Network Architecture
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:01
Hello and my name is Dustin today will be continuing our beginner network infrastructure course with network architecture. Let's go ahead and get started.
00:12
Network Architecture A is a very important part of computer networking. It's the complete framework of an organization's computer network. The diagram the network architecture came Provide is a full picture of the network and in should include all hardware components, network layout, apologies,
00:31
physical and wireless connections, cable types and protocols.
00:36
Understanding the network architecture will help you troubleshoot network issues and help you plan upgrades or make changes to the network. That may affect other devices down the line that you may not have been aware of.
00:51
So starting the network architecture, we've got network protocols
00:55
and modern protocols for computer networking mostly used packet switching methods to send and receive messages.
01:00
These messages are in the form of packets,
01:04
packets or messages that are divided into pieces sent across the wire or in ah, a lot of cases now wireless and then reassembled at their destination.
01:15
The most common network protocol family you'll encounter is the I P Protocol family.
01:19
Many other network protocols like TCP and UDP http ftp
01:26
all work and integrate with the I. P Protocol.
01:30
The I P Protocol suite has the task of actually delivering the packets based on their I p address, which is designed in the head are assigned. I'm no sorry not designed in the header of a packet
01:42
because this relies on the i p address in a packets header i p defined packet structures that encapsulate that data.
01:49
There are two big versions of the I p suite of protocols. Um, probably heard of them i p v four or I p version for an i p V six.
01:59
Currently, I PV forest, still one of the most dominant protocols of the Internet. But as of October of last year, I P V six actually reached about 25% of all Internet traffic.
02:13
Wireless networking uses wireless protocols. It is important to remember that the I P Protocol family still applies here as well. But there's also special protocols for wireless networks.
02:23
Another type of networking protocol that is extremely important. Admire, networking are routing protocols and routing protocols are rules that have been created for routers to communicate with each other, which allows modern networking toe work without any routing protocols. your packets would never be able to leave their network
02:44
network topology, Zarei diagram or layout of the connections between computers, they're usually named based on the shape of them. For example, Ah, ring topology looks like a ring if you were looking at it,
02:58
every topology has both advantages and disadvantages, so it's important to understand the different options that you have available. When choosing a topology, you need to make sure it meets all the requirements you have for your network
03:12
ring networks In a ring network, all computers or devices are connected to a closed loop cable, so there's no terminating ends. If one system crashes, the whole network goes down in a ring network. Each computer acts as a repeater for the signal.
03:29
Devices have to wait for a token to come by to send data, so they're also referred to as token ring networks.
03:36
This token helps carry the data along the ring.
03:38
Once the data reaches its destination, the token a stripped of the data and continues along the ring without any data waiting for another device to attach data to it and continues along these air typically older networks. So you may not see them as much anymore.
03:57
Bus networks devices on a bus network are commonly referred to as nodes. These notes are all connected to a single linear cable known as a trunk.
04:06
Each end of the trunk must be terminated to prevent that signal from rebounding back through the cable so it doesn't come all the way from one end and then back.
04:18
Mesh networks can be configured in either full or partial mesh in a full mesh network, every devices connected to every other device on the network.
04:28
Because the amount of connections in a full mesh network these could be very expensive to implement. But they do have extremely high redundancy, cause you can have multiple links fail and still have every device be available to talk to the other devices.
04:43
And that's because, ah, there's so many different routes to each device.
04:46
These air, typically used on backbone traffic
04:50
in a partial MASH network, you get many benefits of the mesh network without the high cost. In this topology, you'll have several devices that are connected in that full mesh.
05:03
While other devices are not so, it's a lot less expensive. It does offer a little bit less redundancy, but it's still pretty reliable.
05:14
Star networks are one of the most common types of Ethernet networks that you'll come across today in a star network. All devices are connected to a central hub or switch
05:24
These air typically really easy to implement and have a decent amount of redundancy. Um, typically in a Star network. If you have one link go down, it would just affect that one hope for anybody trying to communicate with that one.
05:40
So in today's video, we discussed a lot about the different number are what network architecture er is
05:46
the different main types of protocols, and that's usually the the I. P. Protocol suite we discussed. And then we also talked about a few networked apologies like that. Token ring networks, the linear bus networks, meshes and star networks up. Next, we've got hubs
Up Next
Instructed By
Similar Content