Chapter 3: Common Network Toplogies and Infrastructures¶
Network Topologies¶
Star Topology¶
All devices connect to a central switch or hub
Traffic flows through the central device
Easy to manage and troubleshoot
Vulnerability: failure of the central device affects the entire network
Bus Topology¶
All devices share a single communication line
Simple and low cost
Traffic collisions increase as more devices are added
Vulnerability: break in the main cable disrupts all devices
Mesh Topology¶
Devices connect to multiple or all other devices
High redundancy and fault tolerance
Complex and expensive to implement
Common in mission-critical networks
IP and MAC Addresses¶
IP Address¶
Logical address assigned to a device
Used to identify devices across networks
Commonly viewed using
ipconfigand tested withping
MAC Address¶
Physical hardware address of a network interface
Used for local network communication
Mapped to IP addresses using
arp
De-Militarized Zone (DMZ)¶
Network segment exposed to external traffic
Hosts public-facing services such as web or DNS servers
Separated from the internal network by firewalls
Traffic is tightly controlled and monitored
Common focus during firewall and service analysis
Network Devices¶
Switch¶
Connects devices within the same local network
Uses MAC addresses to forward frames
Router¶
Connects multiple networks together
Routes traffic using IP addresses
Often performs NAT and subnetting
Firewall¶
Filters traffic based on security rules
Protects internal networks from unauthorized access
Controls access to the DMZ
Key Concepts¶
Subnetting: dividing networks into smaller logical segments
Logical Topology: how data flows through a network
Client/Server Networks: centralized servers provide services to clients
Purpose of This Chapter¶
This chapter explains why tools like Zenmap and Wireshark are used to analyze network structure, traffic flow, and exposed services in virtual environments.