0% found this document useful (0 votes)
26 views22 pages

Network Configutration

This document discusses network configuration fundamentals including peer-to-peer versus server-based networks, the OSI model layers, TCP/IP model layers, internet protocol, IP addressing terms and concepts, IP address classes, and steps for obtaining subnet mask, network address, broadcast address, and usable host ranges.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views22 pages

Network Configutration

This document discusses network configuration fundamentals including peer-to-peer versus server-based networks, the OSI model layers, TCP/IP model layers, internet protocol, IP addressing terms and concepts, IP address classes, and steps for obtaining subnet mask, network address, broadcast address, and usable host ranges.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 22

Network

Configuration
Fundamentals of Network
configuration
PEER TO PEER VS SERVER BASED
NETWORK

Peer to Peer Network – Group of computers are connected to each


other so that users can share resources and information. There are no
hierarchies, and no device serves as a central station or storage.
EXAMPLE OF PEER TO PEER
NETWORK
PEER TO PEER VS SERVER BASED
NETWORK

Server Based Network – Also known as client/server network, it


utilizes a dedicated server that serves as the central location for network
management and services.
EXAMPLE OF SERVER BASED
NETWORK
THE OSI MODEL
LAYERS OF THE OSI MODEL

APPLICATION LAYER(7)– Provides network serves to applications


such as file transfer, e-mail, chatting, and remot login.

PRESENTATION LATER(6)- Concerned with the way data is


presented.

SESSION LAYER(5)- Establishes, manages, and terminates


connections in terms of a session.

TRANSPORT LATER(4)-Concerned with data addressing and


delivery between networks.
LAYERS OF THE OSI MODEL

NETWORK LAYER(3)– Concerned with data addressing and


delivery between networks.

DATALINK LAYER(2)-Provides a reliable transit of data across a


physical link. It provides error detection and packet framing

PHYSICAL LAYER(1)-Specifies protocols for transmission of data


which is now in binary form. This layer is concerned with network
hardware, electrical voltage, and current
THE TCP/IP MODEL
LAYERS OF THE TCP/IP MODEL
APPLICATION LAYER– Combines the functions of the OSI Models
top three layers, namely the application, presentation, and session
layers. This layer is the closest to the end user

TRANSPORT LAYER- The same as the transport layer of the OSI


Model

INTERNET LAYER- Responsible for finding the best path for end-to-
end delivery of messages

NETWORK ACCESS LAYER- Allows an IP packet to make a


physical link to the network media. A packet is a unit of data routed in
the INTERNET
INTERNET PROTOCOL
IP ADDRESS
INTERNET PROTOCOL

Is the basic network protocol by which data is sent over the internet
across networks. It gives computers on a network a unique address

• Also known as TCP/IP


• All internet software applications require IP
• IP functions at the third level of the OSI model
TERMS AND CONCEPTS
IP ADDRESS – A unique 32 bit number that represents a device or
interface either you are in the Intranet or in the Internet. These
addresses are normally expressed in dotted-decimal format with four
groups of numbers separated by dots.

SUBNET.- Logical subdivision of a larger network

SUBNET MASK/CIDR/DEFAULT SUBNET – 32 bit number that


mask an IP ADDRESS, and breaks the Ip address into a network
address and a host address. It is made by setting all network bits to 1s
and host bits to 0s.
TERMS AND CONCEPTS

IP ADDRESS – the process of dividing a large network into smaller


networks by adding 1s to the network bits in a subnet mask

HOST – A computer or device connected to the network

NETWORK ADDRESS – the address where the hosts are connected

DEFAULT GATEWAY- A default acess point or IP router that a


network host or computer uses.
TERMS AND CONCEPTS

DHCP – Hands out IP addresses to host and keeps addresses unique.

PRIVATE IP ADDRESSES – Speciall non-routable IP addresses that


are used in the Intranet. These addresses need to be translated to public
internet IP addresses when device needs to talk to the internet.
TERMS AND CONCEPTS

CIDR PREFIX OR NOTATION – The shorter representation of an IP


address and its associated routing prefix. It is composed of slash and a
decimal number. The decimal number is the number of 1s in a subnet
mask.

EX.

Given subnet mask


255.255.255.0 =11111111.11111111.11111111.00000000
IP ADDRESS CLASSES

CLASS RANGE(1st Octet) SUBNET MASK AND


CIDR PREFIX
CLASS A 1-126 255.0.0.0 OR /8

CLASS B 128-191 255.255.0.0 OR /16

CLASS C 192-223 255.255.255.0 OR /24

CLASS D 225-239 Reserved for multicast


groups
CLASS E 240-254 EXOERIMENTAL; For
future use, research,
and development
STEPS ON GETTING THE SUBNET
MASK
FIRST STEP – Identify the current number of host and the future
number of host..

SECOND STEP– Assume a subnet mask depending in the identified


required number of host

THIRD STEP – Convert the subnet mask to binary notation

FOURTH STEP – Count the 0s in the binary notation of your subnet


mask.
STEPS ON GETTING THE SUBNET
MASK

FIFTH STEP – Use the host formula to compute the number of host
that can connect using the subnet mask you assumed.

SIXTH STEP – Verify if the number if host available complies with


the initial requirements.
STEPS ON GETTING THE NETWORK
ADDRESS
FIRST STEP – Convert IP address and Subnet mask from decimal into
binary

SECOND STEP– Use the “And Operation” where 1 & 1 is 1 and 0 &
1 is 0, and 0 & 0 is 0.

THIRD STEP – Convert the newly converted binary numbers into


decimal.
STEPS ON GETTING THE BROADCAST
ADDRESS
FIRST STEP – Convert Subnet mask from decimal into binary.

SECOND STEP– Use the CIDR prefix and count starting from the left
according to the CIDR Prefix, then put a slash. Now the bits that are
inside the slash are Network bits while the ones outside the slash are
Host bits.

THIRD STEP – Convert the Host Bits into 1, and then convert the new
binary numbers into decimal.
STEPS ON GETTING THE FIRST
USABLE HOST AND LAST USABLE
HOST
FIRST USABLE HOST– Take your Network address and add 1
(Ex: 192.168.0.0 + 1 = 192.168.0.1).

LAST USABLE HOST– Take your Broadcast address and subtract 1


(Ex: 192.168.0.255 - 1 = 192.168.0.254).

You might also like