Network Architecture.

Deepak gupta
5 min readOct 30, 2023

--

Hello dear hackers welcome back to my another blog, hope you are all are good ,happy and enjoying your life.

So today we are going to discuss Network Architecture.

Network Architecture

Network Architecture means network layout that tells us how Computers are arranged and how task are allocated to the computer.

Types of Network Architecture: -

  1. Peer to peer architecture.

2. Client Server architecture.

Peer to peer architecture: -

Peer to peer Network also known as point-to-point network in which all the computers are directly linked together with equal privileges and responsibilities for sharing the data. There is no Server in it.

Advantage: -

1. No particular device is a client or a server, the tasks and responsibilities of servers are distributed among all the devices, which also act as clients.

2. If One Computer Stops working it will have no effect on the other Computer.

3. Its Setup and Maintenance is also easy.

Dis-advantages: -

1. It has a Security issue as the device is managed itself.

2. No centralized system, thus difficult to keep a backup of the data in case of any fault.

3. With a growth in the number of machines on this network, performance, security, and access may all become big issues.

Client-Server Architecture: -

This is also known as centralized architecture, as one powerful central computer is in charge of serving all the requests from the client computers. This central computer is a server.

The client computers connect to the server as and when they require the use of shared resources or shared data. All of the shared data is stored solely in the server, and not on any other computer.

A server handles all of the key tasks, such as security and network administration.

All of the clients interact with one another via a server.

Advantages: -

1. It has a Centralized System, from which data can be easily backed up.

2. Security is better in this network.

3. Because a single manages the shared resources in a Client/Server network, there is improvement in security.

4. Much faster network speeds.

  1. The server provides a customised Network Operating System (NOS) to offer resources to a large number of users that want them.

Dis-advantages: -

  1. More prone to downtime because if the server fails, none of the client machines are able to get their requests served.

2. It is far more expensive than P2P. This is due to the requirement for a server with more RAM, as well as the necessity for several networking devices such as hubs, routers, switches, and so on.

Network Hierarchy

Network hierarchy, in the context of computer networks, refers to the organization and structure of a network into different layers or levels. These hierarchical layers help in the efficient and effective management of network resources, data, and communication. Typically, network hierarchies consist of three primary layers: core, distribution, and access layers.

  1. Access Layer.

The access layer is the lowest level of the network hierarchy, closest to end-user devices such as computers, smartphones, and networked devices.

Its primary role is to provide connectivity to end devices, controlling user access, and often includes elements like switches, access points, and hubs.

Access layer devices aggregate user traffic and connect it to the distribution layer.

2. Distribution layer

Aggregation of LAN or WAN links.

Policy-based security in the form of access control lists (ACLs) and filtering.

Routing services between LANs and VLANs and between routing domains (e.g., EIGRP to OSPF).

Redundancy and load balancing.

A boundary for route aggregation and summarization configured on interfaces toward the core layer.

Broadcast domain control, because routers or multilayer switches do not forward broadcasts. The devices acts as the demarcation point between broadcast domains.

3. Core Layer

Providing high-speed switching like fast transport.

Providing reliability and fault tolerance.

Scaling by using faster, and not more, equipment.

Avoiding CPU-intensive packet manipulation caused by security, inspection.

QoS classification, or other processes.

Zero Trust Architecture

What is zero trust?

A zero-trust model implements data security that prioritizes access and restrictions. This is particularly relevant in today’s business environment. As organizations increasingly need to secure a remote workforce.

In a zero-trust architecture, users, devices, & services receives the least possible privileges until proven trustworthy. In a few cases. When implementing zero trust network access, privilege restrictions extend even after authentication & authorization.

Zero threat architectures are designed to reduce the vulnerabilities associated with cloud resources, ephemeral endpoints, dynamic attacks and internet of things (IOT) devices.

These architectures are often adopted by organizations with highly sensitive data and systems.

3 key Elements of Zero Trust Architecture

When evaluating a zero-trust architecture, there are three elements that should be considered.

These elements are vital to the successful deployment and construction of zero trust architectures.

1. No False sense of Security.

2. Multifactor Authentication.

3. Micro Segmentation.

Principles for successful implementation

When building a zero-trust architecture there are several best practices you can employ.

Below are four practices to help you prioritize your efforts, securely validate devices, ensure visibility of your systems, and eliminate false trust.

1. Know your architecture including users, devices, and services.

2. Create a strong device identity.

3. Focus your monitoring on devices and services.

Don’t trust the network, including the local network.

--

--