Comprehensive Overview of Networks: Architecture, Types, and Security
VerifiedAdded on 2023/06/04
|6
|1633
|250
Report
AI Summary
This report provides a comprehensive overview of networking, covering essential aspects such as network architecture (P2P, client-server, and hybrid models), various network types (PAN, LAN, SAN, CAN, MAN, WLAN, and WAN), and network topologies (bus, star, ring, mesh, tree, and hybrid). The report delves into the building blocks of a network, including network operating systems, cabling, and network devices like hubs, bridges, routers, and gateways. It emphasizes the importance of IP addressing (IPv4 and IPv6) for resource identification and the critical role of network security. The report discusses security mechanisms like authentication, authorization, data encryption, anti-viruses, firewalls, and intrusion detection systems, along with an overview of network security threats. It concludes by highlighting the evolving nature of networking and the increasing reliance on security measures like biometric authentication and cloud storage to address new challenges. This report is a valuable resource for students seeking to understand the fundamentals of networking and its practical applications.

1
Abstract
The Overview of networking includes all the basic essentials about applications of networks. This report
will explain the importance of network in current scenario, the architecture of network applications, the
types of networks, fundamental of networking topologies, the communication standards of networking
applications and further it also cover the need of security in networking and the implementation ways. It
also discusses the types of security threats and how to overcome it.
Contents
Abstract.......................................................................................................................................................1
Introduction to Networks............................................................................................................................1
Network architecture..................................................................................................................................1
Types of Network........................................................................................................................................3
Network topologies.....................................................................................................................................3
Building block of a network.........................................................................................................................4
Identifying resource in a network................................................................................................................4
Security in network......................................................................................................................................4
Summary.....................................................................................................................................................5
References...................................................................................................................................................6
Introduction to Networks
In today’s digital world of communication, networking is just like oxygen for human body. Without
networking we cannot imagine anything. To communicate with each other, we are strongly dependent
on networks. In technological terms, “A network is a group of various devices which can be computers,
mobiles, PDAs, Scanners, printers and now it can be any home appliance as well.” The main objective to
create a network is to establish communication channel or sharing information among multiple devices.
A very thing about networking application is that it is not mandatory that two networks should be alike
in terms of size and configuration. It can be very dissimilar.
Network architecture
Network architecture represents the physical and logical design, in which all the devices can be
connected with each other by using wires or wireless network media. In simple terms we can say how all
the devices can be organized? There are three main types of network architecture:
Abstract
The Overview of networking includes all the basic essentials about applications of networks. This report
will explain the importance of network in current scenario, the architecture of network applications, the
types of networks, fundamental of networking topologies, the communication standards of networking
applications and further it also cover the need of security in networking and the implementation ways. It
also discusses the types of security threats and how to overcome it.
Contents
Abstract.......................................................................................................................................................1
Introduction to Networks............................................................................................................................1
Network architecture..................................................................................................................................1
Types of Network........................................................................................................................................3
Network topologies.....................................................................................................................................3
Building block of a network.........................................................................................................................4
Identifying resource in a network................................................................................................................4
Security in network......................................................................................................................................4
Summary.....................................................................................................................................................5
References...................................................................................................................................................6
Introduction to Networks
In today’s digital world of communication, networking is just like oxygen for human body. Without
networking we cannot imagine anything. To communicate with each other, we are strongly dependent
on networks. In technological terms, “A network is a group of various devices which can be computers,
mobiles, PDAs, Scanners, printers and now it can be any home appliance as well.” The main objective to
create a network is to establish communication channel or sharing information among multiple devices.
A very thing about networking application is that it is not mandatory that two networks should be alike
in terms of size and configuration. It can be very dissimilar.
Network architecture
Network architecture represents the physical and logical design, in which all the devices can be
connected with each other by using wires or wireless network media. In simple terms we can say how all
the devices can be organized? There are three main types of network architecture:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

2
P2P (Peer to Peer): In this type of architecture all the devices have their own task with their own data.
Actually all the devices have all the rights to control and share the data among each other [1]. There is
no need of any specific hierarchy in this type of architecture. Every device acts as a separate server in
P2P architecture.
Client Server: In this type of architecture all the devices can communicate with each other through a
centralized system only. This central system is called as Server, it has very high processing power. The
server can be connected with multiple client nodes
Hybrid: It is the composition of diverse type of devices. It is the combination of P2P and Client server
architecture. It is recommended in network when we want to get the benefits of both types of
architecture.
P2P (Peer to Peer): In this type of architecture all the devices have their own task with their own data.
Actually all the devices have all the rights to control and share the data among each other [1]. There is
no need of any specific hierarchy in this type of architecture. Every device acts as a separate server in
P2P architecture.
Client Server: In this type of architecture all the devices can communicate with each other through a
centralized system only. This central system is called as Server, it has very high processing power. The
server can be connected with multiple client nodes
Hybrid: It is the composition of diverse type of devices. It is the combination of P2P and Client server
architecture. It is recommended in network when we want to get the benefits of both types of
architecture.

3
Types of Network
After defining the architecture of network, the next important thing is to decide which type of network
is preferred as per the requirements of an organization [2]. How the devices will be connected with each
other? The network can be categorized in various forms on the basis of their scope and scale. There are
following types of network:
PAN (Personal Area Network)
LAN (Local Area Network)
SAN (Storage Area Network)
CAN (Campus Area Network)
MAN (Metropolitan Area Network)
WLAN (Wireless Local Area Network)
WAN (Wide Area Network)
Network topologies
Network topology term is used to represent the layout of network, the way in which all the nodes can
be connected with each other and how they can communicate [3]. Topology may refer the physical
network of all the devices of logical schematic way of transmitting signals throughout the network.
There can be following types of network topologies:
Bus
Star
Ring
Mesh
Tree
Hybrid
All the above topologies have some advantages and disadvantages. We should choice the specific
topology as per the requirements, budget and the security concerns of our organization.
Types of Network
After defining the architecture of network, the next important thing is to decide which type of network
is preferred as per the requirements of an organization [2]. How the devices will be connected with each
other? The network can be categorized in various forms on the basis of their scope and scale. There are
following types of network:
PAN (Personal Area Network)
LAN (Local Area Network)
SAN (Storage Area Network)
CAN (Campus Area Network)
MAN (Metropolitan Area Network)
WLAN (Wireless Local Area Network)
WAN (Wide Area Network)
Network topologies
Network topology term is used to represent the layout of network, the way in which all the nodes can
be connected with each other and how they can communicate [3]. Topology may refer the physical
network of all the devices of logical schematic way of transmitting signals throughout the network.
There can be following types of network topologies:
Bus
Star
Ring
Mesh
Tree
Hybrid
All the above topologies have some advantages and disadvantages. We should choice the specific
topology as per the requirements, budget and the security concerns of our organization.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

4
Building block of a network
Building blocks represent the basic requirements to establish a network. The primary requirement of
network is NOS (Network operating system), without it we cannot connect all the devices of network. It
also provides the features to share the resources throughout the network and manage users for various
functionalities [4]. Network operating system can be one of the following software:
UNIX
LINUX
Solaris
Windows Server
To connect all the devices, we can use cables or it can be wireless also. Cabled network includes twisted
pair cables, coaxial cables and fiber optic cables and wireless transmission may include radio and
microwave media. In modern technology, to transmit the data most of the organizations prefer fiber
optic cables due to its highest bandwidth and reliability. Wireless media is also popular nowadays as it
supports to connect distinct devices. In wireless transmission data transmits in form of electro-magnetic
waves.
Apart of the network media other very important building block of networking are the network devices
such as hubs, bridges, routers and gateways [5]. These devices are useful because it help to identify the
destination devices which intends to receive the transmitted signals. Every device in a network must has
a unique identification code, it is also called as the physical address or MAC address of device. These
devices can transmit data in form of small chunks of data packets. Router supports the reliable data
transfer mechanism as it works on transmission layer and can use TCP and UDP protocols to transmit
data.
Identifying resource in a network
A network can be small and it can be worldwide also. A resource in this network must be identified by its
IP address. The allotment of IP address to any device in a network is controlled by IANA [6]. There are
two main types of mechanisms which can be used to address any resource in a network:
IPv4 addressing: it has some Classes having standardized format of IP address to show the numbers of
hosts in a network. The main classes which comes under this category are:
Class A
Class B
Class C
Class D
Class E
IPv6 addressing: It is the future of IP addresses, as the usage of internet is tremendously growing day by
day and to identify all the resources in this vast network is not possible with the help of IPv4 addressing
mechanism.
Building block of a network
Building blocks represent the basic requirements to establish a network. The primary requirement of
network is NOS (Network operating system), without it we cannot connect all the devices of network. It
also provides the features to share the resources throughout the network and manage users for various
functionalities [4]. Network operating system can be one of the following software:
UNIX
LINUX
Solaris
Windows Server
To connect all the devices, we can use cables or it can be wireless also. Cabled network includes twisted
pair cables, coaxial cables and fiber optic cables and wireless transmission may include radio and
microwave media. In modern technology, to transmit the data most of the organizations prefer fiber
optic cables due to its highest bandwidth and reliability. Wireless media is also popular nowadays as it
supports to connect distinct devices. In wireless transmission data transmits in form of electro-magnetic
waves.
Apart of the network media other very important building block of networking are the network devices
such as hubs, bridges, routers and gateways [5]. These devices are useful because it help to identify the
destination devices which intends to receive the transmitted signals. Every device in a network must has
a unique identification code, it is also called as the physical address or MAC address of device. These
devices can transmit data in form of small chunks of data packets. Router supports the reliable data
transfer mechanism as it works on transmission layer and can use TCP and UDP protocols to transmit
data.
Identifying resource in a network
A network can be small and it can be worldwide also. A resource in this network must be identified by its
IP address. The allotment of IP address to any device in a network is controlled by IANA [6]. There are
two main types of mechanisms which can be used to address any resource in a network:
IPv4 addressing: it has some Classes having standardized format of IP address to show the numbers of
hosts in a network. The main classes which comes under this category are:
Class A
Class B
Class C
Class D
Class E
IPv6 addressing: It is the future of IP addresses, as the usage of internet is tremendously growing day by
day and to identify all the resources in this vast network is not possible with the help of IPv4 addressing
mechanism.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

5
Security in network
In terms of networking security refers to the intentional or accidental destruction, disclosure and
modification of information, hardware or software of network resource [7]. To ensure the security of
networking devices, we must follow the standards of security mechanism such as:
Authentication
Authorization
Data encryption
Anti-viruses
Firewall
Intrusion detection system
Auditing
The network security threats can be easily explained with the help of following diagram [8]:
Summary
In simplest term, the networking is the basic necessity of present world. As we are living in the world of
IoT today, we cannot deny the need and security of our network. As the network is growing day by day,
we are continuously facing new challenges. The innovations in the field of IoT help us to overcome many
of the problems which were the main concerns earlier. For example most of the devices of networking
applications use biometric authentication now. The data storage on cloud always sync our data and
there are now very less chances to disrupt this important data. Networking is today’s most demanding
and challenging field which is mostly preferred by researchers. This report is just a minute and brief part
to cover the overview of networking.
Security in network
In terms of networking security refers to the intentional or accidental destruction, disclosure and
modification of information, hardware or software of network resource [7]. To ensure the security of
networking devices, we must follow the standards of security mechanism such as:
Authentication
Authorization
Data encryption
Anti-viruses
Firewall
Intrusion detection system
Auditing
The network security threats can be easily explained with the help of following diagram [8]:
Summary
In simplest term, the networking is the basic necessity of present world. As we are living in the world of
IoT today, we cannot deny the need and security of our network. As the network is growing day by day,
we are continuously facing new challenges. The innovations in the field of IoT help us to overcome many
of the problems which were the main concerns earlier. For example most of the devices of networking
applications use biometric authentication now. The data storage on cloud always sync our data and
there are now very less chances to disrupt this important data. Networking is today’s most demanding
and challenging field which is mostly preferred by researchers. This report is just a minute and brief part
to cover the overview of networking.

6
References
[1] Cadell, "types-of-network-architecture-56i7," DEV, 12 January 2013. [Online]. Available:
https://dev.to/cadellsingh/types-of-network-architecture-56i7. [Accessed 22 September 2018].
[2] B. Mitchell, "lans-wans-and-other-area-networks-817376," Lifewire, 5 July 2018. [Online]. Available:
https://www.lifewire.com/lans-wans-and-other-area-networks-817376. [Accessed 22 September
2018].
[3] V. Beal, "topologies.asp," webopedia, 15 march 2017. [Online]. Available:
https://www.webopedia.com/quick_ref/topologies.asp. [Accessed 22 september 2018].
[4] M. Rouse, "network-operating-system," Tech traget, 16 february 2007. [Online]. Available:
https://searchnetworking.techtarget.com/definition/network-operating-system. [Accessed 22
september 2018].
[5] ThomasMcKinlay, "types-of-media-used-in-computer-networking," techwalla, 23 may 2013.
[Online]. Available: https://www.techwalla.com/articles/types-of-media-used-in-computer-
networking. [Accessed 22 september 2018].
[6] v. beal, "pv6_ipv4_difference.html," webopedia, 27 october 2017. [Online]. Available:
https://www.webopedia.com/DidYouKnow/Internet/ipv6_ipv4_difference.html. [Accessed 22
september 2018].
[7] comodo, "what-is-network-security," comodo, 12 march 2018. [Online]. Available:
https://enterprise.comodo.com/blog/what-is-network-security/. [Accessed 22 september 2018].
[8] nirmalrijal, "top-10-network-security-threats-security-measures," cybrary, 14 march 2017. [Online].
Available: https://www.cybrary.it/0p3n/top-10-network-security-threats-security-measures/.
[Accessed 22 september 2018].
References
[1] Cadell, "types-of-network-architecture-56i7," DEV, 12 January 2013. [Online]. Available:
https://dev.to/cadellsingh/types-of-network-architecture-56i7. [Accessed 22 September 2018].
[2] B. Mitchell, "lans-wans-and-other-area-networks-817376," Lifewire, 5 July 2018. [Online]. Available:
https://www.lifewire.com/lans-wans-and-other-area-networks-817376. [Accessed 22 September
2018].
[3] V. Beal, "topologies.asp," webopedia, 15 march 2017. [Online]. Available:
https://www.webopedia.com/quick_ref/topologies.asp. [Accessed 22 september 2018].
[4] M. Rouse, "network-operating-system," Tech traget, 16 february 2007. [Online]. Available:
https://searchnetworking.techtarget.com/definition/network-operating-system. [Accessed 22
september 2018].
[5] ThomasMcKinlay, "types-of-media-used-in-computer-networking," techwalla, 23 may 2013.
[Online]. Available: https://www.techwalla.com/articles/types-of-media-used-in-computer-
networking. [Accessed 22 september 2018].
[6] v. beal, "pv6_ipv4_difference.html," webopedia, 27 october 2017. [Online]. Available:
https://www.webopedia.com/DidYouKnow/Internet/ipv6_ipv4_difference.html. [Accessed 22
september 2018].
[7] comodo, "what-is-network-security," comodo, 12 march 2018. [Online]. Available:
https://enterprise.comodo.com/blog/what-is-network-security/. [Accessed 22 september 2018].
[8] nirmalrijal, "top-10-network-security-threats-security-measures," cybrary, 14 march 2017. [Online].
Available: https://www.cybrary.it/0p3n/top-10-network-security-threats-security-measures/.
[Accessed 22 september 2018].
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.