VAPT
VAPT
Introduction to Topologies:
Network Topology is the schematic description of a network Arrangement,
connecting various nodes (sender and receiver) through Lines of connection.
Visualizing different network structures can help clarify how various types of networks
operate and their relationships to one another. Here’s a breakdown of Local Area Networks
(LANs) and Wide Area Networks (WANs), using a home network and the internet.
1
Introduction to Computer Networks, OSI Model, and Network Security Fundamentals.
Figure 1: LAN
Internet Example:
Components:
Visualization:
| |
| |
[Devices] [Devices]
2
Introduction to Computer Networks, OSI Model, and Network Security Fundamentals.
Figure1.1: WAN
Comparison:
1. Geographical Scope:
3. Ownership:
4. Use Cases:
Conclusion:
Understanding the differences between LANs and WANs, as well as their respective
components and structures, is crucial for grasping how networks function in various
contexts. A home network is a practical example of a LAN, while the internet serves as a
vast WAN connecting millions of such networks worldwide. In these ways there are many
such network differences between WANs and MANs, LANs and PANs, MANs and PANs
etc.
3
Introduction to Computer Networks, OSI Model, and Network Security Fundamentals.
Network Topologies:
It is the way devices are connected in a network. It defines how these components are
connected and how data transfer between the networks.
1. Star Topology
In a star topology, all devices (nodes) are connected to a central hub or switch. Each node
has a dedicated connection to the hub.
Real-World Applications:
Home Networks: Many home networks use a star topology with a router as the
central hub, connecting various devices like computers, printers, and smart home
devices.
2. Bus Topology
In a bus topology, all devices share a single communication line (the bus). Data travels in
both directions along the bus.
Real-World Applications:
Small Networks: Suitable for small networks where the number of devices is
limited, such as in small offices or classrooms.
3. Ring Topology
In a ring topology, each device is connected to two other devices, forming a circular
pathway for data. Data travels in one direction (or both in a dual-ring setup).
Real-World Applications:
Token Ring Networks: Historically used in local area networks (LANs) with
Token Ring technology, which was popular in the 1980s and 1990s.
5
Introduction to Computer Networks, OSI Model, and Network Security Fundamentals.
4. Mesh Topology
In a mesh topology, each device is connected to multiple other devices, allowing for
multiple pathways for data to travel.
Real-World Applications:
Data Centers: Employed in data centers for redundancy and fault tolerance,
ensuring that if one connection fails, data can still be routed through other paths.
5. Tree Topology
A hybrid topology that combines characteristics of star and bus topologies. It has a
hierarchical structure with a root node and various levels of connected nodes.
Real-World Applications:
6
Introduction to Computer Networks, OSI Model, and Network Security Fundamentals.
6. Hybrid Topology
A combination of two or more different topologies, allowing for flexibility and scalability.
Real-World Applications:
Figure2.6: WAN
Conclusion
Each topology has its strengths and weaknesses, making them suitable for specific
applications. The choice of topology often depends on factors such as the size of the
network, the required performance, budget constraints, and the specific needs of the
organization or application.
7
Introduction to Computer Networks, OSI Model, and Network Security Fundamentals.
Title: O S I M o d e l
Layer 7
Application Layer
(e.g., HTTP, FTP)
Layer 6
Presentation Layer
(e.g., SSL, TLS)
Layer 5
Session Layer
(e.g., APIs)
Layer 4
Transport Layer
(e.g., TCP, UDP)
8
Introduction to Computer Networks, OSI Model, and Network Security Fundamentals.
Layer 3
Network Layer
(e.g., IP)
Layer 2
Data Link Layer
(e.g., Ethernet)
Layer 1
Physical Layer
(e.g., Cables, Hubs, Switches)
9
Introduction to Computer Networks, OSI Model, and Network Security Fundamentals.
Security measures include encryption and secure transport protocols like TLS.
Security measures involve input validation, firewalls, and application security testing.
10