While networks connect devices and users, what makes this communication work behind the scenes is a complex mix of protocols, addressing systems, layered structures, and security tools. This worksheet explores those vital systems. Students will learn the difference between MAC and IP addresses, how different protocols serve different tasks (such as sending emails or loading websites), and how standards ensure compatibility across all devices. The TCP/IP model is also introduced as a layered approach to understanding how data travels through a network.
Security is a major part of networking. Students will learn how encryption keeps our data safe, especially on wireless networks, and how protocols like HTTPS protect sensitive online information. Each section includes clear explanations, real-world examples, and video guides from Craig 'n' Dave to reinforce learning. By the end of this worksheet, students should feel confident in identifying how data moves through networks and how it is secured and controlled.
Terminology:
MAC Address – Unique identifier assigned to network hardware
IP Address – Numerical address used to locate devices on a network
Protocol – Rules that define how data is transferred
Standard – Agreed-upon method to ensure compatibility
TCP/IP – Protocol suite used for Internet communication
HTTP/HTTPS – Protocols for accessing websites
FTP – File Transfer Protocol
SMTP, POP, IMAP – Email transfer protocols
Encryption – Protecting data by scrambling it
WPA2 – Secure wireless encryption method
TCP/IP Layers – The 4 layers of the network model (Application, Transport, Internet, Link)
All devices on a network need addresses to identify them. A MAC address is a hardware address permanently built into the network interface of a device. It is used on local networks to identify devices. An IP address, on the other hand, is assigned by the network and is used to send data across the internet or between different networks. IP addresses can change depending on the network connection, but MAC addresses remain constant.
For example, your phone’s MAC address helps the router know which device to send data to, while the IP address lets the internet send the right information back to your network.
Key Facts:
MAC = permanent, hardware-based address
IP = changeable, network address used to route data across networks
Both are essential for delivering data correctly
This video explains how devices are identified on networks using MAC and IP addresses.
What is a MAC address used for?
What is an IP address and why can it change?
Which is more permanent: IP or MAC?
Protocols are the rules that devices follow to communicate over a network. Without them, computers would not be able to understand each other. Common protocols include HTTP/HTTPS for websites, FTP for transferring files, and SMTP/IMAP/POP for email. The TCP/IP protocol suite underpins the internet.
Standards are agreed specifications that ensure compatibility between different manufacturers and systems. For example, all modern laptops can connect to Wi-Fi because they follow IEEE 802.11 wireless standards.
Key Facts:
Protocols define how data is formatted and transferred
Standards ensure that different devices can communicate
Key protocols: HTTP, FTP, SMTP, TCP/IP
This video explores the importance of standards in networking, highlighting how they ensure compatibility and interoperability between different devices and systems.
What is a protocol?
Why are standards important?
Name two protocols used for websites.
Which protocol would be used to upload a file to a server?
The TCP/IP model breaks networking into four layers to simplify how data is sent and received. Each layer handles a specific task:
Application Layer – interacts with software like web browsers
Transport Layer – splits data into packets and ensures they are delivered
Internet Layer – adds IP addresses and routes packets
Link Layer – handles physical transmission (wired or wireless)
Imagine writing a letter: you write the message (Application), put it in an envelope (Transport), add the address (Internet), and post it (Link).
Key Facts:
Each layer has a specific role
Layers work together to deliver data reliably
The model helps in designing and troubleshooting networks
This video shows how the TCP/IP model breaks network communication into manageable layers.
What are the four layers of the TCP/IP model?
What does the Transport layer do?
Why is layering useful in networking?
Wired networks use cables like Ethernet and are generally faster and more secure. Wireless networks use radio waves and are more convenient but vulnerable to interference and hacking. Encryption solves this by scrambling data so only authorised users can read it. WPA2 is a secure encryption method for Wi-Fi.
For example, using public Wi-Fi without encryption can let hackers see your passwords or messages. Encryption helps protect you.
Key Facts:
Wired = fast and secure, Wireless = flexible but less secure
Encryption keeps data safe by scrambling it
WPA2 is a modern standard for Wi-Fi encryption
This video compares wired and wireless network connections, discussing their advantages, disadvantages, and typical use cases.
Understand the difference between wired and wireless connections, and how encryption protects data.
Name one benefit and one drawback of wired connections.
What is encryption used for?
Why is WPA2 better than older encryption methods like WEP?
What’s the risk of using public Wi-Fi without encryption?
Different tasks require different protocols. HTTP/HTTPS are used when you load a webpage. FTP is used by developers to upload websites to servers. SMTP/IMAP/POP3 are email-related protocols that send and receive messages. HTTPS is used for secure websites, especially for payments or logins.
For example, when shopping online, HTTPS keeps your card details safe by encrypting the connection.
Key Facts:
Use the right protocol for the right task
Secure protocols protect sensitive data
Common protocols are used in everyday life
This video explains where different protocols are used in real-life situations like email and websites.
What protocol would you use to send an email?
What protocol secures online shopping?
What protocol is used to upload a website?
When networks fail, understanding the roles of devices and protocols helps solve the problem. Routers manage internet access. Switches direct internal traffic. Firewalls block suspicious data. Knowing where each device and layer fits allows technicians to identify and fix issues faster.
For example, if a school’s internet stops working, it may be the router’s fault—not every computer. Troubleshooting starts by checking connections at each layer.
Key Facts:
Troubleshooting uses layer-by-layer checks
Each device plays a specific role
Fixing networks means understanding how systems connect
What role does a switch play in a network?
Why is understanding network layers helpful?
What device connects your home to the internet?