaintenanceCentralisedPer device
Network dependencyHighLow
Upgrade frequencyLow (server only)Regular
SecurityCentralisedDistributed

Network Topologies

Bus Topology

Structure:

  • All devices connected to a single central cable (the backbone)
  • Terminators at both ends to prevent signal reflection
  • Devices connect via taps or connectors

How packets are transmitted:

  1. Packet sent onto the bus by source device
  2. Signal travels in both directions along the cable
  3. All devices receive the packet but only destination accepts it
  4. Terminators absorb signals to prevent bouncing

Benefits:

  • Easy and cheap to install (less cable)
  • Good for small, temporary networks
  • Easy to extend by adding more cable
  • No specialised hardware needed (just cable and connectors)

Drawbacks:

  • If main cable fails, whole network fails
  • Limited cable length (signal degradation)
  • Performance degrades with more devices
  • Collisions are common (only one device can transmit at a time)
  • Difficult to troubleshoot
  • Security issues (all devices see all traffic)

When to use:

  • Small office/home networks (rarely used today)
  • Temporary network setups
  • Educational environments for learning

Star Topology

Structure:

  • All devices connect to a central switch or hub
  • Each device has its own dedicated cable
  • Central device manages all communication

How packets are transmitted:

  1. Source sends packet to central switch
  2. Switch examines destination address
  3. Switch forwards packet only to the destination port
  4. Other devices don’t see the traffic

Benefits:

  • Easy to install and manage
  • Fault tolerance (one cable failure affects only that device)
  • High performance (dedicated bandwidth per connection)
  • Easy to add/remove devices
  • Centralised management and monitoring
  • Better security (traffic only goes to destination)
  • Easy to troubleshoot

Drawbacks:

  • Requires more cable
  • Central switch is single point of failure
  • More expensive (needs switch/hub)
  • Limited by switch port count

When to use:

  • Most modern office networks
  • School computer labs
  • Home networks
  • Anywhere reliability and performance matter

Mesh Topology

Structure:

  • Devices interconnected with multiple redundant paths
  • Two types: full mesh and partial mesh

Full mesh: Every device connects directly to every other device
Partial mesh: Some devices connected to all, others to only a few

How packets are transmitted:

  1. Source determines best path to destination
  2. Packet forwarded through intermediate devices
  3. If a path fails, alternative route used automatically
  4. Packets may take different routes for load balancing

Benefits:

  • Excellent fault tolerance (multiple redundant paths)
  • No single point of failure
  • Can route around congestion or failures
  • Good performance (multiple paths = load balancing)
  • Scalable

Drawbacks:

  • Very expensive (many cables and ports)
  • Complex to set up and manage
  • Difficult to maintain
  • Requires intelligent routing protocols
  • Overkill for most small/medium networks

When to use:

  • Internet backbone
  • Critical infrastructure (military, emergency services)
  • Large data centres
  • Wireless mesh networks (community Wi-Fi)

Hybrid Topology

Structure:

  • Combination of two or more different topologies
  • Most large networks are hybrid
  • Example: Star-bus (multiple star networks connected by a bus backbone)

How packets are transmitted:

  • Depends on the specific combination
  • Usually hierarchical: packets travel up to backbone, across, then down

Benefits:

  • Flexible; can be designed for specific needs
  • Combines advantages of different topologies
  • Scalable and practical for large networks
  • Can be optimised for performance and cost

Drawbacks:

  • Complex design and implementation
  • Expensive
  • Difficult to troubleshoot

When to use:

  • Large organisations with multiple departments/buildings
  • University campuses
  • Corporate headquarters
  • WANs connecting multiple LANs

Topology Comparison Summary

TopologyCostReliabilityPerformanceScalabilityComplexity
BusLowPoorPoorPoorLow
StarMediumGoodGoodGoodMedium
MeshVery HighExcellentExcellentGoodHigh
HybridHighGoodGoodExcellentHigh

Cloud Computing

What is Cloud Computing?

Definition: Delivery of computing services (servers, storage, databases, networking, software) over the internet (“the cloud”).

Types of Cloud

Public Cloud:

  • Services delivered over public internet
  • Shared infrastructure across multiple organisations
  • Owned and operated by third-party providers
  • Examples: Amazon Web Services (AWS), Microsoft Azure, Google Cloud

Private Cloud:

  • Dedicated to a single organisation
  • Can be on-premises or hosted
  • More control and security
  • Higher cost
  • Examples: Company’s internal private cloud, government private cloud

Hybrid Cloud:

  • Combination of public and private clouds
  • Data and applications can move between them
  • Best of both worlds

Cloud Service Models

ModelWhat you getExample
IaaS (Infrastructure as a Service)Virtual machines, storage, networkingAWS EC2, Google Compute Engine
PaaS (Platform as a Service)Platform to develop/deploy applicationsGoogle App Engine, Heroku
SaaS (Software as a Service)Ready-to-use softwareGoogle Workspace, Office 365, Dropbox

Benefits of Cloud Computing

  • Cost savings: No upfront hardware costs; pay for what you use
  • Scalability: Easily scale up or down based on demand
  • Accessibility: Access from anywhere with internet connection
  • Reliability: Providers offer high uptime guarantees (SLAs)
  • Automatic updates: Providers manage software updates
  • Disaster recovery: Data backed up across multiple locations
  • Global reach: Deploy services worldwide easily
  • Focus on core business: No need to manage infrastructure

Drawbacks of Cloud Computing

  • Internet dependency: Requires reliable internet connection
  • Security concerns: Data stored on third-party servers
  • Privacy: Provider may have access to your data
  • Vendor lock-in: Difficult to migrate to another provider
  • Limited control: Cannot control underlying infrastructure
  • Ongoing costs: Can be expensive long-term compared to owned hardware
  • Compliance issues: May violate data protection laws (data stored in other countries)
  • Latency: May be slower than local access

Justifying Cloud vs On-Premises

Choose Cloud when:

  • Variable or unpredictable workload
  • Need rapid scalability
  • Limited capital budget (prefer operational expenditure)
  • Want to avoid managing infrastructure
  • Need global deployment
  • Startup or small business

Choose On-Premises when:

  • Strict security/regulatory requirements
  • Predictable, stable workload
  • Data sovereignty concerns
  • Need complete control
  • Very large scale (may be cheaper long-term)
  • Poor internet connectivity

Wired vs Wireless Networks

Wired Networks

Characteristics:

  • Physical cables connect devices
  • Higher speeds and reliability
  • More secure (physical access needed)
  • Limited mobility
  • Installation requires cabling infrastructure

Implications:

  • Better performance for bandwidth-intensive applications
  • More suitable for fixed workstations
  • Higher installation cost but lower ongoing costs
  • Less flexible for changing layouts

Wireless Networks

Characteristics:

  • No physical cables; use radio waves
  • Mobility and flexibility
  • Easier to add new devices
  • Signals can be intercepted
  • Subject to interference

Implications:

  • Convenient for mobile devices
  • Lower installation cost
  • Potential security vulnerabilities
  • Performance affected by distance and obstacles
  • Great for guest access and temporary setups

Comparison Summary

FeatureWiredWireless
SpeedFaster (1 Gbps+)Slower (typically <1 Gbps)
ReliabilityVery reliableAffected by interference
SecurityMore secure (physical access)Less secure (can be intercepted)
MobilityNoneFull mobility
InstallationDifficult, requires cablingEasy
CostHigher initial, lower ongoingLower initial, higher ongoing (maintenance)
InterferenceNoneSusceptible

Transmission Media

Copper Cable

Types:

  • Twisted Pair: Most common (Ethernet cables); pairs of wires twisted to reduce interference
  • Coaxial: Single copper core with shielding; used for cable TV and older networks

Characteristics:

  • Relatively cheap
  • Easy to install
  • Susceptible to electromagnetic interference (EMI)
  • Limited distance (100m for Ethernet)
  • Speeds up to 10 Gbps (short distances)

Applications:

  • LAN cabling (Cat5e, Cat6, Cat6a)
  • Telephone lines
  • Cable TV/internet

Fibre-Optic Cable

Characteristics:

  • Uses light pulses through glass/plastic fibres
  • Very high speeds (hundreds of Gbps)
  • Long distances (kilometres without repeaters)
  • Immune to electromagnetic interference
  • Very secure (difficult to tap)
  • More expensive than copper
  • Requires special equipment and skills to install

Applications:

  • Internet backbone
  • Long-distance telecommunications
  • High-speed connections between buildings
  • Data centres
  • FTTH (Fibre to the Home)

Radio Waves (including Wi-Fi)

Characteristics:

  • Use radio frequencies for transmission
  • Can penetrate walls and obstacles (reduced by distance)
  • Coverage area depends on power and frequency
  • Subject to interference from other devices
  • Shared medium (bandwidth shared among users)

Wi-Fi specifics:

  • Uses 2.4 GHz and 5 GHz frequencies (also 6 GHz with Wi-Fi 6E)
  • 2.4 GHz: Better range, more interference
  • 5 GHz: Higher speed, shorter range, less interference
  • Range typically 30-100m indoors

Microwaves

Characteristics:

  • Higher frequency than radio waves
  • Line-of-sight transmission required
  • Cannot penetrate buildings/obstacles well
  • Affected by weather (rain fade)
  • High bandwidth
  • Used for point-to-point links

Applications:

  • Backhaul links between cell towers
  • Satellite communications
  • Building-to-building connections

Satellites

Characteristics:

  • Cover vast geographical areas
  • High latency (signal travel time to space and back)
  • Expensive to launch and maintain
  • Weather affects signal quality
  • Bandwidth shared among many users

Types:

  • Geostationary: Fixed position; high latency; covers large area
  • Low Earth Orbit (LEO): Lower latency; multiple satellites needed (e.g., Starlink)

Applications:

  • Global communications
  • Television broadcasting
  • Internet in remote areas
  • GPS navigation

LAN Hardware

Switch

  • Connects devices within a LAN
  • Forwards data only to intended recipient (unlike hub)
  • Uses MAC addresses to make forwarding decisions
  • Creates dedicated communication paths
  • Full-duplex communication possible
  • Essential for modern star topology networks

Server

  • Powerful computer providing services to clients
  • Types: file server, print server, web server, database server
  • Usually has redundant components (power supplies, hard drives)
  • Runs server operating system
  • Central point for security and management

Network Interface Card (NIC)

  • Hardware that connects a device to a network
  • Has unique MAC address burned in
  • Converts data between computer and network
  • Can be wired (Ethernet port) or wireless
  • May be integrated into motherboard or add-on card

Wireless Network Interface Card (WNIC)

  • NIC for wireless networks
  • Contains antenna and radio transmitter/receiver
  • Connects to Wi-Fi networks
  • Handles encryption/decryption of wireless signals

Wireless Access Point (WAP)

  • Allows wireless devices to connect to wired network
  • Extends coverage of wireless network
  • Can support multiple wireless clients
  • May include routing capabilities
  • Often PoE (Power over Ethernet) powered

Cables

  • Connect devices in wired networks
  • Types: Cat5e, Cat6, Cat6a, Cat7, fibre optic
  • Terminated with RJ45 connectors (copper) or special connectors (fibre)
  • Maximum length depends on cable type (typically 100m for copper)

Bridge

  • Connects two separate network segments
  • Filters traffic based on MAC addresses
  • Reduces unnecessary traffic between segments
  • Can connect different media types (e.g., copper to fibre)
  • Modern switches incorporate bridging functions

Repeater

  • Amplifies and regenerates signals
  • Extends network distance beyond normal limits
  • Works at physical layer (doesn’t understand packets)
  • Can introduce latency
  • Modern networks use switches instead of repeaters

Router

Role and Function

Primary functions:

  • Connects different networks together (e.g., LAN to internet)
  • Forwards data packets between networks
  • Determines best path for data using routing tables and protocols
  • Performs Network Address Translation (NAT)
  • Provides firewall functionality
  • Assigns IP addresses via DHCP

How routers work:

  1. Receives packet on one interface
  2. Examines destination IP address
  3. Looks up best path in routing table
  4. Forwards packet out appropriate interface
  5. Updates packet headers (TTL, checksums)

Routing table contains:

  • Destination networks
  • Next hop addresses
  • Interface to use
  • Metric (cost) for each route

Routing protocols:

  • Static routing: Manually configured routes
  • Dynamic routing: Automatically learn routes (RIP, OSPF, BGP)

Ethernet and CSMA/CD

Ethernet Basics

  • Most common LAN technology
  • Defines wiring and signalling standards
  • Uses CSMA/CD to manage access to shared medium
  • Originally used bus topology; now typically star with switches

CSMA/CD (Carrier Sense Multiple Access with Collision Detection)

How it works:

  1. Carrier Sense: Device listens to see if network is free
  2. Multiple Access: Multiple devices can attempt to transmit
  3. Collision Detection: Device detects if another transmitted simultaneously

Process:

  1. Device checks if network is idle
  2. If idle, start transmitting
  3. While transmitting, listen for collisions
  4. If collision detected:
  • Stop transmitting
  • Send jam signal to ensure all devices know collision occurred
  • Wait random time (backoff)
  • Attempt to retransmit
  1. Repeat until successful or maximum attempts reached

Important: CSMA/CD is only used in half-duplex connections. Modern switched networks use full-duplex, eliminating collisions.


Bit Streaming

Definition

Continuous transmission of digital data as a stream of bits, typically for audio or video.

Methods of Bit Streaming

Real-time streaming:

  • Data played as received; not stored permanently
  • Requires consistent data rate
  • Sensitive to delays and buffering
  • Examples: Live video broadcast, video conferencing
  • Uses protocols like RTP (Real-time Transport Protocol)

On-demand streaming:

  • User can start, pause, rewind
  • Data may be buffered ahead
  • More tolerant of network variations
  • Examples: Netflix, YouTube, Spotify
  • Uses protocols like HTTP with adaptive bitrate

Importance of Bit Rates and Broadband Speed

Bit rate: Number of bits transmitted per second (bps)

Required bit rates for different content:

  • Music streaming: 128-320 kbps
  • SD video: 3-5 Mbps
  • HD video (1080p): 5-8 Mbps
  • 4K video: 15-25 Mbps
  • 8K video: 50-100 Mbps

Impact of insufficient bandwidth:

  • Buffering/pausing
  • Reduced quality (automatic downscaling)
  • Lag/latency
  • Packet loss
  • Poor user experience

Broadband speed requirements:

  • Higher speeds allow higher quality streaming
  • Multiple simultaneous streams require more bandwidth
  • Consistent speed more important than peak speed
  • Latency affects real-time streaming

World Wide Web vs Internet

Internet

  • Global network of interconnected computer networks
  • The physical infrastructure
  • Hardware: cables, routers, servers, satellites
  • Uses TCP/IP protocols
  • Transports all kinds of data (email, files, web, VoIP)

World Wide Web (WWW)

  • Service that runs on the internet
  • Collection of web pages and resources
  • Accessed via web browsers
  • Uses HTTP/HTTPS protocols
  • Linked via hyperlinks
  • One of many internet services (others: email, FTP, VoIP)

Comparison

FeatureInternetWorld Wide Web
DefinitionPhysical network infrastructureService on the network
AnalogyThe road systemThe cars and traffic
ProtocolsTCP/IPHTTP/HTTPS
ComponentsCables, routers, serversWeb pages, browsers, links
Access methodAny internet applicationWeb browser
ExampleSending an emailBrowsing a website

Internet Hardware

Modem (Modulator-Demodulator)

  • Converts digital signals to analogue and vice versa
  • Enables digital devices to use analogue lines (telephone, cable)
  • Types:
  • Dial-up modem: Over telephone lines (obsolete)
  • DSL modem: Over telephone lines, higher speeds
  • Cable modem: Over TV cable infrastructure
  • Fibre modem: For fibre optic connections

PSTN (Public Switched Telephone Network)

  • Traditional telephone network
  • Originally analogue, now largely digital
  • Used for dial-up internet (historically)
  • Now often used for DSL internet (uses frequencies above voice)

Dedicated Lines

  • Leased lines reserved for a single customer
  • Guaranteed bandwidth and availability
  • Expensive but reliable
  • Examples: T1, E1, fibre leased lines
  • Used by businesses for WAN connections

Cell Phone Network

  • Mobile network infrastructure
  • Divides area into cells, each with base station
  • Technologies: 3G, 4G/LTE, 5G
  • Used for mobile internet access
  • Components: Base stations, mobile switching centres, backhaul connections

IP Addressing

IP Address Format

IPv4 (Internet Protocol version 4):

  • 32-bit address
  • Written as four decimal numbers (0-255) separated by dots
  • Example: 192.168.1.1
  • Approximately 4.3 billion unique addresses
  • Running out; solved by NAT and IPv6

IPv6 (Internet Protocol version 6):

  • 128-bit address
  • Written as eight groups of four hexadecimal digits
  • Example: 2001:0db8:85a3:0000:0000:8a2e:0370:7334
  • Can be abbreviated (omit leading zeros, use :: for consecutive zeros)
  • Virtually unlimited addresses (340 undecillion)

Subnetting

  • Dividing a network into smaller subnetworks
  • Improves efficiency and security
  • Reduces broadcast traffic
  • Uses subnet mask to identify network portion of IP address
  • Example: 192.168.1.0/24 means first 24 bits are network address

Associating IP Addresses with Devices

  • Static allocation: IP manually assigned; never changes
  • Dynamic allocation: IP automatically assigned via DHCP (Dynamic Host Configuration Protocol)
  • DHCP process:
  1. Device broadcasts DHCP discovery
  2. DHCP server offers an IP address
  3. Device requests the offered address
  4. Server acknowledges and assigns the address (lease)

Public vs Private IP Addresses

Public IP addresses:

  • Globally unique
  • Routable on the internet
  • Assigned by ISP
  • Can be accessed from anywhere
  • Security risk if exposed directly

Private IP addresses:

  • Not routable on the internet
  • Used within private networks
  • Reserved ranges:
  • 10.0.0.0 – 10.255.255.255 (10.0.0.0/8)
  • 172.16.0.0 – 172.31.255.255 (172.16.0.0/12)
  • 192.168.0.0 – 192.168.255.255 (192.168.0.0/16)
  • Must use NAT to access internet

NAT (Network Address Translation):

  • Router translates private IPs to public IP
  • Multiple devices share one public IP
  • Provides basic security (hides internal structure)

Static vs Dynamic IP Addresses

Static IP:

  • Manually configured; never changes
  • Required for servers (web, email, etc.)
  • More expensive
  • Easier to access remotely
  • Used for critical services

Dynamic IP:

  • Automatically assigned by DHCP
  • Changes over time (when lease expires)
  • Cheaper (standard for home users)
  • Good for client devices
  • More complex to access remotely
FeatureStatic IPDynamic IP
AssignmentManualAutomatic (DHCP)
ChangesNeverMay change
CostHigherLower
Use caseServers, remote accessClient devices, home users
ManagementMore workAutomatic

URLs and DNS

Uniform Resource Locator (URL)

Definition: Address used to locate a resource on the World Wide Web.

Structure:

https://www.example.com:443/products/item.html?id=123#section
\___/  \_______________/ \_/ \_________________/\_______/\_______/
protocol     domain      port        path        query    fragment

Components:

  • Protocol: How to access (http, https, ftp)
  • Domain name: Human-readable address (www.example.com)
  • Port: Specific service port (optional, default 80 for http, 443 for https)
  • Path: Specific file/directory on server (/products/item.html)
  • Query: Parameters for dynamic content (?id=123)
  • Fragment: Specific section within page (#section)

Domain Name Service (DNS)

Purpose: Translates human-readable domain names into IP addresses.

Why DNS is needed:

  • Humans remember names (google.com) better than numbers (142.250.185.46)
  • IP addresses can change while domain names stay the same
  • Enables load balancing (one name to multiple IPs)
  • Essential for email routing (MX records)

How DNS works:

  1. User types www.example.com in browser
  2. Computer checks local cache (hosts file, browser cache)
  3. If not found, queries recursive DNS resolver (usually ISP)
  4. Resolver queries root name servers
  5. Root points to .com TLD (Top-Level Domain) servers
  6. TLD servers point to example.com’s authoritative name servers
  7. Authoritative servers provide IP address for www.example.com
  8. IP address returned to browser
  9. Browser connects to that IP address

DNS record types:

  • A: IPv4 address
  • AAAA: IPv6 address
  • CNAME: Canonical name (alias)
  • MX: Mail exchange (email server)
  • NS: Name server
  • TXT: Text information (often for verification)

DNS hierarchy:

Root (.)
  ├── .com TLD
  │     └── example.com
  │           ├── www.example.com
  │           └── mail.example.com
  ├── .org TLD
  └── .uk ccTLD
        └── .co.uk
              └── bbc.co.uk

Summary Checklist for Assessment Objectives

AO1 (Knowledge) – You should be able to:

  • ✓ Define LAN, WAN, client-server, peer-to-peer
  • ✓ Describe network topologies (bus, star, mesh, hybrid)
  • ✓ Explain cloud computing types (public, private)
  • ✓ Describe transmission media characteristics
  • ✓ List LAN hardware (switch, NIC, WAP, etc.)
  • ✓ Explain router functions
  • ✓ Describe CSMA/CD process
  • ✓ Define bit streaming methods
  • ✓ Differentiate internet vs WWW
  • ✓ Describe IP address formats (IPv4, IPv6)
  • ✓ Explain DNS purpose and hierarchy

AO2 (Application) – You should be able to:

  • ✓ Justify network model for given scenarios
  • ✓ Justify topology for given situations
  • ✓ Compare wired vs wireless for specific needs
  • ✓ Explain packet transmission in different topologies
  • ✓ Justify cloud vs on-premises for organisations
  • ✓ Calculate bandwidth requirements for streaming
  • ✓ Explain IP address allocation methods
  • ✓ Trace URL resolution through DNS

AO3 (Design/Evaluation) – You should be able to:

  • ✓ Evaluate network designs for organisations
  • ✓ Compare and contrast different network models
  • ✓ Assess security implications of network choices
  • ✓ Design appropriate network solutions
  • ✓ Evaluate cloud computing benefits/drawbacks for specific cases
  • ✓ Analyse network performance factors
  • ✓ Critically evaluate transmission media choices

Scroll to Top