On This Page

The Standalone Computer

STANDALONE Local HDD USB only manual Own printer No network

A standalone computer operates entirely on its own — not connected to any other device. It has its own operating system, software, and local storage. Every user works in isolation.

Isolated Self-contained No sharing Manual file transfer
Advantages
  • Simple — no extra hardware needed
  • Secure: no network attack surface
  • No dependency on a server
  • Faster for isolated local tasks
Disadvantages
  • Files shared only via USB or physical media
  • Each machine needs its own printer
  • Software installed per machine — costly
  • No central backups; data lost if drive fails
  • No communication between users

Why Connect Computers?

PC 1 PC 2 PC 3 SWITCH / HUB File Server Shared Printer Resources shared across all machines

As organisations grew, buying a printer per machine and physically carrying files on USB drives became impractical and expensive. Networking solves this: connect computers and let them share resources and communicate instantly.

Resource sharing Communication Cost saving Central management
Benefits gained
  • One printer shared across all PCs
  • Site licence software — cheaper per seat
  • Central file storage — any machine, any time
  • Email and instant messaging
  • Remote software updates by admin
New challenges
  • Extra hardware: switch, cables, NICs
  • Server failure affects everyone
  • Viruses spread to all machines
  • Needs a network administrator

Local Area Network (LAN)

SCHOOL BUILDING — LAN PC PC PC Switch File Server Shared Printer Owned and managed by the organisation

A LAN connects computers within a limited geographical area — a classroom, office floor, or building. It is typically owned and managed by the organisation itself using its own cabling and switches. Your school network is a LAN.

Single building Organisation-owned High speed Centrally managed
Advantages
  • Very fast data transfer — short cable runs
  • Organisation owns and controls all hardware
  • Share printers, scanners, file servers
  • Centralised software updates and security
Disadvantages
  • Limited to one site — cannot span cities
  • Physical cabling expensive to install
  • Requires staff with networking expertise
  • Switch failure affects all connected devices

Network Topologies

A topology describes how devices are physically arranged and connected on a network. The choice affects speed, cost, and reliability. The star topology is by far the most common in schools and offices.

Star SW All connect to central switch Mesh Multiple routes — very resilient Bus Backbone — one break kills network Ring data travels in a loop Most common in schools
Star — most common Mesh — most resilient Bus — outdated Ring — rarely used

Star Topology

Advantages
  • Fast — minimal collisions
  • Easy to add new devices
  • One device failing doesn’t affect others
  • Easy to identify faults
Disadvantages
  • Switch failure = entire network down
  • Requires extra hardware (switch)
  • More cable needed than bus

Bus Topology

Advantages
  • Easy to set up
  • Uses less cable than star
Disadvantages
  • If the backbone cable fails the whole network goes down
  • Performance degrades with more devices
  • Difficult to troubleshoot
  • Data collisions common

Ring Topology

Advantages
  • Data flows in one direction reducing collisions
  • Performs better than bus under heavy load
Disadvantages
  • If one device or cable fails the whole network goes down
  • Difficult to add new devices (must break the ring)
  • Slower as data passes through every device

Client–Server Model

SERVER files - accounts - security Manages all network resources Client A Client B Client C Client D request response request response Clients request; server manages and responds

Most school and business networks use the client–server model: a powerful server manages shared resources, user accounts, and security policies. Each user’s PC is a client that sends requests to the server and receives responses.

Client–server Centralised control Most common model
Advantages
  • Centralised security and access control
  • Easy to back up all data centrally
  • Admin updates software remotely
  • Server scales to handle many clients
Disadvantages
  • Expensive to buy and maintain a server
  • Server failure = all clients lose access
  • Needs skilled network administrator

Peer-to-Peer Networks

PC A Equal peer PC B Equal peer PC C Equal peer PC D Equal peer NO SERVER Every device is equal — files shared directly between PCs

In a peer-to-peer (P2P) network, every computer is equal — there is no central server. Each device can share files, printers, and other resources directly with every other device. This is commonly used in small home networks or for file-sharing applications.

No central server Every device equal Cheap to set up Hard to manage at scale
Advantages
  • No server needed — cheaper to set up
  • Easy to configure for small networks
  • No single point of failure (no server to crash)
  • Each PC controls its own files and security
Disadvantages
  • No central security — each PC manages its own
  • Harder to manage as network grows
  • Files spread across multiple machines — hard to find and back up
  • Performance slows as more devices share resources

Exam tip: You must be able to compare client-server and peer-to-peer networks. Client-server uses a central server for management and security; peer-to-peer has no server and every device is equal. Client-server is used in schools and businesses; P2P is used in small home networks.

Wired vs Wireless Connections

Networks can use wired connections (such as Ethernet cables) or wireless connections (such as WiFi or Bluetooth). Most networks use a combination of both. Understanding the trade-offs between wired and wireless is essential for GCSE.

Wired (Ethernet) Switch Physical cables connect devices Wireless (WiFi) WAP Radio signals — no cables Key hardware: NIC (Network Interface Card) • WAP (Wireless Access Point) • Switch • Router
Feature Wired (Ethernet) Wireless (WiFi / Bluetooth)
Speed Faster — dedicated cable per device Slower — shared radio frequency
Reliability Very reliable — no interference Less reliable — walls, interference, distance
Security More secure — physical access needed Less secure — signals can be intercepted
Flexibility Less flexible — devices tied to cable location Very flexible — connect anywhere in range
Cost Expensive to install cables in walls/floors Cheaper — just needs a WAP
Adding devices Needs a free port on the switch Easy — just connect to the WiFi

Key terms: A NIC (Network Interface Card) is the hardware inside a device that allows it to connect to a network — either wired (Ethernet port) or wireless (WiFi antenna). A WAP (Wireless Access Point) is a device that creates a wireless network, allowing devices to connect via WiFi.

Wide Area Network (WAN)

LAN A — London Router LAN B — Jersey Router ISP / WAN Link fibre - satellite - leased line Organisation pays ISP for the connection ISP installs, maintains, and manages the link KEY DIFFERENCE: WAN links are NOT owned by the organisation

When an organisation spans multiple buildings or cities, individual LANs are connected together to form a WAN. The links between LANs are usually owned by a third-party ISP such as BT or Virgin. Your school’s broadband connection to the internet is a WAN link.

Multiple sites ISP-owned links Geographically spread
Advantages
  • Connect sites across cities or countries
  • Access shared resources from anywhere
  • Single internet connection shared by all
Disadvantages
  • ISP subscription — ongoing cost
  • ISP manages the link, not the organisation
  • Slower than LAN — longer distances
  • More complex to secure

The Internet — World’s Largest WAN

Internet millions of LANs connected School LAN Office LAN Home LAN Web Server DNS: domain name → IP address

The Internet is a global WAN built from millions of interconnected LANs. Data travels as packets routed by routers. DNS (Domain Name Servers) translate human-readable web addresses into numerical IP addresses that routers use to direct traffic.

Global WAN Packet switching DNS + IP addresses Security risks
Advantages
  • Connects billions of devices worldwide
  • Access any website, service, or resource
  • Foundation of cloud computing
  • Multiple routes — very resilient
Disadvantages
  • Public — major security risks
  • Requires strong encryption (HTTPS)
  • Speed depends on ISP bandwidth
  • No single owner — difficult to regulate

Packet Switching

Files are too large to send in one go. Instead, data is broken into small packets. Each packet carries a header (source IP, destination IP, packet number, total count) and a payload (chunk of actual data). Packets travel independently and may take different routes — they are then reassembled in order at the destination.

Packets Headers + payload Independent routing Reassembled at destination
Packet anatomy
HEADER
Src IP
Dest IP
Pkt No.
Total
PAYLOAD
Chunk of actual data
(text, image bytes, etc.)
Advantages
  • Network stays efficient — no line monopolised
  • Packets reroute around failures automatically
  • Multiple users share the same links
  • Lost packet re-requested, not whole file
Disadvantages
  • Packets may arrive out of order
  • Reassembly adds latency
  • Congestion causes packet loss
  • Header data adds overhead to each packet

Interactive: How packets travel

Network Protocols

Device A Sender Device B Receiver PROTOCOL Agreed rules for: Format of data Speed of transmission Error handling Analogy: like the rules of a spoken language. Both sides must agree on the same rules to communicate.

A protocol is a set of agreed rules that govern how data is transmitted between devices on a network. Without protocols, devices made by different manufacturers could not communicate — like two people speaking different languages.

Protocols define: the format of data, the speed of transmission, error detection and correction, how connections are established and terminated, and how data is addressed and routed.

Agreed rules Data format Error handling Interoperability

Key Protocols You Need to Know

HTTP / HTTPS Application layer

HyperText Transfer Protocol — governs how web pages are requested and delivered between browser and web server.

HTTPS = HTTP + encryption (TLS/SSL). All data is encrypted — essential for login pages, banking, shopping.

GET /index.html HTTP/1.1
Host: www.hautevallee.sch.je
FTP Application layer

File Transfer Protocol — used to upload and download files between computers across a network.

Web developers use FTP to upload website files to a server. SFTP (Secure FTP) adds encryption for safety.

Upload files Download files Port 21
SMTP / IMAP / POP3 Application layer

SMTP (Simple Mail Transfer Protocol) — sends email from client to server and between servers.

IMAP — retrieves email, leaving it on the server (syncs across all devices).

POP3 — downloads email to one device and typically deletes it from server.

TCP Transport layer

Transmission Control Protocol — establishes a connection, breaks data into packets, ensures they all arrive and are reassembled in the correct order.

Uses a three-way handshake (SYN → SYN-ACK → ACK) to establish a reliable connection before data is sent.

Reliable Connection-based Error checked
IP Network layer

Internet Protocol — assigns IP addresses to every device and handles the routing of packets across networks. Routers use IP to decide where to forward each packet.

IPv4: 192.168.1.1
IPv6: 2001:0db8:85a3::8a2e:0370:7334
DNS Application layer

Domain Name System — translates human-readable domain names into numerical IP addresses. Like a phone book for the internet.

www.bbc.co.uk
  → DNS lookup
151.101.0.81

The TCP/IP 4-Layer Model

Protocols are organised into layers. The TCP/IP model groups all network protocols into four layers, each responsible for a different aspect of communication. Data passes down through the layers when sending and up through the layers when receiving.

Each layer only communicates with the layer directly above or below it. This separation of concerns means each layer can be updated independently — a change to how WiFi works (layer 1) doesn’t require rewriting HTTP (layer 4).

Layered model Encapsulation Separation of concerns 4 layers
Encapsulation — sending data
Application: HTTP request created
Transport: TCP header added (port, seq. no.)
Internet: IP header added (src/dest IP)
Link: Frame + MAC address — sent as bits

Receiving reverses this: each layer strips its header and passes data up.

Click a Layer to Explore

LAYER 4 — TOP
Application
HTTP · HTTPS
FTP · SMTP
DNS · IMAP
LAYER 3
Transport
TCP · UDP
LAYER 2
Internet
IP · ICMP
LAYER 1 — BOTTOM
Link
Ethernet · WiFi
MAC addresses
Click a layer above to see what it does.

TCP vs UDP — Two Transport Protocols

TCP — Transmission Control Protocol

Establishes a connection first. Guarantees all packets arrive and are in order. Slower but reliable.

  • Three-way handshake before data
  • Packets acknowledged and re-sent if lost
  • Data arrives in correct order
  • Used by: HTTP, HTTPS, FTP, email

UDP — User Datagram Protocol

No connection established. Packets sent without checking arrival. Faster but unreliable.

  • No handshake — data sent immediately
  • Lost packets are not re-sent
  • Lower latency — good for real-time data
  • Used by: video streaming, VoIP, gaming

The Full Journey

Standalone
Network needed
LAN
Topology
Client–Server
Peer-to-Peer
Wired / Wireless
WAN
Internet
Packet Switching
Protocols
TCP/IP Model

Every time you load a web page, your computer breaks the request into packets, sends them through a LAN (using wired or wireless connections) to a router, which forwards them across the internet (a global WAN) via the fastest available route — governed at every step by agreed protocols organised into the TCP/IP four-layer model.

Key exam topics covered: Standalone vs networked computers, LAN vs WAN, star/bus/ring/mesh topologies, client-server vs peer-to-peer, wired vs wireless, NIC, WAP, packet switching, protocols (HTTP, HTTPS, FTP, SMTP, IMAP, POP3, TCP, UDP, IP, DNS), and the TCP/IP 4-layer model with encapsulation.