Computer Studies (AKU-CS)
Topic 4 of 4Aga Khan Board

Networking & Internet

Explores how devices connect in networks, the internet's structure, and digital security.

What You'll Learn
LAN: small area; WAN: large area; Internet = global WANStar topology: central hub; bus topology: shared cableTCP/IP: routes data packets; DNS: name to IP addressCybersecurity: phishing, malware; protect with firewall +…

Introduction to Computer Networks


A computer network is a collection of two or more interconnected computing devices that can exchange data and share resources. The primary purpose of networking is to facilitate communication and resource sharing, such as a printer, a file server, or an internet connection. Networks are fundamental to modern life, from a small office sharing a single printer to the global internet connecting billions of devices.


Benefits of Networking:

  • Resource Sharing: Devices like printers, scanners, and storage can be shared among many users, reducing costs.
  • Data Sharing & Communication: Users can easily share files and communicate via email, instant messaging, and video conferencing.
  • Centralised Management: Software updates, data backups, and security policies can be managed from a central location, improving efficiency and security.

Drawbacks of Networking:

  • Security Risks: Networks are vulnerable to unauthorised access, malware, and other cyber threats.
  • Management Complexity: Larger networks require skilled personnel to manage and maintain them.
  • Initial Cost: Setting up a network requires investment in hardware (routers, switches, cables) and software.

Network Types and Models


Networks are primarily classified by their geographical scale.


  • LAN (Local Area Network): A network confined to a small geographical area, such as a single building, a school campus, or a home. LANs are typically privately owned and managed. For example, the computer lab in a school in Karachi is a LAN.
  • WAN (Wide Area Network): A network that spans a large geographical area, often connecting multiple LANs across cities or even countries. WANs often utilise infrastructure from telecommunication companies like PTCL or Nayatel. The **internet** is the world's largest WAN.

Two primary models govern how devices interact on a network:


  1. Client-Server Model: A centralised model where a powerful computer called a server provides services (e.g., storing files, hosting a website, managing emails) to other devices called clients. This model is highly scalable and easy to manage. Most businesses and online services, like the online portal for a Pakistani bank, use this model.
  2. Peer-to-Peer (P2P) Model: A decentralised model where all devices, or peers, are equal. Each peer can act as both a client and a server, sharing its own files and resources directly with others. This is simple to set up for small groups but can be less secure and harder to manage as it grows.

Network Hardware


  • Router: A device that forwards data packets **between different networks**. Your home Wi-Fi router connects your local home network (LAN) to your Internet Service Provider's network (WAN).
  • Switch: A device that connects multiple devices **within the same LAN**. A switch is intelligent; it learns the address of each connected device and forwards data packets only to the intended recipient, reducing network congestion.
  • Wireless Access Point (WAP): Allows wireless-capable devices (laptops, smartphones) to connect to a wired network using Wi-Fi (a set of protocols based on IEEE 802.11 standards).
  • Network Interface Card (NIC): A hardware component, either built into the motherboard or added as an expansion card, that allows a computer to physically connect to a network, either via an Ethernet cable or wirelessly.

The Internet


The internet is a global 'network of networks' that uses the standard TCP/IP protocol suite to link devices worldwide.

  • Domain Name System (DNS): Often called the 'phonebook of the internet'. DNS servers translate human-friendly **domain names** (e.g., `google.com`) into computer-readable **IP addresses** (e.g., `142.250.200.14`). When you type a website address, your computer queries a DNS server to find the correct IP address before it can request the webpage.
  • Hosting: For a website to be accessible on the internet, its files (HTML, images, etc.) must be stored on a special computer called a **web server**. This service of storing and serving website files is called **web hosting**.

Network Protocols


Protocols are sets of established rules that dictate how data is formatted, transmitted, and received. They ensure that devices from different manufacturers can communicate with each other.

  • TCP/IP (Transmission Control Protocol/Internet Protocol): The foundational suite of the internet. IP is responsible for addressing and routing packets to their destination. TCP is responsible for breaking down data into packets, ensuring they are all received correctly, and reassembling them in the right order.
  • HTTP/HTTPS (Hypertext Transfer Protocol/Secure): The protocol used for transmitting web pages. When you see **HTTPS**, it means the data transfer between your browser and the web server is **encrypted**, making it secure for activities like online banking or shopping on a Pakistani e-commerce site like Daraz.pk.
  • FTP (File Transfer Protocol): A standard protocol used for the transfer of computer files between a client and server on a network.
  • Email Protocols:
  • SMTP (Simple Mail Transfer Protocol): Used for **sending** emails.
  • POP3 (Post Office Protocol 3): Used for **receiving** emails. It typically downloads emails from the server to a single device and then deletes them from the server.
  • IMAP (Internet Message Access Protocol): Also used for **receiving** emails, but it synchronises with the server. This means you can access your emails from multiple devices, and actions (like reading or deleting an email) are reflected everywhere.

Cybersecurity Essentials


Cybersecurity involves protecting networks, devices, and data from unauthorised access or criminal use.

  • Authentication: The process of verifying the identity of a user or device. Common methods include passwords, PINs, biometrics (fingerprints, facial recognition), and two-factor authentication (2FA).
  • Encryption: The process of converting data into a scrambled, unreadable code to prevent unauthorised access. Only authorised parties with the correct 'key' can decrypt and read the information. This is the core technology behind HTTPS and VPNs.
  • Firewall: A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and an untrusted external network, like the internet.

#### Common Misconceptions & Exam Traps:

  • Hub vs. Switch: A hub is a simple, older device that broadcasts all incoming data to every connected device, creating unnecessary traffic. A switch is smarter and sends data only to the specific device it's intended for.
  • Router vs. Switch: A switch operates *within* a single network (LAN) to connect devices. A router's main job is to connect *different* networks together.
  • The Internet vs. The World Wide Web (WWW): The internet is the global network infrastructure of cables, routers, and servers. The WWW is a service that runs *on* the internet—it's the collection of websites and web pages that you access using a browser.

Key Points to Remember

  • 1LAN: small area; WAN: large area; Internet = global WAN
  • 2Star topology: central hub; bus topology: shared cable
  • 3TCP/IP: routes data packets; DNS: name to IP address
  • 4Cybersecurity: phishing, malware; protect with firewall + 2FA

Pakistan Example

Pakistan's Internet Shutdown Incidents — Networking in Real Life

Pakistan has experienced multiple internet shutdowns (2022-2024) where ISPs (Internet Service Providers) were ordered to block certain IPs and domains. This directly involves DNS blocking and IP filtering — AKU-CS topics. Jazz, Telenor, and Zong all use WAN infrastructure. Karachi's KHI-IX internet exchange point is Pakistan's main internet hub.

Quick Revision Infographic

Computer Studies — Quick Revision

Networking & Internet

Key Concepts

1LAN: small area; WAN: large area; Internet = global WAN
2Star topology: central hub; bus topology: shared cable
3TCP/IP: routes data packets; DNS: name to IP address
4Cybersecurity: phishing, malware; protect with firewall + 2FA

Formulas to Know

AN: small area; WAN: large area; Internet = global WAN
Pakistan Example

Pakistan's Internet Shutdown Incidents — Networking in Real Life

Pakistan has experienced multiple internet shutdowns (2022-2024) where ISPs (Internet Service Providers) were ordered to block certain IPs and domains. This directly involves DNS blocking and IP filtering — AKU-CS topics. Jazz, Telenor, and Zong all use WAN infrastructure. Karachi's KHI-IX internet exchange point is Pakistan's main internet hub.

SeekhoAsaan.com — Free RevisionNetworking & Internet Infographic

Test Your Knowledge!

3 questions to test your understanding.

Start Quiz