Network Configutration
Network Configutration
Configuration
Fundamentals of Network
configuration
PEER TO PEER VS SERVER BASED
NETWORK
INTERNET LAYER- Responsible for finding the best path for end-to-
end delivery of messages
Is the basic network protocol by which data is sent over the internet
across networks. It gives computers on a network a unique address
EX.
FIFTH STEP – Use the host formula to compute the number of host
that can connect using the subnet mask you assumed.
SECOND STEP– Use the “And Operation” where 1 & 1 is 1 and 0 &
1 is 0, and 0 & 0 is 0.
SECOND STEP– Use the CIDR prefix and count starting from the left
according to the CIDR Prefix, then put a slash. Now the bits that are
inside the slash are Network bits while the ones outside the slash are
Host bits.
THIRD STEP – Convert the Host Bits into 1, and then convert the new
binary numbers into decimal.
STEPS ON GETTING THE FIRST
USABLE HOST AND LAST USABLE
HOST
FIRST USABLE HOST– Take your Network address and add 1
(Ex: 192.168.0.0 + 1 = 192.168.0.1).