# Network components, devices, and diagrams

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">In this section of the course, you will learn about network architecture. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Once you have a foundational understanding of network architecture, sometimes referred to as network design, you will learn about security vulnerabilities inherent in all networks and how malicious actors attempt to exploit them. In this reading, you will review network devices and connections and investigate a simple network diagram similar to those used every day by network security professionals. Essential tasks of a security analyst include setting up the tools, devices, and protocols used to observe and secure network traffic. </span>

## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Devices on a network</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Network devices are the devices that maintain information and services for users of a network. These devices connect over wired and wireless connections. After establishing a connection to the network, the devices send data packets. The data packets provide information about the source and the destination of the data.</span>

<div class="rc-CML" dir="auto" id="bkmrk-" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-1k5v0wb" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><figure contenteditable="false" role="figure" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: block; margin: 0px !important;">![A network diagram displaying how different devices are connected to an internal network](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/URorDIh9TNiq7e481RWHmQ_85911828bd7c43b38761dd2b520e8df1_CS_R-041_-Edited-S34G001-1-.png?expiry=1687996800000&hmac=S_FRskfoTz5n1GqzIJ5uFab8Tr6mZVht7Uf85MA5Q3k)</figure></div></div></div></div></div></div></div>### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Devices and desktop computers** </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Most internet users are familiar with everyday devices, such as personal computers, laptops, mobile phones, and tablets. Each device and desktop computer has a unique MAC address and IP address, which identify it on the network, and a network interface that sends and receives data packets. These devices can connect to the network via a hard wire or a wireless connection.</span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Firewalls**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A </span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**firewall**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> is a network security device that monitors traffic to or from your network. Firewalls can also restrict specific incoming and outgoing network traffic. The organization configures the security rules. Firewalls often reside between the secured and controlled internal network and the untrusted network resources outside the organization, such as the internet.</span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Servers** </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Servers provide a service for other devices on the network. The devices that connect to a server are called clients. The following graphic outlines this model, which is called the client-server model. In this model, clients send requests to the server for information and services. The server performs the requests for the clients. Common examples include DNS servers that perform domain name lookups for internet sites, file servers that store and retrieve files from a database, and corporate mail servers that organize mail for a company. </span>

<div class="rc-CML" dir="auto" id="bkmrk--1" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-1k5v0wb" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><figure contenteditable="false" role="figure" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: block; margin: 0px !important;">![A client server model showing three client devices sending requests and receiving responses from a database server.](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/FI4hBJhWTEyWNXoKI9EgsA_5a3867623fe5482aa3cb88b2e17fd3f1_m11tx1zMlcjG_2VzVR5QC6doDnVW9U6b0n04lmDZCi1BdjEjt-owNV78CEYLQeX_OoblVT1iYfESmwKKY7KkWUA-CB_bQXn--BroYC9c6GVbiZT1DJimU5CCOfNOz8HTQJUVivm8pNKK7NHRzv3W9INsegVffLpT23LJ2sXvgAdmHUwchtuJksNQwLqw70E?expiry=1687996800000&hmac=yFMOhyzJY_0foCaPGyKAOH9imF-P0SyVUZUwB-Qk43Q)</figure></div></div></div></div></div></div></div>### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Hubs and switches**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Hubs and switches both direct traffic on a local network. A hub is a device that provides a common point of connection for all devices directly connected to it. Hubs additionally repeat all information out to all ports. From a security perspective, this makes hubs vulnerable to eavesdropping. For this reason, hubs are not used as often on modern networks; most organizations use switches instead. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A switch forwards packets between devices directly connected to it. It maintains a MAC address table that matches MAC addresses of devices on the network to port numbers on the switch and forwards incoming data packets according to the destination MAC address.</span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Routers**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Routers sit between networks and direct traffic, based on the IP address of the destination network. The IP address of the destination network is contained in the IP header. The router reads the header information and forwards the packet to the next router on the path to the destination. This continues until the packet reaches the destination network. Routers can also include a firewall feature that allows or blocks incoming traffic based on information in the transmission. This stops malicious traffic from entering the private network and damaging the local area network. </span>

### <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Modems and wireless access points**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Modems**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Modems usually interface with an internet service provider (ISP). ISPs provide internet connectivity via telephone lines or coaxial cables. Modems receive transmissions from the internet and translate them into digital signals that can be understood by the devices on the network. Usually, modems connect to a router that takes the decoded transmissions and sends them on to the local network. </span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Note:**</span><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"> Enterprise networks used by large organizations to connect their users and devices often use other broadband technologies to handle high-volume traffic, instead of using a modem. </span>

<div class="rc-CML" dir="auto" id="bkmrk--2" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-1k5v0wb" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><figure contenteditable="false" role="figure" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: block; margin: 0px !important;">![A modem converting data from the internet, connecting to a Wi-Fi router](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/5cpm9ICmSJCX3MLFfqT6kw_a636fcf868104322ad316bc98fabc3f1_S34G002.png?expiry=1687996800000&hmac=JHPlbqP7s2ow8VWpPx7QjVEWEynB0dZq0kyZLSFJa_o)</figure></div></div></div></div></div></div></div><span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">**Wireless access point**</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">A wireless access point sends and receives digital signals over radio waves creating a wireless network. Devices with wireless adapters connect to the access point using Wi-Fi. Wi-Fi refers to a set of standards that are used by network devices to communicate wirelessly. Wireless access points and the devices connected to them use Wi-Fi protocols to send data through radio waves where they are sent to routers and switches and directed along the path to their final destination.</span>

<div class="rc-CML" dir="auto" id="bkmrk--3" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-1k5v0wb" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><figure contenteditable="false" role="figure" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: block; margin: 0px !important;">![A wireless access point connected to wired and wireless devices on a network](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/dI_SIruhQeuOZZVnzI6fmA_36c5e1379c0f4990a6fe0ac0c27763f1_S34G003.png?expiry=1687996800000&hmac=F1xtytsIPbbPCiVmETZNYydxeoSqQlSrGlAD9AAi838)</figure></div></div></div></div></div></div></div>## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Using network diagrams as a security analyst</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Network diagrams allow network administrators and security personnel to imagine the architecture and design of their organization’s private network.</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Network diagrams are topographical maps that show the devices on the network and how they connect. Network diagrams use small representative graphics to portray each network device and dotted lines to show how each device connects to the other. Security analysts use network diagrams to learn about network architecture and how to design networks. </span>

<div class="rc-CML" dir="auto" id="bkmrk--4" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div class="rc-CML" dir="auto" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; color: rgb(31, 31, 31); font-family: OpenSans, Arial, sans-serif; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml" data-track-page="item_layout" role="presentation" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="cml_link" data-track-page="item_layout" style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><div class="css-1k5v0wb" data-testid="cml-viewer" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; white-space: pre-wrap; overflow-wrap: break-word;"><div style="box-sizing: border-box; -webkit-font-smoothing: antialiased;"><figure contenteditable="false" role="figure" style="box-sizing: border-box; -webkit-font-smoothing: antialiased; display: block; margin: 0px !important;">![A router connecting to two firewalls and creating two separate security zones](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/tj5DFJGVQDuBAxqnZ_AL2w_418d88f79e794c3082881500887fa7f1_CS_R-041_-Edited-S34G004.png?expiry=1687996800000&hmac=o6UMk_OJtkm4l2LYAdCBKwpFnLGJGsmVeE4lYqq1_Ds)</figure></div></div></div></div></div></div></div>## <span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">Key takeaways</span>

<span style="box-sizing: border-box; -webkit-font-smoothing: antialiased;">In the client-server model, the client requests information and services from the server, and the server performs the requests for the clients. Network devices include routers, workstations, servers, hubs, switches, and modems. Security analysts use network diagrams to visualize network architecture.</span>