Network
Configuration
Fundamentals of Network
configuration
PEER TO PEER VS SERVER BASED
NETWORK
Peer to Peer Network – Group of computers are connected to each
other so that users can share resources and information. There are no
hierarchies, and no device serves as a central station or storage.
EXAMPLE OF PEER TO PEER
NETWORK
PEER TO PEER VS SERVER BASED
NETWORK
Server Based Network – Also known as client/server network, it
utilizes a dedicated server that serves as the central location for network
management and services.
EXAMPLE OF SERVER BASED
NETWORK
THE OSI MODEL
LAYERS OF THE OSI MODEL
APPLICATION LAYER(7)– Provides network serves to applications
such as file transfer, e-mail, chatting, and remot login.
PRESENTATION LATER(6)- Concerned with the way data is
presented.
SESSION LAYER(5)- Establishes, manages, and terminates
connections in terms of a session.
TRANSPORT LATER(4)-Concerned with data addressing and
delivery between networks.
LAYERS OF THE OSI MODEL
NETWORK LAYER(3)– Concerned with data addressing and
delivery between networks.
DATALINK LAYER(2)-Provides a reliable transit of data across a
physical link. It provides error detection and packet framing
PHYSICAL LAYER(1)-Specifies protocols for transmission of data
which is now in binary form. This layer is concerned with network
hardware, electrical voltage, and current
THE TCP/IP MODEL
LAYERS OF THE TCP/IP MODEL
APPLICATION LAYER– Combines the functions of the OSI Models
top three layers, namely the application, presentation, and session
layers. This layer is the closest to the end user
TRANSPORT LAYER- The same as the transport layer of the OSI
Model
INTERNET LAYER- Responsible for finding the best path for end-to-
end delivery of messages
NETWORK ACCESS LAYER- Allows an IP packet to make a
physical link to the network media. A packet is a unit of data routed in
the INTERNET
INTERNET PROTOCOL
IP ADDRESS
INTERNET PROTOCOL
Is the basic network protocol by which data is sent over the internet
across networks. It gives computers on a network a unique address
• Also known as TCP/IP
• All internet software applications require IP
• IP functions at the third level of the OSI model
TERMS AND CONCEPTS
IP ADDRESS – A unique 32 bit number that represents a device or
interface either you are in the Intranet or in the Internet. These
addresses are normally expressed in dotted-decimal format with four
groups of numbers separated by dots.
SUBNET.- Logical subdivision of a larger network
SUBNET MASK/CIDR/DEFAULT SUBNET – 32 bit number that
mask an IP ADDRESS, and breaks the Ip address into a network
address and a host address. It is made by setting all network bits to 1s
and host bits to 0s.
TERMS AND CONCEPTS
IP ADDRESS – the process of dividing a large network into smaller
networks by adding 1s to the network bits in a subnet mask
HOST – A computer or device connected to the network
NETWORK ADDRESS – the address where the hosts are connected
DEFAULT GATEWAY- A default acess point or IP router that a
network host or computer uses.
TERMS AND CONCEPTS
DHCP – Hands out IP addresses to host and keeps addresses unique.
PRIVATE IP ADDRESSES – Speciall non-routable IP addresses that
are used in the Intranet. These addresses need to be translated to public
internet IP addresses when device needs to talk to the internet.
TERMS AND CONCEPTS
CIDR PREFIX OR NOTATION – The shorter representation of an IP
address and its associated routing prefix. It is composed of slash and a
decimal number. The decimal number is the number of 1s in a subnet
mask.
EX.
Given subnet mask
255.255.255.0 =11111111.11111111.11111111.00000000
IP ADDRESS CLASSES
CLASS RANGE(1st Octet) SUBNET MASK AND
CIDR PREFIX
CLASS A 1-126 255.0.0.0 OR /8
CLASS B 128-191 255.255.0.0 OR /16
CLASS C 192-223 255.255.255.0 OR /24
CLASS D 225-239 Reserved for multicast
groups
CLASS E 240-254 EXOERIMENTAL; For
future use, research,
and development
STEPS ON GETTING THE SUBNET
MASK
FIRST STEP – Identify the current number of host and the future
number of host..
SECOND STEP– Assume a subnet mask depending in the identified
required number of host
THIRD STEP – Convert the subnet mask to binary notation
FOURTH STEP – Count the 0s in the binary notation of your subnet
mask.
STEPS ON GETTING THE SUBNET
MASK
FIFTH STEP – Use the host formula to compute the number of host
that can connect using the subnet mask you assumed.
SIXTH STEP – Verify if the number if host available complies with
the initial requirements.
STEPS ON GETTING THE NETWORK
ADDRESS
FIRST STEP – Convert IP address and Subnet mask from decimal into
binary
SECOND STEP– Use the “And Operation” where 1 & 1 is 1 and 0 &
1 is 0, and 0 & 0 is 0.
THIRD STEP – Convert the newly converted binary numbers into
decimal.
STEPS ON GETTING THE BROADCAST
ADDRESS
FIRST STEP – Convert Subnet mask from decimal into binary.
SECOND STEP– Use the CIDR prefix and count starting from the left
according to the CIDR Prefix, then put a slash. Now the bits that are
inside the slash are Network bits while the ones outside the slash are
Host bits.
THIRD STEP – Convert the Host Bits into 1, and then convert the new
binary numbers into decimal.
STEPS ON GETTING THE FIRST
USABLE HOST AND LAST USABLE
HOST
FIRST USABLE HOST– Take your Network address and add 1
(Ex: 192.168.0.0 + 1 = 192.168.0.1).
LAST USABLE HOST– Take your Broadcast address and subtract 1
(Ex: 192.168.0.255 - 1 = 192.168.0.254).