Monday, March 8, 2021

Exploring Computer Network Architecture

 How Network Architecture Relates to Concepts

            Network architecture is one of the fundamental concepts of information technology and computer science. It refers to how network devices and services are built to meet user’s devices’ needs (Cisco, n.d.). The history of computers dates back to the 1900s, where they originated from telephone switches using ones (on) and zeros (off) (Lysecky & Vahid, 2017). Through time, network architecture has evolved into smaller components, which consequently involved increasing its functionality. From the 19th-century French silk weaver and inventor Joseph Marie Jacquard to the 20th-century American inventor and creator of the punched card tabulating machine Herman Hollerith and beyond, the evolution of computer network architecture is a significant component of information technology and computing history (Lysecky & Vahid, 2017). Additionally, the combinations of multiple inventions led to the network architecture that we see today. The world has become increasingly reliant on computer connections, including accessing the web and is the fundamental concept behind network architecture. By understanding this technological topic, we see that it is vital to how information technology operates and communicates, as well as demonstrates the maintenance and evolution of computer science.

Hardware and Functions

               The major hardware components and functions of a modern computer system serve as the foundation for any network architecture. These two aspects are analogous to a child and a parent, where the child needs the parent to grow and survive. Some of the major hardware components of a computer include the central processing unit, memory, keyboard, and screen (Lysecky & Vahid, 2017). The interactions between these components allow a computer to function and serve a purpose. Further, the concept of computational thinking for computers is the foundational application of providing instructions to computers to perform a function. Some common functions of computers include word processing, performing calculations, storing data, sending data, and retrieving data. Without the building blocks of computer hardware and functions, network architecture would cease to exist. For example, using a basic home network consisting of a PC, router, modem, internet service provider, and the internet, there is a need for hardware and functions to process and connect to these other devices. Using a set of instructions on the interface of a computer, we can tell a computer how to connect to other devices and consequently request it to perform other functions. A common function utilized today is requesting access and information from a website to be displayed on your machine. While this is a fundamental understanding of how computer hardware and functions operate, it is an integral piece to the puzzle.

Programming Languages and Program Execution Methods

               While the underlying binary machine language allows a computer to execute a program’s instructions, the need for people to understand high-level languages in the IT industry is ever increasing. Machine language on a computer can be thought of as 0’s and 1’s, making up a program or a program’s instructions. With this concept established, network infrastructure can begin to develop. High-level programming languages like Python, Perl, C, TCL, and Ansible aid in constructing and maintaining network architecture. For example, knowing Cisco’s Tool Command Language (TCL) increases a network architect’s ability to configure network devices and appliances. According to developer Jesus Vigo, “The scripting capabilities make short work of configuring devices that will essentially form the backbone of the network by routing traffic to/from devices/WAN [Wide Area Networks]” (2021, Para. 11). Furthermore, network architecture relies heavily on program execution methods. The two ways to execute programs from source code are interpreters and compilers. An interpreter reads a program line by line and translates it to the machine code before executing it. A compiler reads the whole program and translates it entirely before outputting it. The Operating System (OS) software and browsers help to read and act on a computer program’s instructions. By opening a browser, we ask the computer to perform a set of instructions to send packets through the network architecture. Similarly, additional access requests are sent when we type in a specific domain name. The programming languages and program execution methods are commonly integrated into our OS to configure and use the network architecture.

Application Software

               Application software plays an enormous role within the network architecture topic. Most software requires routine maintenance, including upgrades and updates, which commonly require connection to an ISP or web server. The most common integration of application software with network architecture is computer network applications. Essentially, these are “…network software applications that utilize the Internet or other network hardware infrastructure to perform useful functions…” (Kamau, 2021, Para. 2). Two of the most common pure network applications are email programs and File Transfer Protocol (FTP). These network applications allow messages and files to be transferred between computers on a network, respectively. Most applications require an established connection between computing devices to communicate and share resources. While some programs can run indefinitely without some sort of network architecture, that is not common practice and will quickly become outdated as software applications evolve.

Database and Database Management

               Network architecture can be applied to the basic concepts of database and database management. According to the course text, “A database is a collection of data organized to enable efficient information retrieval” (Lysecky & Vahid, 2017, Sec. 5.4). Database management is commonly done through apps that create, maintain, and access database systems. It is intuitive to think about how network architecture coincides with these basic concepts. There must be hardware and software components that connect computing devices together to manage and retrieve information from a database. For example, my company utilizes NSA’s databases to gather information of differing varieties. My company’s network architecture allows me to connect to and access the network server that holds that information. While I cannot manage that data, I can still access it and use it for analytical processing. The hardware and software components that make up the intranet network allow the ability to push and pull requests to the database on the network server, which in turn allows me to complete the requirements for my job.

Network Architecture, Management, and Security Influence

               The basic concepts of network architecture, management, and security influence computer network architecture in a few ways. The basic understanding of what is needed in a network architecture influences how computers are networked. The basics include the “…hardware components used for communication, cabling and device types, network layout and topologies, physical and wireless connections, implemented areas and future plans” (Techopedia, n.d., Para. 1). The framework needs to be established to build on the complexity of a computer network. On the other hand, management is necessary for computer network architecture to ensure reliable connectivity between computing devices. A Network Management System (NMS) can execute applications that control and monitor devices. A typical network management protocol is the Simple Network Management Protocol (SNMP), a widely used standard in network management solutions (Cisco Press, 2008). The connectivity and flow of information between devices is an integral aspect of computer network architecture. Lastly, security affects every aspect of computers, especially network architecture. Computer security involves preventing unauthorized viewing, changing, or destroying of a computer or data (Lysecky & Vahid, 2017). Security influences network architecture in a variety of ways. Each hop in the network needs to be secure, along with the protocols that are being used. To prevent computer and data manipulation or destruction, a network administrator must be cautious when creating or altering the computer network. The evolution in technology and malware present newfound applications and vulnerabilities in a computer network’s architecture. This may influence what protocols, ports, software, hardware, and amount of money an individual or company will invest in their network. Networks, management, and security basics should be at the forefront of every system and network administrator’s mind.

References

Cisco. (n.d.). What is network architecture? Retrieved from https://www.cisco.com/c/en/us/solutions/enterprise-networks/what-is-network-architecture.html

Cisco Press. (2008, June 12). Structuring and modularizing the network with Cisco enterprise architecture. Retrieved from https://www.ciscopress.com/articles/article.asp?p=1073230&seq Num=4

Kamau, P. (2021, January 22). Applications of computer networks. TurboFuture - Technology. Retrieved from https://turbofuture.com/computers/Network-Application

Lysecky, S. & Vahid, F. (2017). Computing technology for all. Retrieved from zybooks.zyante.com/

Techopedia. (n.d.). What is network architecture? - Definition from Techopedia. Retrieved from https://www.techopedia.com/definition/8549/network-architecture

Vigo, J. (2021, January 5). 5 programming languages network architects should learn.                            TechRepublic. Retrieved from https://www.techrepublic.com/article/5-programming-languages- network-architects-should-learn/

No comments:

Post a Comment