How Network Architecture Relates to Concepts
Network architecture is one of the fundamental concepts of information technology and computer science. It refers to how network devices and services are built to meet user’s devices’ needs (Cisco, n.d.). The history of computers dates back to the 1900s, where they originated from telephone switches using ones (on) and zeros (off) (Lysecky & Vahid, 2017). Through time, network architecture has evolved into smaller components, which consequently involved increasing its functionality. From the 19th-century French silk weaver and inventor Joseph Marie Jacquard to the 20th-century American inventor and creator of the punched card tabulating machine Herman Hollerith and beyond, the evolution of computer network architecture is a significant component of information technology and computing history (Lysecky & Vahid, 2017). Additionally, the combinations of multiple inventions led to the network architecture that we see today. The world has become increasingly reliant on computer connections, including accessing the web and is the fundamental concept behind network architecture. By understanding this technological topic, we see that it is vital to how information technology operates and communicates, as well as demonstrates the maintenance and evolution of computer science.
Hardware and Functions
The
major hardware components and functions of a modern computer system serve as
the foundation for any network architecture. These two aspects are analogous to
a child and a parent, where the child needs the parent to grow and survive. Some
of the major hardware components of a computer include the central processing
unit, memory, keyboard, and screen (Lysecky & Vahid, 2017). The
interactions between these components allow a computer to function and serve a purpose.
Further, the concept of computational thinking for computers is the
foundational application of providing instructions to computers to perform a
function. Some common functions of computers include word processing, performing
calculations, storing data, sending data, and retrieving data. Without the
building blocks of computer hardware and functions, network architecture would
cease to exist. For example, using a basic home network consisting of a PC,
router, modem, internet service provider, and the internet, there is a need for
hardware and functions to process and connect to these other devices. Using a
set of instructions on the interface of a computer, we can tell a computer how
to connect to other devices and consequently request it to perform other
functions. A common function utilized today is requesting access and
information from a website to be displayed on your machine. While this is a
fundamental understanding of how computer hardware and functions operate, it is
an integral piece to the puzzle.
Programming Languages and Program Execution Methods
While
the underlying binary machine language allows a computer to execute a program’s
instructions, the need for people to understand high-level languages in the IT
industry is ever increasing. Machine language on a computer can be thought of
as 0’s and 1’s, making up a program or a program’s instructions. With this
concept established, network infrastructure can begin to develop. High-level
programming languages like Python, Perl, C, TCL, and Ansible aid in constructing
and maintaining network architecture. For example, knowing Cisco’s Tool Command
Language (TCL) increases a network architect’s ability to configure network
devices and appliances. According to developer Jesus Vigo, “The scripting capabilities
make short work of configuring devices that will essentially form the backbone
of the network by routing traffic to/from devices/WAN [Wide Area Networks]” (2021,
Para. 11). Furthermore, network architecture relies heavily on program
execution methods. The two ways to execute programs from source code are
interpreters and compilers. An interpreter reads a program line by line and
translates it to the machine code before executing it. A compiler reads the
whole program and translates it entirely before outputting it. The Operating
System (OS) software and browsers help to read and act on a computer program’s
instructions. By opening a browser, we ask the computer to perform a set of
instructions to send packets through the network architecture. Similarly,
additional access requests are sent when we type in a specific domain name. The
programming languages and program execution methods are commonly integrated
into our OS to configure and use the network architecture.
Application Software
Application
software plays an enormous role within the network architecture topic. Most
software requires routine maintenance, including upgrades and updates, which
commonly require connection to an ISP or web server. The most common integration
of application software with network architecture is computer network applications.
Essentially, these are “…network software applications that utilize the
Internet or other network hardware infrastructure to perform useful functions…”
(Kamau, 2021, Para. 2). Two of the most common pure network applications are
email programs and File Transfer Protocol (FTP). These network applications allow
messages and files to be transferred between computers on a network,
respectively. Most applications require an established connection between
computing devices to communicate and share resources. While some programs can
run indefinitely without some sort of network architecture, that is not common
practice and will quickly become outdated as software applications evolve.
Database and Database Management
Network
architecture can be applied to the basic concepts of database and database
management. According to the course text, “A database is a collection of data
organized to enable efficient information retrieval” (Lysecky & Vahid,
2017, Sec. 5.4). Database management is commonly done through apps that create,
maintain, and access database systems. It is intuitive to think about how
network architecture coincides with these basic concepts. There must be
hardware and software components that connect computing devices together to
manage and retrieve information from a database. For example, my company
utilizes NSA’s databases to gather information of differing varieties. My
company’s network architecture allows me to connect to and access the network
server that holds that information. While I cannot manage that data, I can
still access it and use it for analytical processing. The hardware and software
components that make up the intranet network allow the ability to push and pull
requests to the database on the network server, which in turn allows me to
complete the requirements for my job.
Network Architecture, Management, and Security Influence
The
basic concepts of network architecture, management, and security influence
computer network architecture in a few ways. The basic understanding of what is
needed in a network architecture influences how computers are networked. The
basics include the “…hardware components used for communication, cabling and
device types, network layout and topologies, physical and wireless connections,
implemented areas and future plans” (Techopedia, n.d., Para. 1). The framework
needs to be established to build on the complexity of a computer network. On
the other hand, management is necessary for computer network architecture to
ensure reliable connectivity between computing devices. A Network Management
System (NMS) can execute applications that control and monitor devices. A typical
network management protocol is the Simple Network Management Protocol (SNMP), a
widely used standard in network management solutions (Cisco Press, 2008). The
connectivity and flow of information between devices is an integral aspect of computer
network architecture. Lastly, security affects every aspect of computers,
especially network architecture. Computer security involves preventing
unauthorized viewing, changing, or destroying of a computer or data (Lysecky
& Vahid, 2017). Security influences network architecture in a variety of
ways. Each hop in the network needs to be secure, along with the protocols that
are being used. To prevent computer and data manipulation or destruction, a
network administrator must be cautious when creating or altering the computer
network. The evolution in technology and malware present newfound applications and
vulnerabilities in a computer network’s architecture. This may influence what
protocols, ports, software, hardware, and amount of money an individual or
company will invest in their network. Networks, management, and security basics
should be at the forefront of every system and network administrator’s mind.
References
Cisco.
(n.d.). What is network architecture? Retrieved from https://www.cisco.com/c/en/us/solutions/enterprise-networks/what-is-network-architecture.html
Cisco
Press. (2008, June 12). Structuring and modularizing the network with
Cisco enterprise architecture. Retrieved from https://www.ciscopress.com/articles/article.asp?p=1073230&seq
Num=4
Kamau, P.
(2021, January 22). Applications of computer networks. TurboFuture
- Technology. Retrieved from https://turbofuture.com/computers/Network-Application
Lysecky, S. & Vahid, F. (2017). Computing
technology for all. Retrieved from zybooks.zyante.com/
Techopedia.
(n.d.). What is network architecture? - Definition from Techopedia. Retrieved
from https://www.techopedia.com/definition/8549/network-architecture
Vigo, J. (2021, January 5). 5 programming languages network architects should learn. TechRepublic. Retrieved from https://www.techrepublic.com/article/5-programming-languages- network-architects-should-learn/
No comments:
Post a Comment