Chapter 02 ยท Part A

Network Types & Topologies Foundation

LAN vs WAN, star vs mesh, client-server vs peer-to-peer. Knowing what kind of network you're looking at is step one of every security discussion.
Networks are classified by size (PAN, LAN, MAN, WAN), topology (how devices connect โ€” star, mesh, bus, ring), and architecture (client-server vs peer-to-peer). Your home is a LAN. The internet is a WAN. Most modern networks use a star topology (everything plugs into a central switch/router) and client-server architecture (devices talk to central servers). Topology choices have real security consequences โ€” they determine how attacks spread.

2.1 Networks Classified by Size

The size of a network drives almost every design choice โ€” hardware, protocols, who manages it, what security threats matter.

NameScaleExampleWho owns it
PAN (Personal Area Network)~10m, one person's devicesYour phone + Bluetooth headphones + smartwatchYou
LAN (Local Area Network)One building or campusYour home Wi-Fi; your school's networkOne organisation
WLAN (Wireless LAN)A LAN but wirelessYour school Wi-Fi (technically a subset of LAN)One organisation
MAN (Metropolitan Area Network)A city or regionA city's traffic light network; a council's CCTV networkCity/utility
WAN (Wide Area Network)Countries or globalThe internet; a multinational company's private networkMultiple orgs / ISPs
HOW TO REMEMBER: Size grows left-to-right: Personal โ†’ Local โ†’ Metropolitan โ†’ Wide. Each is nested inside the next. Your PAN (phone + watch) is inside your home LAN, which connects to your ISP's WAN, which is part of the global internet.

Why the distinction matters for security: a LAN is generally trusted internally โ€” your home devices trust each other, and most home routers don't filter traffic between them. A WAN is generally untrusted โ€” you assume anyone on the internet could be hostile. The border between the LAN and the WAN is where firewalls live. Chapter 14 covers that.

2.2 Network Topologies โ€” How Devices Physically Connect

Topology = the shape of a network. Even though two networks might use the same technology, if they're wired in different shapes, they behave very differently โ€” in performance, reliability, and security.

The main topologies โ€” each has strengths and weaknesses STAR S central switch/router MESH every node to every other BUS shared backbone cable RING closed loop TREE (hybrid) R stars connected via stars POINT-TO-POINT two devices, one link
Star is the dominant modern topology. Bus and ring are mostly historical. Mesh is coming back for Wi-Fi (mesh routers like Eero, Google Nest). Tree = stars combined, what most schools and offices actually use.

Star topology

Every device connects to a central device (usually a switch). The switch handles all traffic. If any one device fails, the rest of the network keeps working. If the switch fails, everything goes down.

Pros: simple, easy to add/remove devices, one failure doesn't take down the network.
Cons: the central switch is a single point of failure; you need one port per device.

Where you'll see it: Every home Wi-Fi (devices โ†’ router), every office (devices โ†’ switch โ†’ router), every school. This is by far the most common topology today.

Mesh topology

Every device connects to every (or many) other devices. Multiple paths exist between any two nodes, so if one connection fails, traffic reroutes.

Pros: fault-tolerant, no single point of failure, great redundancy.
Cons: expensive, lots of cabling, complex to manage.

Where you'll see it: the internet's backbone (multiple paths between major routers), military/critical networks, modern home Wi-Fi mesh systems. Full mesh is rare; partial mesh (many but not all connections) is more common.

Bus topology

All devices share one cable (the "bus"). Everyone sees every message; each device ignores messages not addressed to them.

Pros: simple, cheap, easy to install.
Cons: the shared cable is a single point of failure. Performance degrades as devices are added. Obsolete for modern wired networks, though Wi-Fi behaves logically like a bus since all devices share the radio medium.

Where you'll see it: legacy ethernet (pre-1990s), still conceptually how a hub operates. Mostly historical.

Ring topology

Each device connects to exactly two neighbours, forming a closed loop. Data travels in one direction around the ring. Popular in early token ring networks.

Pros: predictable timing, no collisions.
Cons: a single cable break breaks the whole ring unless you have a dual ring.

Where you'll see it: some industrial control networks, legacy systems, fibre optic backbones using dual-ring FDDI. Rare in general-purpose networks today.

Tree (hybrid) topology

Multiple star networks connected together by a backbone โ€” a star-of-stars. Each classroom is a star; all classrooms connect up to a main switch; that connects to the router.

Pros: scales well, isolates faults within branches.
Cons: root node failures affect everything below; complex design.

Where you'll see it: Most mid-to-large office networks, schools, campuses. When someone says "star topology" about a large network, they usually mean tree.

Point-to-point

Just two devices connected directly. The simplest possible network.

Where you'll see it: your laptop plugged directly into your modem, a direct WAN link between two sites, a serial console cable.

2.3 How Topology Affects Security

Topology has real security consequences. A network's shape determines:

REAL-WORLD APPLICATION: When designing a school network, you don't pick one topology โ€” you use several at different levels. Devices in a classroom โ†’ star (plugged into a classroom switch). Classroom switches โ†’ star (connect to a core switch). The classrooms as a whole โ†’ logically segmented into VLANs (even though physically they share cables). Each VLAN is a separate broadcast domain, which limits how far attacks can spread. Chapter 5 covers subnets / VLANs; Chapter 14 covers segmentation as a defence.

2.4 Network Architectures โ€” Client-Server vs Peer-to-Peer

Topology is about physical shape. Architecture is about roles โ€” who does what.

Client-Server

Some devices (servers) provide services; others (clients) consume them. The server is always on, stores authoritative data, and enforces rules. Clients connect when they want something.

ExampleServerClient
Web browsingWeb server (instagram.com)Your browser
EmailMail serverYour mail app
School LMSLMS serverStudent and teacher devices
Online gamingGame serverPlayer's PC/console

Pros: Centralised control, easy to manage, authoritative data, easier to secure (one server to protect, with known role).
Cons: Single point of failure (server down = everyone offline), scaling is expensive, the server is a juicy target for attackers.

Peer-to-Peer (P2P)

All devices are equal. Each one can request services from others, and each one can provide services. No central authority.

ExampleHow it works
BitTorrentUsers download parts of a file from many other users, not a central server
Early SkypeVoice calls routed peer-to-peer
Bitcoin/blockchainEvery node has a copy of the ledger; no central authority
Early NapsterMusic files shared directly between users (though Napster used a central index)

Pros: No single point of failure, scales naturally (more users = more capacity), hard to censor.
Cons: Inconsistent data, harder to secure (every peer is an attack surface), hard to hold anyone accountable, trust issues.

TRAP: "The internet is peer-to-peer" โ€” no. The internet is a client-server system running on top of a peer-to-peer routing network. The routers cooperate peer-to-peer to forward traffic, but the services you use (websites, apps, email) are overwhelmingly client-server.

Hybrid architectures

Most real systems mix both. WhatsApp looks like client-server (you talk to WhatsApp's servers), but messages are end-to-end encrypted so the server can't read them โ€” the security model is peer-to-peer even though the routing is client-server. Modern Skype went the other way: abandoned P2P for client-server, prioritising enterprise features over pure decentralisation.

2.5 Two Other Arrangements To Know

Cloud computing

A form of client-server where the server lives in a massive data centre run by a third party (AWS, Azure, Google Cloud) rather than owned by the organisation using it. Practically, every modern web app is "in the cloud."

Implications: cheaper to start (no upfront hardware), scales on demand, but introduces shared responsibility โ€” the cloud provider secures the platform, you secure your data and configurations. Chapter 16's SaaS startup scenario covers this.

Edge computing

Pushing compute closer to where data is generated, rather than sending everything to a central server. Example: your smart doorbell processes video locally and only sends a summary to the cloud, instead of streaming 24/7.

Implications: lower latency, less bandwidth, but a larger attack surface (many small devices instead of one central one).

2.6 Quick Comparison for Exam Answers

 StarMeshBusRing
Reliability if one cable failsJust that one device affectedReroutesEntire network affectedEntire network affected
Cost to buildMediumHighLowMedium
Easy to add devices?YesNoYes (until performance drops)Medium
Performance under loadGood (switch limits collisions)ExcellentPoor (shared medium)Fair
Where you see it todayEverywhereInternet backbone, mesh Wi-FiLegacy / logical Wi-FiRare / legacy

2.7 Quiz Time

Your school has 40 classrooms. Each classroom has ~25 devices. Describe a suitable physical topology.
A tree (hybrid) topology: each classroom uses a star (devices โ†’ classroom switch); classroom switches connect up to a core switch or switches; the core connects to the router/firewall and out to the internet. This combines the manageability of star (within each classroom) with scalability (the backbone handles all classrooms). Logically the network would be further divided into VLANs (student, staff, IoT, guest) โ€” this is a security decision, not a topology one, and it's covered in Chapter 5 and Chapter 14.
A small business has a file server, email server, and database server โ€” all on-premises. What architecture is this, and what is the main risk?
Client-server architecture โ€” staff devices connect to centralised servers. The main risk is that the servers are single points of failure, and because they store valuable data, they're high-value targets. If the servers go down (power outage, hardware failure, ransomware), the whole business halts. Mitigations: redundancy (backup servers), regular offsite backups, UPS, monitoring, ransomware-resistant backup storage. See Chapter 16 for how this is handled in a proper design.
Why isn't pure peer-to-peer a good choice for a banking system?
Banks need authoritative, consistent data โ€” everyone must agree on account balances. P2P systems struggle with consistency and accountability. Also, P2P exposes every participant as a target and makes auditing harder. Regulated industries (banking, healthcare) require centralised control for compliance. Blockchain demonstrates a way to do accountable P2P at cost of energy and complexity, but traditional banks use client-server for good reasons. Exam phrasing: "Banking requires strong consistency, accountability, and regulatory audit trails, which client-server architectures provide far more straightforwardly than P2P."
โ† Previous
01. The Big Picture