Unit 11 Cyber Security and Incident Management
BTEC Information Technology
Learning Aim B
Network Security
How does the way a network is structured affect its security requirements?
1 Video Explainer
Understand the potential security implications of different network architectures
Resource 1: Network Architectures Explainer, Produced by NotebookLM (Length 5:52)
2 Key Knowledge Points
Network Architecture: Foundations and Modern Trends
Resource 2: Network Architectures Infographic by NotebookLM
3 Knowledge Questions
Task: Complete Topic 3 in Workbook 2 - use the slide deck below to help you.
4 Worked Examples
Examples of the different architectures in Packet Tracer
Peer to Peer
All devices have equal status. Each node can act as both client and server, sharing resources directly with others. Common in small home networks and file-sharing applications.
Client-Server
A dedicated server provides resources and services to multiple client devices. The server holds centralised control — common in schools, businesses, and websites.
Thin Client
Client devices have minimal local processing power. Almost all computation and storage happens on a central server. Clients simply display output and send input.