Understanding How Basic Network Structure Works
In my previous article, I have looked at all that we need to know about network architecture for organisations. I have also mentioned in that article that we have switched and hubs that can be used to connect devices together. In this article, I want to look at the basic network structure for organisations. Follow me as we look at this together in this article.
Some connections must exist between your network and the outside world. A barrier is set up between the network and the outside world. This is usually in the form of a firewall. the real essence of the network is communication allowing one machine to communicate with another.
As good as a network is, they are also the avenue for attacks. Hackers can use those channels to attack networks.
I have also said it in my previous article that the best way in understanding a network is to know how computers communicate over a network. Network Interface Card, routers, hubs, and firewalls are the fundamental piece of a network. The way they are connected and the format they use for communication is what we can refer to as the network architecture.
After you might have established a network connection with the network you would like to connect with, you need to send data to that network. Before you send such data, you need to identify the network you are trying to send data to. All computers on the network, as well as the routers and the switches, has an IP address. It is a series of numbers between 0 and 255 and it is separated by periods such as 10.10.10.10.
The second part of that transmission is to format the data for transmission. All the data that will be transferred are in binary 0s and 1s. The binary data are not enclosed in a packet that will be sent to the receiving device.
The first few bytes are called the header. That header tells where the packet is going, where it comes from and how many packets are coming in. We have many types of headers but we will focus on one for now.
Anytime a hacker tries to attack your network, he will try to change the header of the sent packet in order to give false information. At times, hackers might try to intercept or read the content of the data in order to compromise the packet.
A Packet can have multiple headers, in fact, most packets will have at least three headers. The IP header has information about the source and the destination IP addresses. It also has information about what protocol packet carries.
The ethernet header or layer 2 header has information about the source and the destination mac addresses. If a packet, for example, is encrypted with Transport Layer Security, the packet might also have a TLS header.
Now your take on this argument.
We would also like to hear what you feel about the topic we discussed today. Your feedback is very important to us. Feel free to drop your comments and recommendations. If you have a contrary opinion, you can drop that too.
You can also like our Facebook Page CRMNigeria for more updates. You can do that by clicking on the link or searching for our page on Facebook.
You can also become part of our WhatsApp Group Here.
Enter your email address to get updates when we post our next article. you have to click on the link in the email sent to you to confirm your subscription. If you have been receiving our email updates and it is no longer active, please subscribe again.:
Delivered by FeedBurner
11 total views, 1 views today