IT Networking Concept
IT Networking Concept
Architecture
Computer network architecture defines the physical and logical framework of a
computer network. It outlines how computers are organized in the network and
what tasks are assigned to those computers. Network architecture components
include hardware, software, transmission media (wired or wireless), network
topology, and communications protocols.
Network topology
Network topology refers to how the nodes and links in a network are
arranged. A network node is a device that can send, receive, store, or forward
data. A network link connects nodes and may be either cabled or wireless links.
Understanding topology types provides the basis for building a successful
network. There are a number of topologies but the most common are bus, ring,
star, and mesh:
A bus network topology is when every network node is directly connected to
a main cable. –
In a ring topology, nodes are connected in a loop, so each device has
exactly two neighbors. Adjacent pairs are connected directly; non-adjacent
pairs are connected indirectly through multiple nodes. –
In a star network topology, all nodes are connected to a single, central hub
and each node is indirectly connected through that hub. –
A mesh topology is defined by overlapping connections between nodes. You
can create a full mesh topology, where every node in the network is
connected to every other node. You can also create partial mesh topology in
which only some nodes are connected to each other and some are
connected to the nodes with which they exchange the most data. Full mesh
topology can be expensive and time-consuming to execute, which is why it's
often reserved for networks that require high redundancy. Partial mesh
provides less redundancy but is more cost effective and simpler to execute.
Security
Computer network security protects the integrity of information
contained by a network and controls who access that information. Network
security policies balance the need to provide service to users with the need to
control access to information.
There are many entry points to a network. These entry points include
the hardware and software that comprise the network itself as well as the
devices used to access the network, like computers, smartphones, and tablets.
Because of these entry points, network security requires using several defense
methods. Defenses may include firewalls—devices that monitor network traffic
and prevent access to parts of the network based on security rules.
Processes for authenticating users with user IDs and passwords
provide another layer of security. Security includes isolating network data so
that proprietary or personal information is harder to access than less critical
information. Other network security measures include ensuring hardware and
software updates and patches are performed regularly, educating network users
about their role in security processes, and staying aware of external threats
executed by hackers and other malicious actors. Network threats constantly
evolve, which makes network security a never-ending process.
The use of public cloud also requires updates to security procedures to
ensure continued safety and access. A secure cloud demands a secure
underlying network.
Mest networks
As noted above, a mesh network is a topology type in which the nodes of a
computer network connect to as many other nodes as possible. In this topology,
nodes cooperate to efficiently route data to its destination. This topology
provides greater fault tolerance because if one node fails, there are many other
nodes that can transmit data. Mesh networks self-configure and self-organize,
searching for the fastest, most reliable path on which to send information. Type
of mesh networks There are two types of mesh networks—full mesh and partial
mesh:
In a full mesh topology, every network node connects to every other network
node, providing the highest level of fault tolerance. However, it costs more
to execute. In a partial mesh topology, only some nodes connect, typically
those that exchange data most frequently. –
A wireless mesh network may consist of tens to hundreds of nodes. This
type of network connects to users over access points spread across a large
area