0% found this document useful (0 votes)
17 views11 pages

Module 2 Network Architecture

The document outlines various network architectures and topologies, including star, ring, bus, mesh, tree, and hybrid topologies, each with distinct characteristics and use cases. It also discusses different types of networks such as PAN, LAN, MAN, and WAN, along with cloud computing models and data center tiers. Additionally, it covers network management zones like MZ, DMZ, NOC, SOC, and core zones, emphasizing their roles in network security and operations.

Uploaded by

uccjjcuc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views11 pages

Module 2 Network Architecture

The document outlines various network architectures and topologies, including star, ring, bus, mesh, tree, and hybrid topologies, each with distinct characteristics and use cases. It also discusses different types of networks such as PAN, LAN, MAN, and WAN, along with cloud computing models and data center tiers. Additionally, it covers network management zones like MZ, DMZ, NOC, SOC, and core zones, emphasizing their roles in network security and operations.

Uploaded by

uccjjcuc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Internship

Network Administration
Module 2: Network Architecture

100 Days Challenge


Copyright ©100 Days Challenge Join Our Group Study Platform

A network is a set of devices that are connected with a physical media link. In a network, two or more
nodes are connected by a physical link or two or more networks are connected by one or more nodes

Network topology specifies the layout of a computer network. It shows how devices and cables are
connected to each other

Star Topology Ring Topology

• All the nodes are connected to a single device • Nodes are exactly connected to two or more
known as a central device. nodes forming a single continuous path
• If the central device is damaged, then the • It does not need any central server to control
whole network fails. the connectivity among the nodes.
• In failure in one cable will only disconnect a • If the single node is damaged, then the whole
specific computer connected to this cable. network fails.
• Star topology is very easy to install, manage • Ring topology is very rarely used as it is
and troubleshoot but more cable req. expensive, difficult to install and manage.
• Example: office, home • Examples: SONET, SDH etc.

রিসর্োর্সটি এরিট কিো, কোট করি কিো, রিরিিং কিো, রিরি কিো, শেয়োি কিো (শেসকোন মোধ্যসম) রনসেধ্। শর্সেসে আিনোি শেসক প্রোপ্ত প্ররিজন রিসর্সি 5000 টোকো িোসি
ঋনী িসয় েোকসিন 100 Days Challenge Team এি কোসে।
Copyright ©100 Days Challenge Join Our Group Study Platform

Bus Topology Mesh Topology

• All the nodes are connected to a single cable • All nodes are individually connected to other
known as a central cable or bus. nodes.
• As if the bus is damaged then the whole • It does not need any central switch or hub to
network fails. control the connectivity among the nodes.
• It acts as a shared communication medium, • failure in one cable will only disconnect the
sending data accessed by all nodes specified computer connected to this cable.
• Bus topology is useful for a small number of • Mesh topology is rarely used Cabling cost is
devices. high as it requires bulk wiring

Tree Topology Hybrid Topology

• Tree topology is a combination of star and • Hybrid topology is a combination of different


bus topology (expanded star topology) topologies to form a resulting topology
• the whole network is divided into segments If • It provides flexibility as it can be
one segment is damaged, there is no effect implemented in a different network
on other segments. environment.

Network architecture sets the theoretical framework, design principles, and protocols. Network topology is the
practical implementation of network architecture.

রিসর্োর্সটি এরিট কিো, কোট করি কিো, রিরিিং কিো, রিরি কিো, শেয়োি কিো (শেসকোন মোধ্যসম) রনসেধ্। শর্সেসে আিনোি শেসক প্রোপ্ত প্ররিজন রিসর্সি 5000 টোকো িোসি
ঋনী িসয় েোকসিন 100 Days Challenge Team এি কোসে।
Copyright ©100 Days Challenge Join Our Group Study Platform

Network architecture is the logical and structural layout of the network. Network architectures are
classified in various ways to address different needs and scales of connectivity.

Wired network Architecture


Wireless Network
❑ Personal Area Network (PAN) Architecture
❑ Local Area Network (LAN) Virtual Private Network
❑ Ad hoc
❑ Metro Area Network (MAN)
❑ Infrastructure ❑ Access VPN
❑ Wide Area Network (WAN)
❑ Mesh ❑ Site to Site VPN

Centralized Management
Network Architecture Cloud Network
Architecture
❑ P2P (Peer-to-Peer) Datacenter Network
❑ Private Cloud Architecture
❑ Client-Server
❑ Public Cloud ❑ DC and DR
❑ Spine Leaf
❑ Hybrid Cloud ❑ Two-tier/Three-tier
❑ Redundancy Architecture

Telegram 01521331257 WhatsApp

রিসর্োর্সটি এরিট কিো, কোট করি কিো, রিরিিং কিো, রিরি কিো, শেয়োি কিো (শেসকোন মোধ্যসম) রনসেধ্। শর্সেসে আিনোি শেসক প্রোপ্ত প্ররিজন রিসর্সি 5000 টোকো িোসি
ঋনী িসয় েোকসিন 100 Days Challenge Team এি কোসে।
Copyright ©100 Days Challenge Join Our Group Study Platform

Personal Area Network (PAN)


Ultra-small networks used for personal use to share data from one device to another. Can be wired
(PAN) or wireless (WPAN): Device: USB, Bluetooth, NFC, ANT+
Examples: Smart Phone to Laptop, Smart Watch to Smart Phone

Local Area Network (LAN)


A computer network within a small geographical area, such as a single room, building or group of
buildings. All devices are directly connected via cables and/or short-range wireless technology.
Examples: Home Network, Small Business, Office Network

Metropolitan Area Network (MAN)


A computer network that interconnects users with computer resources in a city.
Example: Campus Network, ISP Network, Branch office Network in same city.

Wide Area Network (WAN)


A computer network that extends over a large geographical distance, typically multiple cities and
countries. WANs connect geographically distant LANs. Typically use leased telecommunications
lines from ISPs.
Examples: The Internet, Corporate Offices in Different Country

রিসর্োর্সটি এরিট কিো, কোট করি কিো, রিরিিং কিো, রিরি কিো, শেয়োি কিো (শেসকোন মোধ্যসম) রনসেধ্। শর্সেসে আিনোি শেসক প্রোপ্ত প্ররিজন রিসর্সি 5000 টোকো িোসি
ঋনী িসয় েোকসিন 100 Days Challenge Team এি কোসে।
Copyright ©100 Days Challenge Join Our Group Study Platform

Ad hoc Infrastructure Mesh

Peer-to-peer (P2P) wireless Wireless network that uses a Just like a wired mesh design,
network where no wireless wireless access point (WAP) wireless mesh networks utilize
access point (WAP) as its central connecting several wireless access points
infrastructure exits. device. (nodes) to create a robust
The devices communicate wireless network that is:
directly with one another. Infrastructure wireless o Scalable
Example: Personal area networks (WLANs) are o Self-Healing
networks (PANs) commonly used in homes o Reliable (redundancy)
and small offices o Common in larger homes and
business

Access VPN: A remote access VPN connects specific computers or other devices to a private network as
opposed to linking entire locations together via gateways. Also, every device using this VPN setup must
have the VPN client app installed.

Site-to-Site VPN: A Site-to-Site or Router-to-Router VPN is commonly used in large companies having
branches in different locations to connect the network of one office to another in different locations.
There are 2 sub-categories as mentioned: 1) Intranet VPN, 2) Extranet VPN

রিসর্োর্সটি এরিট কিো, কোট করি কিো, রিরিিং কিো, রিরি কিো, শেয়োি কিো (শেসকোন মোধ্যসম) রনসেধ্। শর্সেসে আিনোি শেসক প্রোপ্ত প্ররিজন রিসর্সি 5000 টোকো িোসি
ঋনী িসয় েোকসিন 100 Days Challenge Team এি কোসে।
Copyright ©100 Days Challenge Join Our Group Study Platform

Decentralization: Each node (peer) in the network can act as both a client and a server. There is
no central authority or server controlling the network. All peers have equal status and can initiate
or terminate communication sessions.

Centralized Control: Clients request resources or services from a centralized server that
processes and responds to these requests. Servers are optimized to handle multiple requests and
manage resources, while clients focus on user interaction and task execution.

Spine-Leaf Architecture

Consists of spine switches (core layer) and leaf switches (access layer). Ensures fast data
transmission with multiple paths between any two endpoints.
• 2-Tier Network Architecture: Consists of two layers, typically combining the core and distribution
layers into one.
• 3-Tier Network Architecture
Most commonly used in larger organizations, providing a clear separation of network functions for
scalability and performance.

রিসর্োর্সটি এরিট কিো, কোট করি কিো, রিরিিং কিো, রিরি কিো, শেয়োি কিো (শেসকোন মোধ্যসম) রনসেধ্। শর্সেসে আিনোি শেসক প্রোপ্ত প্ররিজন রিসর্সি 5000 টোকো িোসি
ঋনী িসয় েোকসিন 100 Days Challenge Team এি কোসে।
Copyright ©100 Days Challenge Join Our Group Study Platform

Data centers:
Data centers are privately owned and
operated by companies, institutions,
governments, or other business entities.
Enterprise facilities provide internal data
transactions and processing, web-based
services through either intranets or
extranets.
Disaster recovery (DR):
These are locations that organizations can
temporarily use after a disaster event, which
contain backups of data, systems, and other
technology infrastructure.

Access Layer Aggregation layer: Core Layer:


It also known as the edge Bridge between the It also known as the
layer, is the lowest tier in access layer and the Heart/backbone, is the
the three-tier data center core layer for controlling high-capacity, specifically
network architecture. It and shaping network designed to be highly
serves as the entry point traffic, implementing redundant and resilient.
for servers, storage policies, load balancing, This layer interlinks with
systems, and other quality of service (QoS), aggregation layer,
devices (end nodes) into packet filtering, and facilitating efficient traffic
the network. queuing. routing between them.

রিসর্োর্সটি এরিট কিো, কোট করি কিো, রিরিিং কিো, রিরি কিো, শেয়োি কিো (শেসকোন মোধ্যসম) রনসেধ্। শর্সেসে আিনোি শেসক প্রোপ্ত প্ররিজন রিসর্সি 5000 টোকো িোসি
ঋনী িসয় েোকসিন 100 Days Challenge Team এি কোসে।
Copyright ©100 Days Challenge Join Our Group Study Platform

Data center tiers are a system used to describe specific kinds of data center infrastructure in a
consistent way. Tier 1 is the simplest infrastructure, while Tier 4 is the most complex and has
the most redundant components. Each tier includes the required components of all the tiers
below it.
Four Data Center Tiers

Tier 1: A Tier 1 data center has a single path for power and cooling and few, if any, redundant and
backup components. It has an expected uptime of 99.671% (28.8 hours of downtime annually).

Tier 2: A Tier 2 data center has a single path for power and cooling and some redundant and
backup components. It has an expected uptime of 99.741% (22 hours of downtime annually).

Tier 3: A Tier 3 data center has multiple paths for power and cooling and systems in place to
update and maintain it without taking it offline. It has an expected uptime of 99.982% (1.6 hours
of downtime annually).

Tier 4: A Tier 4 data center is built to be completely fault tolerant and has redundancy for every
component. It has an expected uptime of 99.995% (26.3 minutes of downtime annually).

A redundant data center architecture duplicates critical components—such as UPS systems,


cooling systems, backup generators and Networking devices—to ensure data center operations
can continue even if a component fails. There are Different redundancy model N, N+1, N+2, 2N,
2N+1.
N The minimum capacity. N does not include any redundancy (single points of
N
failure)
N+1 N+1 Support a failure or allow a single machine to be serviced.
N+2 N+2 redundancy design to provide two extra components
2N redundancy model creates a mirror image of infrastructure to provide full
2N
fault tolerance.
2N+1 delivers the fully fault-tolerant 2N architecture plus an extra component
2N+1
for an added layer of protection.

রিসর্োর্সটি এরিট কিো, কোট করি কিো, রিরিিং কিো, রিরি কিো, শেয়োি কিো (শেসকোন মোধ্যসম) রনসেধ্। শর্সেসে আিনোি শেসক প্রোপ্ত প্ররিজন রিসর্সি 5000 টোকো িোসি
ঋনী িসয় েোকসিন 100 Days Challenge Team এি কোসে।
Copyright ©100 Days Challenge Join Our Group Study Platform

Cloud computing is the use of computing resources (hardware and software) that are delivered
as a service over a network (typically the Internet).

Cloud
Model

Deployment Service
Models Models

Public Private Hybrid SaaS PaaS IaaS

The private cloud can be physically located at your organization’s


on-site datacenter, or it can be hosted by a third-party service
Private cloud provider. But in a private cloud, the services and infrastructure are
always maintained on a private network and the hardware and
software are dedicated solely to your organization.

The cloud resources (like servers and storage) are owned and
operated by a third-party cloud service provider and delivered over
Public Cloud the internet. With a public cloud, all hardware, software, and other
supporting infrastructure are owned and managed by the cloud
provider. Such as Amazon Web Services (AWS) or Microsoft Azure.

Hybrid clouds combine both private and public cloud models for
maximum flexibility. This is a common example of hybrid cloud:
Hybrid clouds Organizations can use private cloud environments for their IT
workloads and complement the infrastructure with public cloud
resources to accommodate occasional spikes in network traffic.

রিসর্োর্সটি এরিট কিো, কোট করি কিো, রিরিিং কিো, রিরি কিো, শেয়োি কিো (শেসকোন মোধ্যসম) রনসেধ্। শর্সেসে আিনোি শেসক প্রোপ্ত প্ররিজন রিসর্সি 5000 টোকো িোসি
ঋনী িসয় েোকসিন 100 Days Challenge Team এি কোসে।
Copyright ©100 Days Challenge Join Our Group Study Platform

MZ Zone (Militarized Zone): DMZ Zone (Demilitarized Zone):


The MZ is isolated from the External network The DMZ Zone acts as a buffer between the
or internet to mitigate the risk of direct attacks internal network (LAN) and external
on critical assets. Service: AD servers, networks, such as the internet. Service:
Database, Backup servers. Web servers, VPN, and DNS servers.

NOC Zone (Network Operations Center): SOC Zone (Security Operations Center):
The NOC Zone is a centralized location where The SOC Zone is dedicated to cybersecurity
Network Mgmt, Operations, monitoring operations, including threat detection,
activities are conducted. User support also incident response, and vulnerability
provided from here. management.

Core Zone: WAN Zone (Wide Area Network Zone):


The central, backbone of a network The WAN Zone comprises the wide area
infrastructure, responsible for efficiently network infrastructure connecting multiple
routing data to different parts of the network. locations or sites within an organization.

Internet Zone User Zone:


The portion of a network that interfaces with The User Zone encompasses the areas
the public internet, protected by security where end-users access network resources
measures, such as firewalls. and conduct their daily activities.

রিসর্োর্সটি এরিট কিো, কোট করি কিো, রিরিিং কিো, রিরি কিো, শেয়োি কিো (শেসকোন মোধ্যসম) রনসেধ্। শর্সেসে আিনোি শেসক প্রোপ্ত প্ররিজন রিসর্সি 5000 টোকো িোসি
ঋনী িসয় েোকসিন 100 Days Challenge Team এি কোসে।

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy