Module 2 Network Architecture
Module 2 Network Architecture
Network Administration
Module 2: Network Architecture
A network is a set of devices that are connected with a physical media link. In a network, two or more
nodes are connected by a physical link or two or more networks are connected by one or more nodes
Network topology specifies the layout of a computer network. It shows how devices and cables are
connected to each other
• All the nodes are connected to a single device • Nodes are exactly connected to two or more
known as a central device. nodes forming a single continuous path
• If the central device is damaged, then the • It does not need any central server to control
whole network fails. the connectivity among the nodes.
• In failure in one cable will only disconnect a • If the single node is damaged, then the whole
specific computer connected to this cable. network fails.
• Star topology is very easy to install, manage • Ring topology is very rarely used as it is
and troubleshoot but more cable req. expensive, difficult to install and manage.
• Example: office, home • Examples: SONET, SDH etc.
রিসর্োর্সটি এরিট কিো, কোট করি কিো, রিরিিং কিো, রিরি কিো, শেয়োি কিো (শেসকোন মোধ্যসম) রনসেধ্। শর্সেসে আিনোি শেসক প্রোপ্ত প্ররিজন রিসর্সি 5000 টোকো িোসি
ঋনী িসয় েোকসিন 100 Days Challenge Team এি কোসে।
Copyright ©100 Days Challenge Join Our Group Study Platform
• All the nodes are connected to a single cable • All nodes are individually connected to other
known as a central cable or bus. nodes.
• As if the bus is damaged then the whole • It does not need any central switch or hub to
network fails. control the connectivity among the nodes.
• It acts as a shared communication medium, • failure in one cable will only disconnect the
sending data accessed by all nodes specified computer connected to this cable.
• Bus topology is useful for a small number of • Mesh topology is rarely used Cabling cost is
devices. high as it requires bulk wiring
Network architecture sets the theoretical framework, design principles, and protocols. Network topology is the
practical implementation of network architecture.
রিসর্োর্সটি এরিট কিো, কোট করি কিো, রিরিিং কিো, রিরি কিো, শেয়োি কিো (শেসকোন মোধ্যসম) রনসেধ্। শর্সেসে আিনোি শেসক প্রোপ্ত প্ররিজন রিসর্সি 5000 টোকো িোসি
ঋনী িসয় েোকসিন 100 Days Challenge Team এি কোসে।
Copyright ©100 Days Challenge Join Our Group Study Platform
Network architecture is the logical and structural layout of the network. Network architectures are
classified in various ways to address different needs and scales of connectivity.
Centralized Management
Network Architecture Cloud Network
Architecture
❑ P2P (Peer-to-Peer) Datacenter Network
❑ Private Cloud Architecture
❑ Client-Server
❑ Public Cloud ❑ DC and DR
❑ Spine Leaf
❑ Hybrid Cloud ❑ Two-tier/Three-tier
❑ Redundancy Architecture
রিসর্োর্সটি এরিট কিো, কোট করি কিো, রিরিিং কিো, রিরি কিো, শেয়োি কিো (শেসকোন মোধ্যসম) রনসেধ্। শর্সেসে আিনোি শেসক প্রোপ্ত প্ররিজন রিসর্সি 5000 টোকো িোসি
ঋনী িসয় েোকসিন 100 Days Challenge Team এি কোসে।
Copyright ©100 Days Challenge Join Our Group Study Platform
রিসর্োর্সটি এরিট কিো, কোট করি কিো, রিরিিং কিো, রিরি কিো, শেয়োি কিো (শেসকোন মোধ্যসম) রনসেধ্। শর্সেসে আিনোি শেসক প্রোপ্ত প্ররিজন রিসর্সি 5000 টোকো িোসি
ঋনী িসয় েোকসিন 100 Days Challenge Team এি কোসে।
Copyright ©100 Days Challenge Join Our Group Study Platform
Peer-to-peer (P2P) wireless Wireless network that uses a Just like a wired mesh design,
network where no wireless wireless access point (WAP) wireless mesh networks utilize
access point (WAP) as its central connecting several wireless access points
infrastructure exits. device. (nodes) to create a robust
The devices communicate wireless network that is:
directly with one another. Infrastructure wireless o Scalable
Example: Personal area networks (WLANs) are o Self-Healing
networks (PANs) commonly used in homes o Reliable (redundancy)
and small offices o Common in larger homes and
business
Access VPN: A remote access VPN connects specific computers or other devices to a private network as
opposed to linking entire locations together via gateways. Also, every device using this VPN setup must
have the VPN client app installed.
Site-to-Site VPN: A Site-to-Site or Router-to-Router VPN is commonly used in large companies having
branches in different locations to connect the network of one office to another in different locations.
There are 2 sub-categories as mentioned: 1) Intranet VPN, 2) Extranet VPN
রিসর্োর্সটি এরিট কিো, কোট করি কিো, রিরিিং কিো, রিরি কিো, শেয়োি কিো (শেসকোন মোধ্যসম) রনসেধ্। শর্সেসে আিনোি শেসক প্রোপ্ত প্ররিজন রিসর্সি 5000 টোকো িোসি
ঋনী িসয় েোকসিন 100 Days Challenge Team এি কোসে।
Copyright ©100 Days Challenge Join Our Group Study Platform
Decentralization: Each node (peer) in the network can act as both a client and a server. There is
no central authority or server controlling the network. All peers have equal status and can initiate
or terminate communication sessions.
Centralized Control: Clients request resources or services from a centralized server that
processes and responds to these requests. Servers are optimized to handle multiple requests and
manage resources, while clients focus on user interaction and task execution.
Spine-Leaf Architecture
Consists of spine switches (core layer) and leaf switches (access layer). Ensures fast data
transmission with multiple paths between any two endpoints.
• 2-Tier Network Architecture: Consists of two layers, typically combining the core and distribution
layers into one.
• 3-Tier Network Architecture
Most commonly used in larger organizations, providing a clear separation of network functions for
scalability and performance.
রিসর্োর্সটি এরিট কিো, কোট করি কিো, রিরিিং কিো, রিরি কিো, শেয়োি কিো (শেসকোন মোধ্যসম) রনসেধ্। শর্সেসে আিনোি শেসক প্রোপ্ত প্ররিজন রিসর্সি 5000 টোকো িোসি
ঋনী িসয় েোকসিন 100 Days Challenge Team এি কোসে।
Copyright ©100 Days Challenge Join Our Group Study Platform
Data centers:
Data centers are privately owned and
operated by companies, institutions,
governments, or other business entities.
Enterprise facilities provide internal data
transactions and processing, web-based
services through either intranets or
extranets.
Disaster recovery (DR):
These are locations that organizations can
temporarily use after a disaster event, which
contain backups of data, systems, and other
technology infrastructure.
রিসর্োর্সটি এরিট কিো, কোট করি কিো, রিরিিং কিো, রিরি কিো, শেয়োি কিো (শেসকোন মোধ্যসম) রনসেধ্। শর্সেসে আিনোি শেসক প্রোপ্ত প্ররিজন রিসর্সি 5000 টোকো িোসি
ঋনী িসয় েোকসিন 100 Days Challenge Team এি কোসে।
Copyright ©100 Days Challenge Join Our Group Study Platform
Data center tiers are a system used to describe specific kinds of data center infrastructure in a
consistent way. Tier 1 is the simplest infrastructure, while Tier 4 is the most complex and has
the most redundant components. Each tier includes the required components of all the tiers
below it.
Four Data Center Tiers
Tier 1: A Tier 1 data center has a single path for power and cooling and few, if any, redundant and
backup components. It has an expected uptime of 99.671% (28.8 hours of downtime annually).
Tier 2: A Tier 2 data center has a single path for power and cooling and some redundant and
backup components. It has an expected uptime of 99.741% (22 hours of downtime annually).
Tier 3: A Tier 3 data center has multiple paths for power and cooling and systems in place to
update and maintain it without taking it offline. It has an expected uptime of 99.982% (1.6 hours
of downtime annually).
Tier 4: A Tier 4 data center is built to be completely fault tolerant and has redundancy for every
component. It has an expected uptime of 99.995% (26.3 minutes of downtime annually).
রিসর্োর্সটি এরিট কিো, কোট করি কিো, রিরিিং কিো, রিরি কিো, শেয়োি কিো (শেসকোন মোধ্যসম) রনসেধ্। শর্সেসে আিনোি শেসক প্রোপ্ত প্ররিজন রিসর্সি 5000 টোকো িোসি
ঋনী িসয় েোকসিন 100 Days Challenge Team এি কোসে।
Copyright ©100 Days Challenge Join Our Group Study Platform
Cloud computing is the use of computing resources (hardware and software) that are delivered
as a service over a network (typically the Internet).
Cloud
Model
Deployment Service
Models Models
The cloud resources (like servers and storage) are owned and
operated by a third-party cloud service provider and delivered over
Public Cloud the internet. With a public cloud, all hardware, software, and other
supporting infrastructure are owned and managed by the cloud
provider. Such as Amazon Web Services (AWS) or Microsoft Azure.
Hybrid clouds combine both private and public cloud models for
maximum flexibility. This is a common example of hybrid cloud:
Hybrid clouds Organizations can use private cloud environments for their IT
workloads and complement the infrastructure with public cloud
resources to accommodate occasional spikes in network traffic.
রিসর্োর্সটি এরিট কিো, কোট করি কিো, রিরিিং কিো, রিরি কিো, শেয়োি কিো (শেসকোন মোধ্যসম) রনসেধ্। শর্সেসে আিনোি শেসক প্রোপ্ত প্ররিজন রিসর্সি 5000 টোকো িোসি
ঋনী িসয় েোকসিন 100 Days Challenge Team এি কোসে।
Copyright ©100 Days Challenge Join Our Group Study Platform
NOC Zone (Network Operations Center): SOC Zone (Security Operations Center):
The NOC Zone is a centralized location where The SOC Zone is dedicated to cybersecurity
Network Mgmt, Operations, monitoring operations, including threat detection,
activities are conducted. User support also incident response, and vulnerability
provided from here. management.
রিসর্োর্সটি এরিট কিো, কোট করি কিো, রিরিিং কিো, রিরি কিো, শেয়োি কিো (শেসকোন মোধ্যসম) রনসেধ্। শর্সেসে আিনোি শেসক প্রোপ্ত প্ররিজন রিসর্সি 5000 টোকো িোসি
ঋনী িসয় েোকসিন 100 Days Challenge Team এি কোসে।