NETWORKS
carry data packets both inside the organisation and externally across the globe
(data in transit must be secure)
Network topology
Network topology is the way a network is arranged. This includes physical or logical description of how the network’s links and nodes are set up to relate to each other.
NETWORKS:
Physical diagram:
The physical network topology refers to the connections such as cables, showing how the network is arranged within a building and helping with setup, maintenance and provisioning.
NETWORKS:
Logical diagram
The logical network topology is a higher-level diagram of how the network is set up. It will show things such as how each element connects to the others and can include a virtual cloud topology.
Figure 6.1 Bus network diagram
network diagram
Bus
Description: All devices are connected to a single central cable, called the bus or backbone.
Advantages: Easy to install and requires less cable. cost less
Disadvantages: If the main cable fails, the entire network goes down. Performance downgrade issues with high traffic.
Figure 6.2 Star network diagram
[PC1]
|
[PC2]—— [Hub/Switch] ——[PC3]
|
[PC4]
Star network diagram
Description: All devices are connected to a central hub or switch.
Advantages: Easy to manage and troubleshoot. Failure of one device does not affect the others.
Disadvantages: If the central hub fails, the entire network is affected. Requires more cable than bus topology.
Figure 6.3 Mesh network diagram
Mesh network diagram
Description: Devices are interconnected, with each device having a direct link to others.
Advantages: High fault tolerance and reliability. Data can be routed through multiple paths.
Disadvantages: Expensive and complex to install and manage due to a large number of connections.
Figure 6.4 Hybrid network diagram
[PC1]——[PC2]
| X |
[PC3]——[PC4]
all interconnected, each device link to ot\hers
Hybrid network
Description: Combines two or more different types of topologies to form a more complex network; for example, a combination of star and mesh topologies.
Advantages: Flexible and scalable, can be designed to meet specific needs. Can leverage the strengths of different topologies while minimising their weaknesses.
Disadvantages: Complex to design and manage. Can be expensive due to the complexity and number of connections.
Figure 6.4 Hybrid network diagram
STAR segment
connected to
[PC1] —– [PC2] —– [PC3] (Bus segment)
connected to star segment
Network types
LAN
WLAN
MAN
WAN
LAN
A local area network is defined as a network within one or two closely connected buildings.
WLAN
Wireless local area network use has grown as more organisations use wireless networks to connect employee laptops and other devices, removing the need for vast amounts of cabling and increased mobility.
MAN
A metropolitan area network is a network that covers a larger area than a LAN, such as a university campus.
WAN
A wide area network is a network that covers a wide area. An example is the internet, which covers the globe.
IP address
An internet protocol (IP) address
unique numerical identifier assigned to each device connected to a computer network that uses the internet protocol for communication.
IDENTIFY host/network interface & provide LOCATION
. IPv4
IPv4 uses 32-bit (base 2 or binary) numbers broken into four 8-bit sections or octets.
IPv6
. IPv6 is a 128-bit system and consists of eight groups of four hexadecimal digits (base 16), which uses 0 to F as values separated by colons. An IPv6 address example is 2345:0425:2CA1:0000:0000:0567:5673:23b5. Notice the colon between the numbers and that, being hexadecimal, it contains letters and numbers as a straightforward way to identify IPv4 and IPv6.
Common ports and protocols
Networks use common ports and protocols to communicate. There are 65,536 possible port numbers and 0–1,023 are called well-known ports. Below is a list of some commonly used ports.
well known ports
port numbers and 0–1,023 are called well-known ports. Below is a list of some commonly used ports.
Commonly used ports
Ports 20 and 21: file transfer protocol (FTP), used for transferring files between a client and a server, but is insecure. Secure FTP (SFTP) should be used and run as a subsystem of SSH.
Port 22: secure shell protocol (SSH) is a tunnelling protocol that creates secure network connections.
Port 25: simple mail transfer protocol (SMTP) is used for sending email.
Port 53: domain name system (DNS) matches the domain names (bbc.co.uk or amazon.com) to an IP address – bbc.co.uk, for instance, is 212.58.237.1 (in Windows command prompt, type nslookup bbc.co.uk) – enabling users to load websites and applications without having to remember an IP address. Note that the BBC address can change.
Port 80: hypertext transfer protocol (HTTP) is the original protocol that made the World Wide Web possible, and has been largely replaced by the secure (HTTPS) protocol, which should be used where possible.
Port 88: Used by Kerberos and Microsoft, the single sign on (SSO) system is used to authenticate clients and servers. A user authenticates and then gets admittance to what they have been given permission to access.
Port 123: network time protocol (NTP) is used to synchronise clocks within devices on a network.
Port 443: HTTP secure is the encrypted version of HTTP. It adds transport layer security (TLS) to HTTP to make a secure connection.
Port 3389: remote desktop protocol (RDP) enables users to remotely connect to their desktop computers from another device.