SlideShare a Scribd company logo
1 of 15
Network Architecture and
Protocols
WHTA networks
What is network Architecture
Definition: Network architecture refers to the design and layout of a
computer network, including its components and their relationships.
Importance of Network
Architecture
● Efficient Communication:
○ Ensures optimal data transfer and communication within the
network.
● Scalability:
○ Allows the network to grow and adapt to changing needs.
● Reliability:
○ Ensures the network's availability and reliability.
Components of Network
Architecture
1. End Devices:
○ Computers, servers, smartphones.
2. Intermediate Devices:
○ Routers, switches, firewalls.
3. Network Media:
○ Cables (fiber optic, copper), wireless signals.
4. Protocols:
○ Rules governing communication (TCP/IP, HTTP, etc.).
Types of Network Architectures
1. Client-Server Architecture:
○ Clients request services from centralized servers.
2. Peer-to-Peer Architecture:
○ Devices communicate directly with each other without a
centralized server.
3. Cloud-Based Architecture:
○ Services and resources are hosted in the cloud.
Layered Network Architecture
● OSI Model (Open Systems Interconnection):
○ Divides network functionality into seven layers.
○ Layers include Physical, Data Link, Network, Transport,
Session, Presentation, and Application.
● Benefits:
○ Simplifies troubleshooting and development.
○ Encourages interoperability among different systems.
Key protocols in Network
Communication
1. TCP/IP (Transmission Control Protocol/Internet Protocol):
○ Essential for internet communication.
○ Divided into four layers: Network Interface, Internet, Transport, and
Application.
2. HTTP (Hypertext Transfer Protocol):
○ Used for web communication, defining how messages are formatted
and transmitted.
3. FTP (File Transfer Protocol):
○ Facilitates file transfers between devices.
4. DNS (Domain Name System):
○ Resolves domain names to IP addresses, translating human-readable
names to machine-readable addresses.
Addressing in Network
Architecture
● IP Addresses:
○ Unique identifiers for devices on a network.
○ IPv4 with 32 bits and IPv6 with 128 bits.
○ Hierarchical structure for efficient routing.
● MAC Addresses:
○ Physical addresses assigned to network interfaces.
○ Used for local network communication.
Routing in Network Arhitecture
● Router Functionality:
○ Directs data packets between different networks.
○ Makes decisions based on routing tables, which contain
information about network paths.
● Routing Protocols:
○ OSPF (Open Shortest Path First), BGP (Border Gateway
Protocol), RIP (Routing Information Protocol).
Switching in Network
Architecture
● Switch Functionality:
○ Connects devices within a local network.
○ Uses MAC addresses for forwarding decisions.
○ Improves network efficiency by reducing collision domains.
● Managed Switches:
○ Allow configuration for better control and security.
Firewalls in Network
Architecture
● Firewall Definition:
○ Security device that monitors and controls incoming and
outgoing network traffic.
○ Acts as a barrier between internal and external networks.
● Types of Firewalls:
○ Packet Filtering, Stateful Inspection, Proxy Firewalls.
● Unified Threat Management (UTM):
○ Combines multiple security features in one device.
VPNS[Virtual Private Network]
● Definition:
○ Securely extends a private network across a public network.
○ Encrypts communication to ensure confidentiality.
● Use Cases:
○ Remote access for employees.
○ Secure communication over the internet.
● Protocols:
○ PPTP, L2TP/IPsec, OpenVPN.
Wireless Network Architecture
● Components:
○ Access points, wireless routers, clients.
○ Wi-Fi standards (802.11a/b/g/n/ac/ax).
● Protocols:
○ WPA3, WPA2 for encryption.
○ SSIDs (Service Set Identifiers) for network identification.
● Security Measures:
○ Encryption, strong authentication (WPA3, 802.1X).
Network Security Protocols
● Secure Sockets Layer (SSL) and Transport Layer Security
(TLS):
○ Ensure secure communication over a computer network.
○ Used in HTTPS for secure web browsing.
● IPsec (Internet Protocol Security):
○ Provides security at the network layer.
○ Encrypts and authenticates IP packets.
Conclusion
● Effective Network Architecture is Crucial:
○ Ensures optimal performance, scalability, and security.
○ Adapts to evolving technological needs.
● Ongoing Evolution:
○ New technologies, such as SDN (Software-Defined
Networking), continue to shape network architecture.

More Related Content

Similar to Network_Architecture_and_Protocols.pptxNetwork_Architecture_and_Protocols.pptx

22ETC15H_Internet of Things(IOT).pptx
22ETC15H_Internet of Things(IOT).pptx22ETC15H_Internet of Things(IOT).pptx
22ETC15H_Internet of Things(IOT).pptx
GMECE
 

Similar to Network_Architecture_and_Protocols.pptxNetwork_Architecture_and_Protocols.pptx (20)

computer networks_fundamentals.pptx
computer networks_fundamentals.pptxcomputer networks_fundamentals.pptx
computer networks_fundamentals.pptx
 
Networking Fundamentals.ppt
Networking Fundamentals.pptNetworking Fundamentals.ppt
Networking Fundamentals.ppt
 
Vision
VisionVision
Vision
 
Computer network updated
Computer network updatedComputer network updated
Computer network updated
 
ITP-22 -COMPUTER NETWORK.pptx
ITP-22 -COMPUTER NETWORK.pptxITP-22 -COMPUTER NETWORK.pptx
ITP-22 -COMPUTER NETWORK.pptx
 
OPERATING SYSTEM AND NETWORKING.pptx
OPERATING SYSTEM AND NETWORKING.pptxOPERATING SYSTEM AND NETWORKING.pptx
OPERATING SYSTEM AND NETWORKING.pptx
 
Chapters1&2.pdf
Chapters1&2.pdfChapters1&2.pdf
Chapters1&2.pdf
 
info technology.pptx
info technology.pptxinfo technology.pptx
info technology.pptx
 
Lecture3 - Computer Networks by the Professor.ppt
Lecture3 - Computer Networks by the Professor.pptLecture3 - Computer Networks by the Professor.ppt
Lecture3 - Computer Networks by the Professor.ppt
 
22ETC15H_Internet of Things(IOT).pptx
22ETC15H_Internet of Things(IOT).pptx22ETC15H_Internet of Things(IOT).pptx
22ETC15H_Internet of Things(IOT).pptx
 
Fundamental Of Computer Network.
Fundamental Of Computer Network. Fundamental Of Computer Network.
Fundamental Of Computer Network.
 
CN-Unit 1.pptx
CN-Unit 1.pptxCN-Unit 1.pptx
CN-Unit 1.pptx
 
Modue 1 part 1 of computer networks for your university exams
Modue 1 part 1 of computer networks for your university examsModue 1 part 1 of computer networks for your university exams
Modue 1 part 1 of computer networks for your university exams
 
Network Basics.pptx
Network Basics.pptxNetwork Basics.pptx
Network Basics.pptx
 
KRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxKRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptx
 
CN Unit-1 PPT.pptx
CN Unit-1 PPT.pptxCN Unit-1 PPT.pptx
CN Unit-1 PPT.pptx
 
Net 02 03_lan
Net 02 03_lanNet 02 03_lan
Net 02 03_lan
 
Backbone Network types.pptx
Backbone Network types.pptxBackbone Network types.pptx
Backbone Network types.pptx
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 

More from adnis1 (6)

Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
Lesson7-Hacktivism, Terrorism, Espionage, Disinformation Campaigns and Warfar...
 
Lesson12 Search and Search Warrants.pptx
Lesson12  Search and Search Warrants.pptxLesson12  Search and Search Warrants.pptx
Lesson12 Search and Search Warrants.pptx
 
Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptx
 
Lesson2a-General types of CyberCrime.pptx
Lesson2a-General types of CyberCrime.pptxLesson2a-General types of CyberCrime.pptx
Lesson2a-General types of CyberCrime.pptx
 
Cybercrimes in cybersecurity Investigations.pptx
Cybercrimes in cybersecurity Investigations.pptxCybercrimes in cybersecurity Investigations.pptx
Cybercrimes in cybersecurity Investigations.pptx
 
criminalprofillingincybersecurityandinformation.pptx
criminalprofillingincybersecurityandinformation.pptxcriminalprofillingincybersecurityandinformation.pptx
criminalprofillingincybersecurityandinformation.pptx
 

Recently uploaded

Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
nirzagarg
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 

Network_Architecture_and_Protocols.pptxNetwork_Architecture_and_Protocols.pptx

  • 2. What is network Architecture Definition: Network architecture refers to the design and layout of a computer network, including its components and their relationships.
  • 3. Importance of Network Architecture ● Efficient Communication: ○ Ensures optimal data transfer and communication within the network. ● Scalability: ○ Allows the network to grow and adapt to changing needs. ● Reliability: ○ Ensures the network's availability and reliability.
  • 4. Components of Network Architecture 1. End Devices: ○ Computers, servers, smartphones. 2. Intermediate Devices: ○ Routers, switches, firewalls. 3. Network Media: ○ Cables (fiber optic, copper), wireless signals. 4. Protocols: ○ Rules governing communication (TCP/IP, HTTP, etc.).
  • 5. Types of Network Architectures 1. Client-Server Architecture: ○ Clients request services from centralized servers. 2. Peer-to-Peer Architecture: ○ Devices communicate directly with each other without a centralized server. 3. Cloud-Based Architecture: ○ Services and resources are hosted in the cloud.
  • 6. Layered Network Architecture ● OSI Model (Open Systems Interconnection): ○ Divides network functionality into seven layers. ○ Layers include Physical, Data Link, Network, Transport, Session, Presentation, and Application. ● Benefits: ○ Simplifies troubleshooting and development. ○ Encourages interoperability among different systems.
  • 7. Key protocols in Network Communication 1. TCP/IP (Transmission Control Protocol/Internet Protocol): ○ Essential for internet communication. ○ Divided into four layers: Network Interface, Internet, Transport, and Application. 2. HTTP (Hypertext Transfer Protocol): ○ Used for web communication, defining how messages are formatted and transmitted. 3. FTP (File Transfer Protocol): ○ Facilitates file transfers between devices. 4. DNS (Domain Name System): ○ Resolves domain names to IP addresses, translating human-readable names to machine-readable addresses.
  • 8. Addressing in Network Architecture ● IP Addresses: ○ Unique identifiers for devices on a network. ○ IPv4 with 32 bits and IPv6 with 128 bits. ○ Hierarchical structure for efficient routing. ● MAC Addresses: ○ Physical addresses assigned to network interfaces. ○ Used for local network communication.
  • 9. Routing in Network Arhitecture ● Router Functionality: ○ Directs data packets between different networks. ○ Makes decisions based on routing tables, which contain information about network paths. ● Routing Protocols: ○ OSPF (Open Shortest Path First), BGP (Border Gateway Protocol), RIP (Routing Information Protocol).
  • 10. Switching in Network Architecture ● Switch Functionality: ○ Connects devices within a local network. ○ Uses MAC addresses for forwarding decisions. ○ Improves network efficiency by reducing collision domains. ● Managed Switches: ○ Allow configuration for better control and security.
  • 11. Firewalls in Network Architecture ● Firewall Definition: ○ Security device that monitors and controls incoming and outgoing network traffic. ○ Acts as a barrier between internal and external networks. ● Types of Firewalls: ○ Packet Filtering, Stateful Inspection, Proxy Firewalls. ● Unified Threat Management (UTM): ○ Combines multiple security features in one device.
  • 12. VPNS[Virtual Private Network] ● Definition: ○ Securely extends a private network across a public network. ○ Encrypts communication to ensure confidentiality. ● Use Cases: ○ Remote access for employees. ○ Secure communication over the internet. ● Protocols: ○ PPTP, L2TP/IPsec, OpenVPN.
  • 13. Wireless Network Architecture ● Components: ○ Access points, wireless routers, clients. ○ Wi-Fi standards (802.11a/b/g/n/ac/ax). ● Protocols: ○ WPA3, WPA2 for encryption. ○ SSIDs (Service Set Identifiers) for network identification. ● Security Measures: ○ Encryption, strong authentication (WPA3, 802.1X).
  • 14. Network Security Protocols ● Secure Sockets Layer (SSL) and Transport Layer Security (TLS): ○ Ensure secure communication over a computer network. ○ Used in HTTPS for secure web browsing. ● IPsec (Internet Protocol Security): ○ Provides security at the network layer. ○ Encrypts and authenticates IP packets.
  • 15. Conclusion ● Effective Network Architecture is Crucial: ○ Ensures optimal performance, scalability, and security. ○ Adapts to evolving technological needs. ● Ongoing Evolution: ○ New technologies, such as SDN (Software-Defined Networking), continue to shape network architecture.