hexdefender
Email
  • Introduction to Linux
    • Overview
    • Linux Kernel
    • Linux Distros
    • Introduction to Kali Linux
    • Install Kali on VirtualBox
    • Install Kali on AWS
  • Linux Commands
    • Linux File Systems
    • Basic File and Directory commands
    • File Permissions and Ownerships
    • System Commands in Linux
    • Text Processing Commands in Linux
    • Linux Archive Utility
    • Package Management in Kali Linux
    • Networking Commands
    • Disk Utility Tools
    • Linux List of CLI Command lookup
    • Linux CLI Cheatsheet
    • Assignment
  • Networking Essentials
    • Overview
    • Networking Protocols
    • IP Addressing & Subnetting
    • DNS and DNS Security
    • Network Devices and Architecture
    • VPNs and Secure Tunnels
    • Network Address Translation (NAT) & Port Forwarding
    • Wireless Networks & Protocols
    • Cloud Networking & Security
    • Common Network Tools
  • Bash Scripting
    • Fundamentals of Bash
    • Variables, Branching and Loops
    • System Variables in Bash
    • Functions and Error Handling in Bash Scripts
    • File Handling and Text Processing
    • 5 Useful Bash Scripts for Everyday Tasks
    • Useful Assignments
  • Fundamentals of Cybersecurity
    • Introduction to Cybersecurity
    • Importance of Cybersecurity
    • Important Cybersecurity Frameworks
    • Cybersecurity Roles and Career Options
  • Penetration Testing
    • Reconnaissance and Footprinting
    • Exploitation Techniques
      • Introduction
      • Service Enumeration
      • Password Attacks
      • Exploit Discovery
      • The Art of Exploitation
      • The Pentester's guide to Metasploit
    • Post Exploitation - Malware & Escalation
  • Web Application Security
    • Common Web Vulnerabilities
    • OWASP Top 10
    • SQL Injections
    • Cross Site Scripting Attacks
    • Web Application Firewalls
    • Secure Coding Practices
  • Cryptography
    • Basic concepts of cryptography
    • Examples of Asymetric & Hashing functions
    • Public Key Infrastructure
    • Digital Signatures
    • Symmetric and Asymmetric Encryption
  • Social Engineering
    • Introduction to Social Engineering
    • Mitigation Strategies for Social Engineering
  • Digital Forensics
    • Digital Forensics Basics
    • Forensics Tools and Techniques
    • Reverse Engineering Fundamentals
    • Malware Analysis
Powered by GitBook
On this page
  • Network Devices and Architecture: The Building Blocks of Networking
  • What Are Network Devices?
  • Common Network Devices
  • Network Device Details: Key Players
  • Network Architectures
  • Client-Server Architecture: Most Common in Enterprises
  • Peer-to-Peer (P2P) Architecture: Decentralized
  • Network Topologies
  • Network Device Security
  • Securing Network Architectures
  • Advanced Network Architectures
  • Resources for Further Learning
  • Key Takeaways
  1. Networking Essentials

Network Devices and Architecture

Here’s a well-structured and clear set of notes on Network Devices and Architecture in the same format, designed to help learners grasp the topic easily on GitBook.


Network Devices and Architecture: The Building Blocks of Networking


What Are Network Devices?

Network devices are the hardware used to connect computers and other electronic devices together so they can share data and communicate over a network.


Common Network Devices

Device

Purpose

Example

Router

Directs data between networks, often between LANs and the Internet

Home Wi-Fi Router

Switch

Connects devices within a single network (LAN), forwarding data based on MAC addresses

Cisco Catalyst 2960

Hub

Broadcasts data to all devices on a network, not commonly used in modern networks

Ethernet Hub

Modem

Converts digital data into a form suitable for transmission over communication lines

DSL Modem

Firewall

Monitors and controls incoming and outgoing network traffic based on security rules

Palo Alto Networks PA-220

Access Point (AP)

Provides wireless access to a wired network for Wi-Fi devices

Ubiquiti UniFi AP

Gateway

Acts as a translator between networks using different protocols

VoIP Gateway

Bridge

Connects two networks and filters traffic based on MAC addresses

Wi-Fi to Ethernet Bridge

Proxy

Acts as an intermediary between client and server to enhance security and performance

Squid Proxy Server


Network Device Details: Key Players

1. Router

  • Function: Routes data between networks, typically connecting a local area network (LAN) to the internet or between two LANs.

  • Example: A home router connects your internal network to your ISP, directing traffic between your devices and the internet.

Features:

  • IP-based forwarding

  • Network Address Translation (NAT)

  • DHCP and DNS services


2. Switch

  • Function: Operates at Layer 2 (Data Link Layer), forwarding data frames between devices based on their MAC addresses.

  • Example: A switch in a corporate LAN directs traffic between computers, printers, and servers.

Features:

  • Reduces network congestion by directing traffic only to the intended recipient.

  • Managed Switches offer advanced features like VLANs and port mirroring.


3. Firewall

  • Function: Acts as a barrier between a trusted internal network and untrusted external networks, filtering traffic based on predefined rules.

  • Example: A corporate firewall blocks unwanted incoming traffic and allows specific outgoing connections.

Types:

  • Hardware Firewall: Dedicated devices like FortiGate.

  • Software Firewall: Software like Windows Defender Firewall.


4. Modem

  • Function: Modulates and demodulates digital data to enable communication over telephone lines or cable.

  • Example: A cable modem allows internet access by converting your ISP's signal into a usable format.


5. Access Point (AP)

  • Function: Extends a wired network to allow wireless devices to connect, creating a Wi-Fi hotspot.

  • Example: A Wi-Fi access point in an office provides internet access for laptops and smartphones.


6. Proxy Server

  • Function: A server that forwards requests from clients to another server, often used to hide the client’s identity or filter traffic.

  • Example: Proxies are used in corporate networks to cache content and block malicious websites.

Benefits:

  • Content Filtering: Restricts access to harmful or non-business-related websites.

  • Anonymity: Hides the client's IP address.


Network Architectures

Network architecture refers to the structure and design of a network, outlining how devices and resources are connected and how data flows between them.


Common Network Architectures

Architecture

Description

Use Case

Client-Server

A centralized server provides resources or services to multiple clients

Enterprise applications

Peer-to-Peer (P2P)

Devices communicate directly, without a central server

File sharing (e.g., BitTorrent)

Mesh

Devices are interconnected with multiple paths for data

Mission-critical IoT networks

Star

All devices are connected to a central hub or switch

Home Wi-Fi network

Bus

Devices are connected to a single communication line (bus)

Early LAN configurations

Ring

Devices are connected in a closed loop, and data travels in one direction

Legacy token ring networks

Hybrid

A combination of two or more network architectures

Corporate networks with multiple segments


Client-Server Architecture: Most Common in Enterprises

How It Works

  • Client devices (laptops, desktops, etc.) request services or resources.

  • Server provides centralized services like file storage, database access, or authentication.

Benefits:

  • Centralized management of resources.

  • Enhanced security with controlled access.

  • Scalability for growing networks.


Peer-to-Peer (P2P) Architecture: Decentralized

How It Works

  • Every device (node) acts both as a client and a server, sharing resources directly.

Example: File-sharing services like BitTorrent allow users to share files directly without centralized servers.

Benefits:

  • Easy to set up with minimal infrastructure.

  • Resilient since there’s no single point of failure.

  • Ideal for small networks or file-sharing systems.


Network Topologies

Topology

Description

Star

Devices are connected to a central hub/switch, and failure in one node does not affect others

Bus

All devices share a common communication line; a failure in the main line brings down the network

Ring

Devices are connected in a closed loop, and data passes through each node

Mesh

Devices are interconnected, providing multiple paths for data


Network Device Security

1. Router Security

  • Use strong passwords and change default settings.

  • Enable firewall features to filter traffic.

  • Keep the firmware updated to patch vulnerabilities.

2. Switch Security

  • Use VLANs to segment network traffic.

  • Disable unused ports to prevent unauthorized access.

  • Implement MAC address filtering.

3. Firewall Security

  • Regularly review and update firewall rules.

  • Enable intrusion detection/prevention systems (IDS/IPS).


Securing Network Architectures

1. Client-Server Security

  • Use authentication protocols like Kerberos or LDAP.

  • Apply encryption for data-in-transit using SSL/TLS.

2. P2P Network Security

  • Ensure end-to-end encryption for data exchange.

  • Implement trust systems to verify peers in the network.


Advanced Network Architectures

Software-Defined Networking (SDN)

  • What: SDN decouples the network control plane from the data plane, allowing centralized management of network behavior via software.

Benefits:

  • Improved network automation and flexibility.

  • Easier to manage large-scale networks and implement policies.

Network Function Virtualization (NFV)

  • What: Replaces traditional network devices with software running on commodity hardware.

Benefits:

  • Reduces the need for expensive proprietary hardware.

  • Allows rapid deployment of network services.


Resources for Further Learning

  1. Networking Guides


Key Takeaways

  • Network devices such as routers, switches, and firewalls are fundamental for building any network.

  • Understanding network architectures like client-server and peer-to-peer helps in designing efficient and secure networks.

  • Emerging technologies like SDN and NFV offer more flexibility and scalability in modern networking.

  • Securing network devices and architectures is critical for maintaining the integrity and availability of a network.


PreviousDNS and DNS SecurityNextVPNs and Secure Tunnels

Last updated 8 months ago

Cisco Learning Network: Networking Basics

Network Security Best Practices by Palo Alto

SDN Architecture by Open Networking Foundation

Cisco Networking
Palo Alto Networks Guide
ONF SDN Architecture
https://github.com/facyber/awesome-networking