Skip to content
NET101 Week 01 Beginner

Introduction to the Digital Nexus

Packet Switching, Network Roles, Intermediary Devices, and Basic Topology Logic

Track your progress through this week's content

Opening Framing: Why Networking Begins with Architecture, Not Cables

Networking is often introduced as a collection of devices, ports, cables, and commands. That is too shallow for degree-level study. A real network is a designed communication system: endpoints generate traffic, intermediary devices guide it, and topologies determine how resilient or fragile the whole environment becomes.

In the early days of telecommunications, communication systems were dominated by circuit switching. A dedicated path was reserved for a session, which worked well for voice but was inefficient for bursty digital traffic. Modern data networks instead rely on packet switching, where data is broken into smaller units, forwarded independently, and reassembled at the destination. That shift is the conceptual foundation of the Internet.

This week establishes the language of network engineering: what kinds of systems communicate, which devices move traffic, and how topology decisions shape scale, failure, and performance. Before students can interpret packets, subnet networks, or configure routers, they need an accurate mental model of how networks are built.

Learning Outcomes

  • LO1: Explain the difference between circuit switching and packet switching and why packet switching became dominant for data networks.
  • LO2: Distinguish peer-to-peer, client-server, and cloud-oriented service models.
  • LO3: Identify the operational roles of hubs, switches, routers, wireless access points, and firewalls.
  • LO4: Compare common topologies such as star, mesh, and campus-style hierarchical designs.
  • LO5: Build and verify a simple network topology in Packet Tracer using correct endpoint addressing and connectivity checks.

Key insight: Network engineering begins by understanding relationships, paths, and failure domains. Hardware names matter, but system behavior matters more.

1) The Historical Shift: Circuit Switching vs Packet Switching

A network exists to move information between endpoints. The first major design question is how that movement is organized. In a circuit-switched model, the network reserves a continuous end-to-end path for the duration of a conversation. Traditional telephone systems depended on this model because voice calls required steady, ordered delivery.

Data traffic behaves differently. Web browsing, file transfer, email, and API calls are bursty: devices transmit for a short period, pause, and then transmit again. Reserving a dedicated path for every burst wastes capacity. Packet switching solves that problem by dividing data into packets, each with addressing information, and allowing the network to forward those packets hop by hop.

Model How it works Strength Weakness
Circuit Switching Reserves a dedicated path for the full session Predictable for continuous streams Inefficient for bursty digital traffic
Packet Switching Breaks data into packets and forwards them independently Efficient, scalable, and resilient Requires more protocol logic and reassembly discipline

Packet switching is the foundation of modern networking because it allows many users and many applications to share the same infrastructure efficiently. It also makes rerouting possible when links fail, which is essential for reliable enterprise and Internet-scale design.

Mental model

Circuit switching is like reserving a private road for one car. Packet switching is like sending labeled delivery vans through a shared highway system and letting the road network determine the best path at each junction.

2) Communication Models: Peer-to-Peer, Client-Server, and Cloud Service Patterns

Not every networked application uses the same communication pattern. The structure of the application affects traffic direction, scaling pressure, security boundaries, and failure consequences.

In a peer-to-peer model, endpoints communicate more directly and may share responsibilities. Small collaboration tools, some file-sharing systems, and decentralized applications use this style. In a client-server model, client devices request data or services from centralized systems such as web servers, domain controllers, and database-backed applications.

Modern cloud applications often still behave like client-server systems, but with services distributed across multiple load balancers, application tiers, and regions. The label changes, but the engineering question remains the same: who initiates, who responds, and what happens when a component fails?

Model Traffic pattern Operational trade-off
Peer-to-Peer Hosts share data or services more directly Can reduce central dependence but complicates control and monitoring
Client-Server Clients initiate requests to centralized services Easier to manage centrally, but server infrastructure becomes critical
Cloud Service Pattern Clients talk to distributed but logically centralized services Scales well, but hides complex east-west and north-south traffic paths

Degree-level networking requires students to see beyond application names. When you hear "email," "video call," or "cloud app," you should immediately ask which systems are initiating sessions, where state is stored, and what intermediary devices sit in the path.

3) Intermediary Devices: The Systems that Move, Filter, and Control Traffic

Endpoints generate traffic, but they do not create a network on their own. A network becomes useful when intermediary devices forward traffic intelligently, separate broadcast domains, connect different networks, extend wireless coverage, or enforce policy.

Device Primary role Typical layer focus
Hub Repeats incoming electrical signals to all ports Layer 1
Switch Connects local devices and forwards frames by MAC address Layer 2
Router Connects different IP networks and forwards packets by destination network Layer 3
Wireless Access Point Bridges wireless clients into the wired network Layer 2 access function
Firewall Allows, blocks, or inspects traffic according to security policy Layer 3/4/7 depending on platform

These devices are not interchangeable. A switch is optimized for local forwarding inside a LAN, while a router is designed to move packets between different networks. A firewall may forward traffic too, but its primary purpose is policy enforcement, not plain connectivity.

Students should also understand why older technologies matter historically. Hubs are largely obsolete, but they illustrate why modern switched Ethernet was such an improvement: hubs repeat traffic everywhere, creating unnecessary collisions and no meaningful traffic separation.

Professional habit

Do not identify devices only by brand or shape. Identify them by forwarding logic, failure impact, and where they sit in the traffic path.

4) Topology as Engineering: How Structure Creates Stability or Fragility

A topology is the physical or logical arrangement of links and nodes. At bachelor level, topology should not be treated as a memorization list. It is an engineering choice that determines fault tolerance, cost, manageability, and traffic behavior.

Topology Strength Limitation Typical environment
Star Easy to manage and expand Central device is a potential single point of failure Home, office, classroom LANs
Full Mesh Excellent redundancy Expensive and difficult to scale physically Backbone or highly critical interconnects
Partial Mesh Balances resilience and cost Design must be intentional to avoid hidden weak points Enterprise WANs
Hierarchical/Campus Organizes access, distribution, and core functions Requires disciplined design Campus and enterprise environments

The most important design concept here is the single point of failure. If one failed device or link can isolate the whole site, the topology is fragile. Good networking design does not eliminate all failure; it limits how much of the system a failure can affect.

Design warning

Redundancy without control can also create problems. Extra links increase resilience, but unmanaged complexity can introduce loops, asymmetry, and harder troubleshooting. More hardware is not automatically better design.

5) Geographic Scale: PAN, LAN, Campus, and WAN

Networks are also classified by scale. This is not just terminology. Scale changes the type of technology used, the expected latency, the cost model, and the kinds of intermediary devices required.

  • PAN: Personal-scale connectivity such as Bluetooth accessories and short-range tethering.
  • LAN: A local network inside a room, floor, office, or building.
  • Campus network: Multiple local networks connected across several buildings with shared design and administration.
  • WAN: Long-distance interconnection across cities, countries, or the global Internet.

A student who can identify geographic scale correctly can already reason better about technology choices. A campus network is not just a bigger LAN; it usually demands more hierarchy, better addressing discipline, and more deliberate failure isolation.

6) Basic Configuration and Verification: Proving End-to-End Connectivity

Week 1 does not require advanced device configuration, but it does require students to understand how to prove that a simple topology works. In Packet Tracer or a comparable simulator, the first operational tasks are usually:

  1. Place the correct devices in the topology.
  2. Connect them with the correct media.
  3. Assign endpoint addresses and default gateways if routing is involved.
  4. Test connectivity with ping and simulation tools.

The most important conceptual point here is that not every packet uses the router. If PC-A and PC-B are in the same subnet, traffic is switched locally: the sending host uses ARP to learn the destination MAC address, builds a frame, and sends that frame to the switch. The switch forwards it toward the destination host. The router is not in the forwarding path for same-subnet traffic.

The router becomes relevant when the destination is on a different network. In that case, the host realizes the destination IP is remote, sends the frame toward its default gateway, and the router performs Layer 3 forwarding toward the next network. This distinction must be understood early, because later routing and VLAN topics assume it.

Packet-path comparison

Same subnet:
PC-A -> Switch -> PC-B

Different subnet:
PC-A -> Switch -> Router (default gateway) -> next network
Example endpoint checks

Windows:
ipconfig
ping 192.168.10.1

Linux/macOS:
ifconfig
ping 192.168.10.1

Packet Tracer:
- Check link lights
- Inspect addressing on each host
- Use Simulation Mode to watch packet flow

A good beginner verification sequence answers three different questions:

  • Local host check: Is the endpoint configured with the expected IP information?
  • Same-LAN check: Can hosts in the same subnet communicate through the switch?
  • Gateway check: Can the host reach the router interface that represents its path out of the subnet?

Verification at this stage is simple but essential. If two hosts on the same switch cannot communicate, the problem is usually one of four things: wrong cabling, wrong interface state, wrong addressing, or wrong topology assumption. Early engineers must learn to eliminate the obvious systematically.

7) Troubleshooting Logic for Week 1

Troubleshooting begins with structured observation, not random command entry. For a simple starter topology, use a repeatable method:

  1. Confirm the devices are connected as intended on paper and in the simulator.
  2. Confirm interfaces or links appear up.
  3. Confirm IP addressing matches the expected subnet.
  4. Test from local to remote in small steps instead of jumping to conclusions.
Symptom Likely cause First check
No link at all Wrong cable type or disconnected interface Physical topology and interface state
Same-switch hosts cannot ping Incorrect IP addressing or mask Host IP configuration
Hosts reach local peers but not remote network Missing router path or wrong gateway Default gateway and routed path
Intermittent design confusion Topology not documented clearly Draw the network before changing it

Key insight: Strong troubleshooting starts with a correct diagram. If you cannot map the topology, you cannot reason about the packet path.

Real-World Context: Why This Week Matters

Enterprise incidents are often made worse by weak foundations. Engineers who do not understand device roles or topology logic misplace firewalls, create flat networks, underestimate single points of failure, and struggle to explain traffic paths during outages. Week 1 is therefore not "introductory filler." It is the week that gives students the conceptual language required for every routing, switching, wireless, security, and cloud networking topic that follows.

Later in the degree, students will configure OSPF, VLANs, VPNs, cloud routing, wireless controllers, and automation frameworks. All of those tasks depend on one foundational question: what devices are in the path, what role does each one play, and what does the topology allow or prevent?

Guided Lab: Topology Mapping and First Connectivity Build

Goal: Build and document a small office network in Packet Tracer and verify basic connectivity.

Suggested topology

PC-A ----\
          \
PC-B ----- Switch ---- Router ---- Internet cloud placeholder
          /
Printer --/

Optional:
Laptop )) Wireless AP )) Switch

Step 1: Draw the topology before building it

  1. List each endpoint and intermediary device.
  2. Label the role of each device: endpoint, switch, router, AP, firewall placeholder.
  3. Mark which links are local LAN links and which link represents upstream connectivity.

Step 2: Build it in Packet Tracer

  1. Add two or more PCs, one switch, and one router.
  2. Connect all LAN devices to the switch.
  3. Connect the switch to the router.
  4. If using a wireless AP, bridge a wireless client into the same LAN.

Step 3: Configure endpoint addressing

  1. Assign IP addresses in a single subnet to the PCs.
  2. Assign the router interface an address in the same subnet.
  3. Set the PCs' default gateway to the router interface so they can reach remote networks later.

In this starter design, the default gateway is configured even though your first test is same-subnet communication. That is intentional. Students need to see that a host can have a gateway configured without using it for local traffic. Local traffic stays inside the subnet; only remote traffic is sent toward the router.

Step 4: Verify connectivity

  1. Check each device has the intended address.
  2. Ping from PC-A to PC-B and confirm this is same-subnet traffic that should stay on the switch.
  3. Ping from each PC to the router interface and confirm this is host-to-gateway traffic, not inter-host traffic.
  4. Use Simulation Mode to compare the path of host-to-host traffic with host-to-gateway traffic.

Step 5: Document the design

  1. Write one sentence describing the communication model used.
  2. Explain why the switch and router are both needed.
  3. Identify the topology type and the main single point of failure.

Lab reflection (mandatory)

  1. Where did packet forwarding happen, and where did network-to-network forwarding happen?
  2. What would fail if the central switch went down?
  3. How would the topology need to change if the office doubled in size?

Week 1 Outcome Check

By the end of this week, you should be able to:

  • Explain why packet switching replaced circuit switching for modern data networking
  • Distinguish common application communication models
  • Identify the role of core intermediary devices in a simple enterprise path
  • Compare topologies using resilience and manageability rather than memorized definitions
  • Build and validate a simple Packet Tracer network with correct addressing and basic connectivity

Next week formalizes these ideas with the OSI model, TCP/IP model, and the logic of encapsulation and decapsulation.

Hands-On Labs

Use these activities to convert introductory theory into operational understanding.

Lab 1: Packet Tracer Office Build

Task: Build the guided topology and verify PC-to-PC and PC-to-router communication.
Deliverable: Packet Tracer file plus a labeled screenshot of the topology.
Why it matters: Engineers must be able to translate diagrams into working paths.
Time estimate: 45-60 minutes

Lab 2: Device Role Mapping

Task: Draw a home, office, or campus mini-network and label endpoints, switches, routers, APs, and security boundaries.
Deliverable: One annotated diagram with one paragraph explaining the traffic path.
Why it matters: Topology literacy is the basis of all later troubleshooting.
Time estimate: 30-40 minutes

Lab 3: Optional TryHackMe Networking Intro

Task: Complete an introductory networking room to reinforce terminology and packet flow concepts.
Deliverable: Short notes on three concepts you understood better after the room.
Why it matters: Repetition across platforms helps lock in basic models early.
Time estimate: 45-60 minutes

Start Lab

Checkpoint Questions

  1. Why is packet switching generally better suited to digital data traffic than circuit switching?
  2. What is the difference between a peer-to-peer communication model and a client-server model?
  3. What role does a switch perform that a router does not?
  4. Why is a firewall not simply "another router" even though both sit in the traffic path?
  5. What makes a star topology operationally attractive for small LANs?
  6. What is a single point of failure, and where is one likely to appear in a basic office topology?
  7. Which basic checks should you perform first if two hosts in the same small lab cannot ping each other?

Weekly Reflection

Reflection prompt (200-300 words):

This week introduced networking as system design rather than isolated hardware facts. Reflect on how topology, intermediary devices, and communication models influence one another.

  • Why is it not enough to memorize device names without understanding their forwarding role?
  • How does a topology diagram change the way you think about troubleshooting?
  • Why is resilience a design question from week 1 rather than an "advanced topic"?
  • If you were designing a network for a small company, what would you optimize first: cost, simplicity, or fault tolerance? Why?

A strong reflection should connect technical choices to operational consequences.

Recommended References

The best way to learn week 1 is to move constantly between diagrams, device roles, and observed packet paths.

Week 01 Quiz

Test your understanding of switching models, communication roles, intermediary devices, and topology fundamentals.

Take Week 01 Quiz