Introduction to Networks
Hi there! Welcome to one of the most exciting parts of Computer Science. Have you ever wondered how a message travels from your phone in the UK to a friend in Australia in less than a second? Or how your computer "knows" where to find YouTube? That is exactly what we are going to explore in the Networks chapter. We’ll look at the hardware, the rules (protocols), and the clever systems that keep the world connected. Don’t worry if it seems like a lot of technical talk at first—we will break it down piece by piece with plenty of everyday examples!
Quick Review: What is a Network?
A network is simply two or more computers (or devices) connected together so they can share data and resources (like files or a printer).
1. Characteristics, Protocols, and Standards
Before we look at the wires and signals, we need to understand the "rules of the road."
Protocols
A Protocol is a set of rules that governs how data is transmitted across a network. Think of it like a human language. If I speak English and you speak French, we can’t exchange ideas. Computers are the same—they must agree on the format of the data, the speed of transmission, and how to check for errors.
Standards
Standards are agreed-upon requirements for hardware and software. They ensure that a laptop made by Apple can talk to a router made by Netgear. Without standards, the internet would be a mess of incompatible gadgets!
Memory Aid: The "Protocol" Analogy
Imagine you are meeting a dignitary. There is a "protocol" (a set of rules) for how to greet them. You bow, you use a specific title, and you wait for them to speak. Computer protocols are just "digital manners" to make sure everyone is on the same page.
Key Takeaway: Protocols are the rules for communication, and Standards ensure compatibility between different manufacturers.
2. LANs and WANs
We generally categorize networks by how much "space" they cover.
LAN (Local Area Network)
A LAN covers a small geographical area, like a single home, a school, or an office building. Usually, the hardware (cables, switches) is owned by the organization that uses it.
WAN (Wide Area Network)
A WAN covers a large geographical area, such as a city, a country, or even the whole world. The most famous example of a WAN is The Internet. WANs often use third-party telecommunications equipment (like satellite links or undersea cables) to connect different LANs together.
Quick Comparison Box:
LAN: Small area, high speed, owned by the user (e.g., your home Wi-Fi).
WAN: Large area, often slower than a LAN, uses external infrastructure (e.g., the Internet).
3. Network Hardware
To build a network, you need specific "tools." Here are the essentials for the OCR syllabus:
Network Interface Card (NIC): This is a piece of hardware inside your device that allows it to connect to a network. Every NIC has a unique physical address called a MAC Address.
Switch: A device that connects devices on a LAN. It is "smart" because it only sends data to the specific device that needs it, rather than broadcasting it to everyone.
Router: The "traffic controller" of the internet. It connects different networks together (e.g., connecting your home LAN to the Internet WAN) and directs data packets to their destination.
Wireless Access Point (WAP): This allows devices to connect to a wired network using Wi-Fi.
Common Mistake to Avoid: Don't confuse a Switch with a Router! A Switch creates a network (internal), while a Router connects networks (external).
4. The Internet Structure: TCP/IP and Layering
The Internet is built on a "stack" of protocols called the TCP/IP Stack. This is often the trickiest part of the chapter, so let's go slowly.
Protocol Layering
Instead of one giant rulebook, we use Layering. Each layer has a specific job. If you change a rule in one layer, you don't have to rewrite the whole system. The TCP/IP stack has four layers:
1. Application Layer: Where the user interacts with the network (e.g., your browser using HTTP or FTP).
2. Transport Layer: This layer breaks data into small chunks called packets. It handles the "handshake" between computers to make sure they are ready to talk.
3. Network Layer (or Internet Layer): This adds the IP Addresses (the "to" and "from" addresses) to the packets and routes them across the world.
4. Link Layer (or Network Access Layer): This is the physical connection. It handles the MAC Addresses and the actual electrical/radio signals.
Memory Aid: "All Taxis Need Licenses"
Application
Transport
Network
Link
Did you know? This process is called Encapsulation. As data goes down the stack, each layer wraps the data in its own "envelope" of information (headers).
5. DNS (Domain Name System)
Computers love numbers (IP Addresses like 192.0.2.1), but humans love words (like google.com). DNS is the system that translates domain names into IP addresses.
Step-by-Step DNS Process:
1. You type www.ocr.org.uk into your browser.
2. Your computer sends a request to a DNS Server asking: "What is the IP for this website?"
3. The DNS server looks through its "phonebook." If it doesn't know, it asks another, higher-level server.
4. The IP address is sent back to your computer.
5. Your computer can now connect directly to the web server using that IP address.
Key Takeaway: DNS is the "Phonebook of the Internet."
6. Packet vs. Circuit Switching
How does the data actually move through the wires?
Circuit Switching
This creates a dedicated connection between two points for the entire duration of the communication. Old-fashioned landline phones used this. No one else can use that "lane" until you hang up.
Pros: Reliable, no delay once connected.
Cons: Inefficient; if no one is talking, the line is still "locked."
Packet Switching
Data is broken into small Packets. Each packet can take a different route to the destination. They are reassembled in the correct order when they arrive.
Pros: Extremely efficient; the network can bypass broken routers easily.
Cons: Packets can arrive out of order or get lost.
Real-World Analogy: Circuit switching is like a private railway line where only your train can run. Packet switching is like the postal service: you send a book one page at a time in separate envelopes. They might take different trucks, but they all end up at your friend's house eventually!
7. Network Security
Connecting to a network opens you up to threats. Here are the three main defenses you need to know:
Firewalls: A security system that monitors incoming and outgoing traffic. It acts like a "bouncer" at a club, blocking any data that doesn't meet specific security criteria.
Proxies: A "middleman" server. Instead of you connecting directly to a website, you connect to the proxy, and the proxy gets the data for you. This hides your IP address and can filter out bad content.
Encryption: Scrambling data so that only someone with the correct "key" can read it. Even if a hacker steals your data, it will look like gibberish to them.
8. Client-Server vs. Peer-to-Peer
This describes the "relationship" between computers on a network.
Client-Server
Most school or office networks are Client-Server. There is a powerful central Server that manages files, security, and backups. The "Clients" (your laptop or PC) request services from it.
Best for: Large organizations where security and central control are important.
Peer-to-Peer (P2P)
In a P2P network, there is no central server. Every computer is equal and acts as both a client and a server. You might use this at home to share a printer between two laptops.
Best for: Small home networks or sharing files directly between users.
Quick Review:
Client-Server: Centralized, expensive, high security, professional.
Peer-to-Peer: Decentalized, cheap, easy to set up, lower security.
Don't worry if the TCP/IP layers or packet switching feel a bit abstract right now. The more you practice drawing the diagrams and explaining the analogies, the easier it becomes. You've got this!