Show understanding of the purpose and benefits of networking devices

2.1 Networks – Purpose and Benefits of Networking Devices

Learning objective

Show understanding of the purpose and benefits of networking devices and how they support different network types, topologies and services required by the Cambridge AS & A‑Level Computer Science syllabus (Topic 2.1).

Syllabus coverage at a glance

Syllabus sub‑topic (2.1) Covered in these notes? Key points to remember
Purpose & benefits of networking devices Connectivity, logical separation, traffic control, scalability
LAN vs WAN characteristics Scope, media, protocols, typical bandwidth ranges
Client‑server & peer‑to‑peer models Definition, exam‑style scenario, when each model is appropriate
Thin‑client vs thick‑client Processing location, VDI/centralised OS image, examples
Network topologies Bus, star, mesh, hybrid – physical layout, pros & cons
Wired vs wireless networks Speed, latency, security, typical use‑cases
Cloud‑computing implications VPN, VLAN, scalable bandwidth
Hardware that supports a LAN NIC, hub, switch, bridge, router, gateway, modem, AP, firewall – OSI layer & benefit
IP addressing (IPv4/IPv6, subnetting, public‑private, static‑dynamic) Key definitions and examples
URL resolution and DNS Three‑step process
Bit‑streaming concepts (real‑time vs on‑demand) Bandwidth & latency requirements
Security implications of networking devices Firewalls, VPN routers, switch security, Wi‑Fi encryption

Why use networking devices?

  • Physical connectivity – provide the medium (copper, fibre, radio) that links devices.
  • Logical separation of traffic – VLANs, sub‑nets, and bridges keep different kinds of data apart.
  • Control of data flow – error handling, collision avoidance, QoS, and security policies.
  • Scalability – new hosts or sites can be added without redesigning the whole network.

Network types – LAN vs WAN

Aspect LAN (Local Area Network) WAN (Wide Area Network)
Typical scope Single building, floor or campus Multiple sites spread across a city, country or the globe
Common media Twisted‑pair copper (Cat 5e/6/6a), fibre, Wi‑Fi Fibre optic links, satellite, microwave, leased lines, MPLS
Typical protocols Ethernet, Wi‑Fi (IEEE 802.11), TCP/IP TCP/IP over MPLS, VPN, BGP, PPP, HDLC
Typical bandwidth 10 Mb/s – 10 Gb/s (often 1 Gb/s for office LANs) 1 Mb/s – 100 Gb/s (shared or dedicated links)
Example use‑case School computer lab, intranet file server Connecting a school’s main campus to a remote satellite campus

Client‑Server vs Peer‑to‑Peer (P2P) models

  • Client‑Server – Centralised servers host services; clients request resources.
    • Typical services: web, email, file sharing, database.
    • Exam‑style scenario: A school runs an intranet web server that stores the timetable. All student PCs (clients) retrieve the page via HTTP.
  • Peer‑to‑Peer (P2P) – Every node can act as both client and server; resources are shared directly.
    • Typical use: file‑sharing, collaborative editing, distributed computing.
    • Exam‑style scenario: Two laptops in a computer club exchange a large video file using BitTorrent without involving a central server.

Thin‑client vs Thick‑client

  • Thin client – Minimal local processing; the operating system and applications run on a remote server (often via Virtual Desktop Infrastructure – VDI).
    • Benefits: easier maintenance, lower hardware cost, data centralisation.
    • Example: Classroom PCs boot a Windows 10 VDI session from a central server.
  • Thick client – Most processing and storage occur locally on the device.
    • Benefits: works when the network is down, can run resource‑intensive software.
    • Example: A teacher’s laptop running Microsoft Office and a video‑editing suite.

Network topologies

Topology Physical layout Advantages Disadvantages
Bus All devices share a single coaxial or twisted‑pair backbone Simple, inexpensive cabling Single point of failure, limited bandwidth, collisions
Star Each device connects to a central hub or switch Easy to manage, fault isolation (a bad cable only affects one node) Central device failure disables the whole segment
Mesh Multiple redundant links between devices (full or partial mesh) High reliability, load‑balancing, fault tolerance Expensive, complex cabling and configuration
Hybrid Combination of two or more basic topologies (e.g., star‑bus) Flexibility to match organisational needs Design and management can be more complex

Wired vs wireless networks

Aspect Wired (Ethernet) Wireless (Wi‑Fi, Bluetooth)
Speed Up to 10 Gb/s (Cat 6a/7) – low latency Up to 6 Gb/s (Wi‑Fi 6) – higher latency
Security Physical security; easier to control access Requires encryption (WPA3), susceptible to eavesdropping
Mobility Fixed locations; cabling required Device can move freely within coverage area
Typical use‑case Backbone links, server farms, desktop PCs Laptops, tablets, IoT sensors, guest access

Cloud computing & networking

When services are hosted in the cloud (IaaS, PaaS, SaaS) the on‑premises network must be able to:

  • Provide secure VPN tunnels for remote staff.
  • Segregate traffic with VLANs or virtual routing (e.g., separate production and management traffic).
  • Scale bandwidth on demand to cope with bursty cloud traffic.

Hardware that supports a LAN

  1. Network Interface Card (NIC) – Physical & data‑link interface on a host (Layer 1‑2). Enables a device to join a network.
  2. Hub – Repeats incoming electrical signals to all ports (Layer 1). Simple, low‑cost, but causes collisions.
  3. Switch – Forwards Ethernet frames to the correct destination MAC address (Layer 2). Reduces collisions and improves bandwidth utilisation.
  4. Bridge – Connects two LAN segments and filters traffic using MAC addresses (Layer 2). Provides segmentation without full routing.
  5. Router – Routes IP packets between different networks (Layer 3). Performs NAT, DHCP relay and can implement ACLs.
  6. Gateway – Converts between different protocols or architectures (e.g., IPv4 ↔ IPv6, Ethernet ↔ Wi‑Fi). May involve several OSI layers.
  7. Modem – Modulates/demodulates signals for transmission over analog media (telephone, cable) (Layer 1). Connects the LAN to an ISP.
  8. Access Point (AP) – Provides wireless connectivity to a wired LAN (Layer 2/3). Handles association, authentication and radio management.
  9. Firewall – Enforces security policies by filtering traffic (Layer 3‑7). Can perform stateful inspection, intrusion detection and VPN termination.

Device‑specific benefits (quick reference)

Device Primary function OSI layer(s) Key benefit
NIC Send/receive frames for a host 1‑2 Enables a computer to participate in a network
Hub Broadcasts incoming signal to all ports 1 Very cheap, useful for simple lab setups
Switch Forwards frames to the correct MAC address 2 Reduces collisions, improves throughput
Bridge Connects two LAN segments, filters traffic 2 Segmentation without needing a router
Router Routes packets between different IP networks 3 Enables internetworking, NAT, and WAN connectivity
Gateway Protocol conversion (e.g., IPv4 ↔ IPv6) 1‑7 Allows heterogeneous networks to communicate
Modem Modulates/demodulates signals for telephone/cable lines 1 Provides the “last mile” link to an ISP
Access Point Creates a wireless LAN segment 2‑3 Offers mobility and easy device addition
Firewall Filters traffic according to security policies 3‑7 Protects the network from unauthorised access and attacks

IP addressing overview

  • IPv4 – 32‑bit address (e.g., 192.168.1.10). Approximately 4.3 billion unique addresses.
  • IPv6 – 128‑bit address (e.g., 2001:0db8:85a3::8a2e:0370:7334). Provides an effectively unlimited address space.
  • Subnetting – Divides a network into smaller logical segments using a subnet mask (e.g., /24 = 255.255.255.0). Improves security and reduces broadcast traffic.
  • Public vs private addresses – Public addresses are routable on the Internet; private ranges (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16) are used internally and require NAT for Internet access.
  • Static vs dynamic allocation – Static addresses are manually configured; dynamic addresses are assigned by a DHCP server.

URL resolution and DNS

When a user enters https://www.example.com/index.html the following steps occur:

  1. The browser extracts the domain name www.example.com.
  2. A DNS query is sent to a resolver, which returns the corresponding IP address (e.g., 93.184.216.34).
  3. The browser opens a TCP connection to that IP address on port 443 and requests /index.html.

Bit‑streaming concepts

  • Real‑time streaming – Data is consumed as it arrives (e.g., live video conference). Requires steady bandwidth and low latency.
  • On‑demand streaming – Content is buffered before playback (e.g., Netflix). Allows variable bandwidth but still benefits from high throughput.

Security implications of networking devices

  • Firewalls – Block unauthorised inbound/outbound traffic; can perform stateful inspection and application‑layer filtering.
  • VPN routers – Encrypt traffic for secure remote access over public networks.
  • Switch security – MAC address filtering, VLAN segregation, and port security prevent unauthorised devices from connecting.
  • Wireless security – Use WPA3 encryption, hide SSID where appropriate, and optionally enable MAC‑address filtering.

Performance metric example

Network throughput is calculated as:

$$\text{Throughput} = \frac{\text{Total bits transferred}}{\text{Transfer time}}$$

Using a switch that isolates frames by MAC address reduces collisions, so more bits are successfully transferred in the same time interval, increasing throughput.

Suggested diagram

Figure: Simple LAN layout – a router connects to the Internet, a firewall protects the internal network, a switch links multiple PCs, an access point provides Wi‑Fi, and a server hosts a web application. NICs are shown on each host.

Summary

Networking devices are the building blocks that make modern computer networks possible. They provide the physical links, logical segregation, traffic control, security and scalability required for LANs, WANs and cloud‑based services. Understanding each device’s purpose, the OSI layer it operates in, and the benefits it brings equips students to design, evaluate and troubleshoot real‑world network solutions in line with the Cambridge AS & A‑Level syllabus.

Create an account or Login to take a Quiz

95 views
0 improvement suggestions

Log in to suggest improvements to this note.