How Network Architecture Relates to IT



How Network Architecture Relates to IT

A Light History About Networks and Computer Science.

We are surrounded by networks in the modern-day world. At its core, a network is two or more computers sharing a common connection (TestOut, 2024). They enable devices, systems, and users to connect, communicate, and share resources efficiently. Without networks, the cool tools and services that makeup IT wouldn’t exist.

The earliest networks were between businesses, governments, and universities because that’s who could afford the earliest computers. Governments used their computers to track records and to spy on other countries (TestOut, 2024; TestOut, n.d). The universities teamed up with businesses like IBM to build them; the Harvard Mark 1 actually helped the U.S. run simulations for the Manhattan Project (TestOut, n.d). They were big and heavy because they used vacuum tubes to calculate information (TestOut, n.d). Then, in 1947, Bell Laboratories invented the transistor to replace the vacuum tubes (TestOut, n.d). Replacing the tubes with transistors made computers smaller, but what truly paved the way for personal computers as we know them today was the microchip, invented by Jack Kilby in 1958 (TestOut, n.d). Microchips allowed developers to put the entire computer on a circuit board. Personal computers became popular in the late 70s, and the Internet became available to the public in the mid-90s with the World Wide Web (TestOut, n.d). The Internet is the biggest network in the world, and it’s how we all stay connected. Computer networks are not just a component of information technology; they are its foundation.

Major Hardware in a Network


Networks use different components to function, just like our computers. First, your computer needs to be connected to a router. A router is a stopping point for an information signal (TestOut, 2024). Router’s direct data to its next destination, and it repeats the signal strength (TestOut, 2024). Then, the switch inside the router sends the information on its way. If you’re using the Internet, the next destination for the signal is the modem. Modems modulate and demodulate data signals between your home and your Internet service provider (TestOut, 2024). Without a modem, your computer couldn’t read the signal coming from your Internet service provider. An optional addition to a network is a firewall. Firewalls control incoming and outgoing data, allowing only authorized packets of information to pass through it. Networks can be as small as a couple of computers or as large as an entire planet. Either way, they all function on these basic hardware components.

Network Programming

Just about everything in the field of information technology requires some level of programming. Network architecture is no different. To function properly, every network follows a set of protocols. Some you may already be familiar with such as HTTPS and HTTP. HTTP is the communication standard for servers on the World Wide Web (TestOut, 2024). HTTPS is just a more secure version because it encrypts the information sent back-and-forth (TestOut, 2024). DNS is another protocol you may not be so familiar with, but it is just as handy. We don’t need to remember the IP address of our favorite websites because DNS automatically does it for us (TestOut, 2024). Networks are always sending a lot of information back-and-forth, and they need to know what to do with it. Without protocols, data would get caught up in a compiled mess.

The Role of Software in Networks


Applications expand the uses and potential of a network. In the beginning, networks were only good for tracking, calculating, and stealing information. Fast-forward to 2025 and we have cloud computing and integrated workspaces. Applications like Google Drive allow people to collaborate on their work from a remote space. In other words, they don’t have to be in the same building to work on the same project. Furthermore, applications make using protocols simple. Since we have a GUI, we don’t need to type in commands and remember protocols. Accessing Google is as simple as typing Google into our browser search bar. The same goes for every other application we use every day. Applications make networks easier for everyone to understand and use. Moreover, they’re more attractive to look at than a command prompt.

Network Architecture and Database Management


We use networks to access the same information as our peers, whether in business or our personal lives. Similarly, we use databases to store and organize large amounts of information. Database management systems allow administrators to update and change data (TestOut, 2024; TestOut, n.d). Any changes to a database are seen by everybody immediately (TestOut, 2024; TestOut, n.d). This interconnectedness ensures that data remains consistent, up-to-date, and accessible to all users. Networks and databases go hand in hand to keep us all on the same page, literally.

The Influence of Network Architecture, Management, and Security

All types of information travels through the Internet because it’s a million times faster and cheaper. For instance, I can easily track my finances through my phones banking app. Any purchase I make is instantly tracked in an activity log, and they send an alert to my phone for any purchase over $50. Most of the time I do not need a bank teller, which saves me a trip to the bank. Networks allow similar circumstances to take place all around the world. We don’t need to wait for letters because we have email. Just like we don’t need to watch television commercials because we can stream our favorite shows. This rapid exchange of information has revolutionized how we live, work, and communicate. The convenience and efficiency provided by network architecture have become integral to our daily routines, connecting us with just a few clicks.

Managing network architecture ensures content is available, updated, hacker-free, and running fast. Necessary network protocols like DNS and HTTPS have designated ports on networks so that information always knows precisely where to go once it reaches a host computer or server (TestOut, 2024). Effective network management has been fundamental in developing the world’s largest network—the Internet. Given the high value of information traversing these networks, it naturally became a target for hackers. People have been trying to steal information and damage computers since the earliest days. It encourages us to learn about these attacks and figure out how to prevent them from happening, which pushes threat actors to devise new schemes. The continuous interplay between advancing technologies and emerging security threats drives innovation, making our networks more resilient and reliable. Network architecture, management, and security influence each other to drive technological innovation.


References

TestOut Corp. (2024). CertMaster Learn Tech+. http://www.testout.com

TestOut. (n.d.). TestOut IT fundamentals pro. LabSim

Comments