cloud computing trends

Network Architecture

written by Nipuna Jayaweera
On Mar 19, 2023

The structural and logical layout of a computer network is the network architecture. Network architect design architecture with the assistance of network engineers is a framework represented as a diagram to give an accurate description of the made network.

The network architecture contains hardware, physical connections, software, wireless networks, and protocols, as well as the medium of data transmission.

Network architecture gives an in-depth understanding of the whole network and is used to categorize network layers. network diagrams are used to design LANs, WANs, and specific communication tunnels by organizations.

Neural Network Architecture

Neural network architecture refers to a network made up of individual units known as neurons. The neurons act as the neurons present in the human brain. They can take input, analyze the significance of that input, and then merge many inputs into a single output value. The output of the activation functions is a non-linear combination of all input values.

Network Architecture Diagram

A network architecture diagram is a visual illustration of a network. Its layout is shown by symbols and lines. The most effective method to receive information and learn how network components are connected is through visual illustration. This is useful when companies develop new systems or find the source of a network problem. Software packages like SmartDraw, Creately, Intermapper, or SolarWinds NTM are used to build the network diagrams.

Zero Trust Network Architecture

In Zero Trust Network architecture is executed when the security of the network is vulnerable, therefore every connection has to be verified. Security breaches are frequent because many users access data from different locations and devices. It reduces unauthorized access to data within the network. Multi-factor authentication, encryption, file system permissions, and IAM(Identity and Access Management) are used to achieve the required security.

Core Network Architecture

Core network architecture is a 5G network architecture that allows devices to be connected using access technologies other than 3GPP. If a network provides an IP connection and is supported by the device it can be the access network. EPC(Evolved Packet Core) is also available for 4G, however, 5G gives fewer options for supporting devices that do not support 3GPP.

Core Network Architecture has the concept of “trusted” and “untrusted” access. Private and public WI-Fi are examples of untrusted networks since they normally need a password for an outside device to get access. After the device is connected and allowed to access the network, the device is allocated an IP address within the network.

5G Network Architecture

The physical development of 5G – specific hardware and infrastructure is in the network configuration of 5G network architecture. Furthermore, the network system includes how engineering architecture that governs how the network transports data. The core of the service-based architecture (SBA) is cloud-based. This enables the network to manage complicated network operations and their interconnection.

Components of Modern Network Architecture

  1. Controller-Led
  2. Multidomain
  3. Intent-Based Networking(IBN)

Controller-Led

The intent-based network is used to help network security and permit the collaboration of networks. Controllers in controller-led networks are software programs that operate as centralized applications. The controller’s job is to centralize control over all network devices however degree and type of control might change. A controller is able to edit data or just distribute it without making any changes.

There is an interface for a controller to communicate with the devices in the network. Those interface types are:

  • Southbound Interface(SBI) – includes a protocol and an application programming interface(API).
  • Northbound Interface – opens the controller and permits other users to access the data and functions of the device.

Multidomain

Controllers are used in networks for communication with different networks within the company. Each domain contains a master domain manager, a lower domain manager, and some agents. The communication happens when lower-paced agents communicate with their domain manager. Managers and agents are layered in multidomain networks. Each agent reports to the parent domain manager and each manager report to the senior domain manager. So, large companies can have many locations within a city or throughout the world without the need for an uninterrupted multi-domain network.

Intent-Based Networking(IBN)

Intent-based networking (IBN) uses artificial intelligence, machine learning, and network orchestration to sync and automate administrative activities by unifying access, simplifying device onboarding, and serving as a security tool.

As advantages of IBN,

  • Troubleshoots faster
  • Security is high
  • Optimal analytics
  • Since fewer manual tasks and as a result, fewer errors.
  • No hard implementation of new company objectives into the network.

Types of Network Architecture

  1. Peer-to-peer architecture
  2. Client/Server architecture

Peer-to-peer architecture

Peer-to-peer models are used to share different resources such as power or disk storage. It focuses on connectivity, each node is both client and server that has its own data. They have similar capabilities, including the ability to request and reply to services. Peer-to-peer architecture works well in networks with less than ten devices.

Examples of peer-to-peer architecture

  • File sharing over the internet. Users download games on online gaming platforms
  • Distribution of Linux operating systems like Ubuntu, Manjaro, and Linux Mint via BitTorrent.
  • Creating a network between two computers with Windows 7 and 8(version 1) for quick file sharing.

Advantages and Disadvantages of peer-to-peer architecture.

AdvantagesDisadvantages
Less costlyWhen having many peers in the network, it becomes unstable.
File sharing is easy and fastMore vulnerable to virus attacks.
Even without professional assistance, the network is simple to set up.Since files and resources are not centralized, there is less organization.
Professionals are unnecessary since each peer has their own settings.
Data backup is difficult since no central server.
It is simple to add new users to the network.

Client/Server Architecture

The Client/Server architecture model has requesters and service providers namely clients and servers respectively. They do not have similar capabilities.

Examples of client/server architecture

  • Bank web servers store information about particular clients that user access may need.
  • When you search for something in a Google browser, the request is sent to the Google web server. It responds with information which is then displayed in the browser

Advantages and Disadvantages of client/server architecture.

AdvantagesDisadvantages
All data is centralized so backup is not complicated.More costly
Stable and secure.A specialized network OS is necessary for the network to perform smoothly.
Used for both small and large networks.A fault in one area of the network might lead to a disruption in the entire network.
The central device can control peripheral devices.If too many clients request data from the same server, there is a chance of crashing.
All peripheral devices can access data on the server.
It is simple to add both clients and servers without causing any disruptions.

Nipuna Jayaweera

As I sit here reflecting on my journey, I'm thrilled to say I have over six years of experience in the software engineering industry, and have been fortunate enough to have the opportunity to serve as a Senior Software Engineer. It's been an exhilarating ride, with a diverse range of experiences that have helped me build my skills and knowledge base. Whether it's back-end or front-end development, I am an expert in both, having mastered a wide technology stack that enables me to bring your vision to life. Over the years, I've had the privilege of working on multiple projects, building out applications that span across the web and mobile platforms. I've reviewed thousands of lines of code, gained valuable insights, and now stand ready to share the knowledge I've acquired to help you understand the most important software engineering concepts.

Related Posts

Routing

Routing

What is Routing? Routing is the method of choosing the most appropriate path for network traffic to travel between different networks or network devices. It involves determining the path that data should take through the network to reach its intended destination....

Network Address Translation

Network Address Translation

Network Address Translation or NAT gives the facility of accessing the internet by multiple devices through a single public IP address. To do this, the private IP address must be converted to a public IP address. Network Address Translation is the procedure that...

IP Address

IP Address

IP is abbreviated from Internet Protocol. So IP address also known as Internet Protocol address is a unique address used to identify a device on the internet or in a LAN. Generally, IP address enables the devices to exchange information between them since they contain...

Comments

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *