0% found this document useful (0 votes)
34 views20 pages

Network Architecture Essentials

The document provides an in-depth overview of network architecture including OSI and TCP/IP models, common protocols, WLAN standards, and wireless security. It covers topics such as the layers of the OSI model, TCP/IP model, protocols like TCP, UDP, IP and ICMP, WLAN standards 802.11a-ax, and wireless security protocols WPA, WPA2, and WPA3.

Uploaded by

mahdiyanjoo8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views20 pages

Network Architecture Essentials

The document provides an in-depth overview of network architecture including OSI and TCP/IP models, common protocols, WLAN standards, and wireless security. It covers topics such as the layers of the OSI model, TCP/IP model, protocols like TCP, UDP, IP and ICMP, WLAN standards 802.11a-ax, and wireless security protocols WPA, WPA2, and WPA3.

Uploaded by

mahdiyanjoo8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Unveiling the Inner Workings

of Network Architecture: A
Comprehensive Exploration
of OSI and TCP/IP Models,
Common Protocols, WLAN
Standards, and Wireless
Security
Introduction
Welcome to the comprehensive
exploration of OSI and TCP/IP
models, common protocols, WLAN
standards, and wireless security. This
presentation will provide an in-depth
understanding of the inner workings
of network architecture.
OSI Model Overview
The OSI model is a fundamental
framework for understanding
network architecture. It consists of
seven layers, each responsible for
specific functions. This section will
delve into the purpose and
interactions of each layer, providing a
holistic view of network
communication.
A three-way handshake is also known as a TCP handshake or SYN-SYN-ACK, and requires both the client and server
to exchange SYN (synchronization) and ACK (acknowledgment) packets before actual data communication begins
TCP/IP Model
Demystified
The TCP/IP model is the foundation
of modern internet communication.
This segment will unravel the
intricacies of the model,
emphasizing its role in packet-
switched networks and its
relationship to the OSI model.
Understanding the TCP/IP model is
crucial for grasping network
architecture.
Common Protocols
Numerous protocols facilitate
communication within networks.
This slide will explore essential
protocols such as TCP, UDP, IP, and
ICMP, shedding light on their
distinct functionalities and
contributions to data transmission.
A solid grasp of these protocols is
vital for network engineers.
1. Secure Shell (SSH)
- TCP
- Port: 22
- SSH is a cryptographic network protocol for operating network services securely over an unsecured network.

2. Simple Mail Transfer Protocol (SMTP)


- TCP
- Port: 25 (unencrypted), 465 (SSL/TLS), or 587 (STARTTLS)
- SMTP is used to send and receive email.

3. Network Time Protocol (NTP)


- UDP
- Port: 123
- NTP is used to synchronize the time on computer systems.

4. File Transfer Protocol (FTP)


- TCP
- Port: 20 (data transfer), 21 (control)
- FTP is used for transferring files between a client and a server on a computer network.

5. Hypertext Transfer Protocol (HTTP)


- TCP
- Port: 80
- HTTP is the foundation of data communication for the World Wide Web.
6. Domain Name System (DNS)
- UDP and TCP
- Port: 53
- DNS is used to translate domain names to IP addresses.

7. Remote Desktop Protocol (RDP)


- TCP
- Port: 3389
- RDP allows a user to control a computer from another location.

8. Simple Network Management Protocol (SNMP)


- UDP and TCP
- Port: 161 (SNMP) and 162 (SNMP Trap)
- SNMP is used for remote management and monitoring of network devices.

9. Virtual Network Computing (VNC)


- TCP
- Port: 5900
- VNC is a graphical desktop-sharing system that uses the Remote Frame Bu er protocol to remotely control
another computer.
1. A (Address) Records: Maps a host name to an IPv4 address.

2. AAAA (IPv6 Address) Records: Maps a host name to an IPv6 address.

3. CNAME (Canonical Name) Records: Alias or canonical name for a host or domain.

4. MX (Mail Exchange) Records: Specifies the mail server responsible for receiving email on behalf of the domain.

5. TXT (Text) Records: Contains arbitrary text and can be used for various purposes such as SPF records for email
validation.

6. NS (Name Server) Records: Specifies the authoritative name servers for the domain.

7. SOA (Start of Authority) Records: Contains authoritative information about a DNS zone, including the primary
name server, the email of the domain administrator, the domain serial number, etc.
10. DHCP (Dynamic Host Configuration Protocol) server

- UDP port 67 on the server side and UDP port 68 on the


client side
1. Connection to LAN: When the device is connected to the LAN, it sends out a broadcast message called a
DHCPDISCOVER to discover a DHCP server.

2. DHCP Server Identification: If there’s a DHCP server on the network, it will reply with a DHCPOFFER, o ering
an IP address for the device to use.

3. IP Assignment: The device then sends a DHCPREQUEST message, confirming the IP address it wants to use.
If the device doesn’t find a DHCP server, it can assign itself an APIPA (Automatic Private IP Addressing) address
in the range of [Link] to [Link]. This enables the device to communicate with other devices on
the local network, but not outside of it.
WLAN Standards
Wireless Local Area Network (WLAN)
standards play a pivotal role in
modern connectivity. This section
will examine standards like IEEE
802.11, elucidating their impact on
wireless communication and the
evolution of Wi-Fi technology.
Understanding WLAN standards is
crucial in the era of wireless
dominance.
1. 802.11a:
-It operates in the 5 GHz frequency range and provides a maximum theoretical speed of 54 Mbps.

2. 802.11b:
-This protocol operates in the 2.4 GHz frequency range and o ers a maximum theoretical speed of 11 Mbps.

3. 802.11g:
-Operating in the 2.4 GHz frequency range, this protocol o ers a maximum theoretical speed of 54 Mbps.

4. 802.11n:
-Also known as Wi-Fi 4, this protocol operates in both the 2.4 GHz and 5 GHz frequency bands, providing
maximum theoretical speeds of 300 Mbps to 600 Mbps.

5. 802.11ac:
-Also known as Wi-Fi 5, operates exclusively in the 5 GHz frequency band and supports speeds of up to 3.47
Gbps.

6. 802.11ax (Wi-Fi 6):


-This protocol operates in both the 2.4 GHz and 5 GHz frequency bands and o ers improved performance in
dense environments, with maximum theoretical speeds of 9.6 Gbps.

7. 802.11ae (Wi-Fi 6E):


-This is an extension of Wi-Fi 6 that operates in the 6 GHz frequency band, providing additional bandwidth and
reduced interference for devices.
Wireless Security Essentials

Securing wireless networks is paramount


in the digital age. This slide will delve into
WPA, WPA2, and WPA3, elucidating their
significance in protecting data and
thwarting unauthorized access.
Understanding wireless security is essential
for safeguarding sensitive information.
1. WPA:
- WPA was introduced as a replacement for the vulnerable WEP (Wired Equivalent Privacy) protocol. - It uses the
TKIP (Temporal Key Integrity Protocol) encryption protocol and RC4 encryption algorithm. - WPA employs a pre-
shared key (PSK) for authentication, commonly known as WPA-PSK. - It’s vulnerable to some security weaknesses
and attacks.

2. WPA2:
- WPA2 improved upon WPA’s security by implementing the more secure AES (Advanced Encryption Standard)
encryption algorithm. - WPA2 supports both personal and enterprise modes of authentication and incorporates
additional security features to counter known attacks on WPA.

3. WPA3:
- WPA3 is the most recent and secure protocol, addressing the weaknesses in WPA2. - It provides stronger
protections for simple passwords, maintains user privacy through individualized data encryption, and simplifies
the process of configuring security for devices that have limited or no display interface. - WPA3 also provides
additional protections for networks with higher security requirements, such as government, defense, and
industrial.
Network Architecture
Best Practices
Implementing best practices is
crucial for optimizing network
architecture. This segment will
highlight redundancy, scalability,
and fault tolerance, emphasizing
their role in ensuring reliable and
efficient network operations.
Adhering to best practices is vital for
network stability.
Performance Optimization
Enhancing network performance is a
continuous endeavor. This slide will
explore strategies such as QoS,
bandwidth management, and traffic
prioritization, illuminating their
impact on streamlining data flow and
improving user experience.
Optimizing performance is integral to
network efficiency.
Cybersecurity Considerations

Amid escalating cyber threats,


cybersecurity is a paramount concern. This
segment will underscore the importance of
firewalls, intrusion detection systems, and
encryption in fortifying network security.
Addressing cybersecurity considerations is
imperative in safeguarding sensitive data.
Thanks!
Do you have any
questions?
mahdiyanjooali@[Link]
+989190711510
@sudo_apt_get_install_coffee

You might also like