0% found this document useful (0 votes)
21 views

Unit 1. Introduction

This document discusses network architectures and IP addressing. It introduces the ISO/OSI reference model and TCP/IP architecture, which define standards for network communication. The document also covers IP classes, which categorize IP addresses based on how many bits are used to identify the network and hosts. Exercises are provided to help understand these topics.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

Unit 1. Introduction

This document discusses network architectures and IP addressing. It introduces the ISO/OSI reference model and TCP/IP architecture, which define standards for network communication. The document also covers IP classes, which categorize IP addresses based on how many bits are used to identify the network and hosts. Exercises are provided to help understand these topics.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

© Eva Campos Unit 1.

Introduction

UNIT 1. INTRODUCTION TO THE NETWORK


SERVICES
1. Introduction

Data communication networks are continuously present in our lives. We are surrounded by
interconnected devices: telephones, televisions, computers, printers, household appliances,
cars ...

In recent decades, the Internet has become indispensable. Our current society would be
meanless without it. But for all this communication to take place, it is necessary to establish a
series of rules that allow orchestrate communication between all components efficiently.

Exercise 1

If you are accessing a web page, is the Operating System used by the web server
important? What about the browser you are using?
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________

1
Network Services
© Eva Campos Unit 1. Introduction

2. Network Architectures

The Internet is based in a layered architecture that allows the data exchange.

2.1. ISO/OSI Reference Model

In the late 70s, data communication networks were expanding considerably. As the number
of networks increased, new functionalities emerged that had to be implemented in a certain
way. To avoid the implementation of "proprietary" technologies, where each company
implemented communication in its own way, the need to obtain a reference model that
standardized network communication was raised.

Thus arose the ISO / OSI reference model that divides the different functionalities of the
networks into levels. It is structured in 7 levels, and although it is not a network architecture, it
is the theoretical reference model on which current networks are based.

Application

Presentation

Session

Transport

Network

Data Link

Physical

Next, we will study the functions of each of the levels.

Vídeo Modelo de referencia OSI - https://www.youtube.com/watch?v=vfcpqnWYl1E

2
Network Services
© Eva Campos Unit 1. Introduction

2.2. TCP/IP Architecture

The TCP / IP architecture was developed in the 1970s by the United States
Department of Defense for the ARPANET, the network that was the origin of the Internet.

It has many similarities with the OSI reference model, in fact the reference model was mainly
based on this architecture. Really TCP/IP is the standard more used in the network
implementations. This is because when the ISO / OSI model was defined, this architecture
was already established with good results and could not be modified.

Application

Transport

Network

Network Interface

Vídeo Modelo de referencia TCP/IP https://www.youtube.com/watch?v=JQDCL17sARA

Exercise 2

Make a comparison between the ISO / OSI reference model and the TCP / IP architecture,
indicating which levels correspond to each of them.

3
Network Services
© Eva Campos Unit 1. Introduction

Exercise 3

Taking into account your previous knowledge of local area networks and using the Internet,
complete this table. Then put it in common with the rest of your classmates.

ISO/OSI Levels Function Protocol Data Unit Addressing

Level 7 Application

Level 6 Presentation

Level 5 Sesion

Level 4 Transport

Level 3 Network

Level 2 Data Link

Level 1 Physical

3. IP Address

Our goal is to become network administrators, and for that it is essential that we are able to
configure the IP addressing of a network based on its characteristics and the IP addresses
that we have available.

3.1. Availability of IPs

Generally, the scheme of a local area network is of this style:

IP x IP y

Wide Area Network Local Area Network


(Internet)

The local area network will be designed according to our needs. The LAN will be connected
to Internet through the router provided by our ISP (Internet Provider). This router will be
connected to the company's outside network. This router allows us access to the Internet.

2
Network Services
© Eva Campos Unit 1. Introduction

Exercise 4

Who will assign IP x to the corresponding link of the router? What about IP y?
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________

Remember that each IP address is made up of 32 bits, which are grouped into 4 bytes. Doing
some quick calculations:

32 bits → can represent 232 values → around 4.300.000.000 values

Taking into account the very high demand that exists for IP addresses in the global network
(Internet), knowing that there cannot be repeated addresses, we can clearly assume the
problem of the great shortage of IPs that currently exists.

The solution was already proposed years ago, IPv6, where the addresses instead of having
32 bits have 64 bits. However, today IPv4 is still widely used and it is with which we are going
to work.

3.2. IP Classes

So that the IP addresses can adapt to the characteristics of the different networks, they were
classified into 3 types. Each of them has a number of bits dedicated to identifying the network
and the remaining bits will identify the hosts.

Class bits dedicated to bits dedicated to Starting Final address


identifying the network identifying the hosts address
A 8 24 0.0.0.0 127.255.255.255
B 16 16 128.0.0.0 191.255.255.255
C 24 8 192.0.0.0 223.255.255.255

Thus, we can assign a type A address if our network is very large, a type B address if our
network is medium and a type C address if our network is small. (In local area networks we
will normally use type C addresses, at most one of type B for large local networks).

3
Network Services
© Eva Campos Unit 1. Introduction

Exercise 5

Complete the following table indicating the number of addresses assignable to hosts that
each of the IP classes will have.

Class # bits identify # bits identify # addresses


network host
A 8 24
B 16 16
C 24 8

• In class A we have 24 bits to identify hosts:


o 24 bits → 224 values: 16.777.216 addresses
o We reserve 2, 1 for the network address and 1 for the broadcast address
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________

3.3. Netmask address

The mask indicates how many bits of the IP address identify the network.

There are two nomenclatures:


• Decimal notation: it is used for IP addresses, writing 32 bits and setting the bits that
identify the network to 1.
o The netmask of A addresses is 255.0.0.0.
▪ (11111111.00000000. 00000000.00000000)
• CIDR: Putting after the IP address, separated with the "/" character, a prefix that
indicates the number of bits that identifies the network.
o For any class A address, the number of bits that identify the network is 8, so it
would be indicated with "/ 8"
▪ For instance: 1.0.0.1/8

4
Network Services
© Eva Campos Unit 1. Introduction

Exercise 6

Complete the next table:

Address Network class Netmask


Decimal CIDR
194.5.2.0
130.27.0.0
199.5.6.85
8.0.0.0
140.0.0.0

If we only took into account the different IP classes, the mask would not make sense because
the range defined with the classes would help us to know the number of bits that identify the
network. However, the enormous growth of networks made it necessary to add greater
flexibility and to be able to divide networks into smaller subnets (subnetting) as well as join
several networks into a larger one (supernetting).

3.4. Network, broadcast and host addresses

Once we know an IP address and its mask, we will know if that IP is an address that can be
assigned to a network device, or instead it is an IP address that identifies a network or a
broadcast address.

The classification is very simple:


• If all the bits that identify the host have a value of 0 →it is a network address
• If all the bits that identify the host have a value of 1 → it is a broadcast address
• Otherwise → host address

3.5. Special addresses

There are some addresses that are reserved for special cases. Some are these:
• 255.255.255.255 → broadcast address
• 0.0.0.0 → this machine in this network (only for cases where the host does not have
IP assigned yet)
• 127.0.0.0/8 → any direction of this network is a loopback address, which serve to verify
the good network operation in the machine.

5
Network Services
© Eva Campos Unit 1. Introduction

Exercise 7

In each case, you must indicate whether it is a network, broadcast, host or special address.

IP Address Address type


193.5.1.1
3.0.0.255
12.255.255.0
0.0.0.0
195.2.0.0
175.0.35.0
127.2.0.15
100.100.100.0
200.255.255.254
255.255.0.0
198.0.0.255

3.6. Subnetting

As we have already study, the number of IP addresses is limited, and there are times when
the IP address classes are not perfectly suited to the network requirements. In order to adapt
them and achieve optimal performance of the IP addresses, subnets and supernets can be
created.

Now we are going to remember using an example how we can get subnets.

Example:

The network administrator has been given an IP address, 193.152.2.0, and he must create
three different subnets, one for the administration department, one for the production
department and the last one for the IT department.
• The first thing the administrator has to do is identify the data he has to work with:
193.152.2.0 is a type C network address, so the first three bytes identify the network
and the last one identifies the host. (8 bits to identify the host)

193.152.2.0

network host

• He needs to create 3 subnets, therefore he will have to take some of the bits that
identify the host and turn them into subnet bits.

o How many bits will he need to create 3 subnets? If we need 3 networks we will
have to take 2 bits, which allows us up to 4 different values.

6
Network Services
© Eva Campos Unit 1. Introduction

193.152.2.0 00000000 He will have 6 bits to identify the host

network 2 bits to subnet


In this situation:
• 2 bits to address the subnet→ 22 (4) different addresses
o 00, 01, 10 y 11
• 6 bits to address the hosts→ 26 (64) different addresses

o From 000000 to 111111


o However, we must remember that there are some special addresses:
▪ If all the bits that identify the host have a value of 0 →it is a network
address
▪ If all the bits that identify the host have a value of 1 → it is a broadcast
address
▪ Therefore, the number of hosts of this network is 64-2= 62 hosts.

Exercise 8

The network administrator has the IP 198.2.2.0, and has to make as many subnets as possible
as long as the number of hosts is 130.

How many bits are needed for each network to have 130 hosts?______________________
How many bits are needed to identify the network?__________________________________
How many network can be created?_____________________________________________

Subnet address Broadcast address 1st host IP Last host IP Subnet mask
1
2
3
4
5
6
7
8

Exercise 9

We have the IP 130.57.0.0. We must get 4 subnets. Complete the next table.

Subnet address Broadcast address 1st host IP Last host IP Subnet mask
1
2
3
4

7
Network Services
© Eva Campos Unit 1. Introduction

Exercise 10

Which of these pairs of IP addresses belong to the same network?


a. 160.117.175.35/21 y 160.117.175.234/21 ☐ Yes ☐ No
b. 25.255.0.18/10 y 25.195.69.18/10 ☐ Yes ☐ No
c. 77.128.255.255/12 y 77.200.0.0/12 ☐ Yes ☐ No
d. 200.200.200.200/25 y 200.200.200.120/25 ☐ Yes ☐ No
e. 149.210.215.3/20 y 149.210.215.30/20 ☐ Yes ☐ No

In order to answer correctly, you must complete the next table:

Subnet Broadcast 1st host Last host Subnet


address address IP IP mask
160.117.175.35/21
160.117.175.234/21
25.255.0.18/10
25.195.69.18/10
77.128.255.255/12
77.200.0.0/12
200.200.200.200/25
200.200.200.120/25
149.210.215.3/20
149.210.215.30/20

Exercise 11

We are the network administrators and we have been assigned an IP address, 220.3.3.0.
However, we want to configure our network so that each department (there are 6 in total) in
the company is on a different network. Solve the problem by indicating for each department
what is its network address, the broadcast address, the number of available hosts and what
the netmask is.

Subnet address Broadcast address 1st host IP Last host IP Subnet mask
1
2
3
4
5
6
7
8

8
Network Services
© Eva Campos Unit 1. Introduction

Exercise 12

Our company has been assigned the IP 193.128.0.0. We need to create smaller networks,
because each of our networks will have a maximum of 25 computers. Create all possible
subnets meeting those requirements.

Subnet address Broadcast address 1st host IP Last host IP Subnet mask
1
2
3
4
5
6
7
8

3.7. Public and privates IPs

Just remember that IP addresses must be unique on the Internet, but ... is it possible that on
your home PC have the same IP address on the computer class?

It is common to find an IP address 192.168.0.1, 192.168.0.100 or something similar, both at


the office and at home ...

This has an explanation. These IP addresses are always within a local area network, never
on the Internet because they are private IP addresses and are not routed by routers. As
these addresses can only be used within Local Area Networks they are "invisible" on the
Internet.

There is a range of private addresses for each class of network:

Class Initial IP address Final IP address


A 10.0.0.0 10.255.255.255
B 172.16.0.0 172.31.255.255
C 192.168.0.0 192.168.255.255

9
Network Services
© Eva Campos Unit 1. Introduction

Exercise 13:

Indicate for each range of private IPs reserved in each class, how many networks there are
and how many hosts each has.

Class Initial IP Final IP address # of # of host in this


address networks network
A 10.0.0.0 10.255.255.255
B 172.16.0.0 172.31.255.255
C 192.168.0.0 192.168.255.255

Imagine this situation:

Host A
IP:192.168.0.1/24

Internet
R2
R1

LAN 2
LAN 1 Host Z
IP:192.168.0.1/24

The local networks LAN1 and LAN2 have been addressed with private IP addresses,
specifically with the network address 192.168.0.0/24. Casually, computers A and Z have the
same IP address. Team A sends a message to Team Z, what source and destination IP
addresses will the packet leaving the LAN1 network have?

Logically it would not make sense that the source and destination IPs were the same
(192.168.0.1), in addition we have already explained previously that these IP addresses are
not routed by the routers.

That IP cannot travel through the network until it reaches LAN2, so router R1 will act as a NAT
server.

The NAT service will transform the internal IP on an external, so that the package reaches
Internet with a public IP. The packet will be routed through the network until it reaches R2.
Again R2 must act as a NAT server and convert the public address that the packet has as the
destination IP into the private address of the Z computer.

10
Network Services
© Eva Campos Unit 1. Introduction

4. Ports. The transport layer.

The ports are used to identify the Application level protocol that is sending or receiving the
message. As we have seen previously, they are indicated in the transport layer protocol
(TCP or UDP).

The ports of the most used services are:

Port number Protocol Transport layer protocol


TCP UDP
21 Canal de control del servidor FTP
22 Servidor SSH
23 Telnet
25 SMTP
53 DNS
67 Servidor DHCP
68 Cliente DHCP
80 HTTP
110 POP3
143 IMAP
443 HTTPS

Exercise 14

Complete the previous table indicating if the service is TCP or UDP. What are the main
characteristics of these two protocols and when is it convenient to use one or the other?

5. Client/Server vs Peer to peer

5.1. Client/Server

The Client / Server architecture is very easy to understand.

When you go to the bakery and ask for the bread you need for that day, the baker serves it for
you. Clearly, in this case you would be the Client and the baker the Server. Something similar
happens with the programs that we use daily.

When you access a web address from your mobile phone, another device connected to the
network, a web server, is returning the content of said web to you. Your browser used from
the mobile would be the client.

In general, the client / server structure is based on the tasks being offered by servers that
allow clients to use them on demand.

11
Network Services
© Eva Campos Unit 1. Introduction

Exercise 15

Indicate at least three situations in which you use the Client / Server architecture from your
computer.
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________

5.2. Peer to peer

There is another architectural less used, Peer to peer. Here there are no clients or servers, it
is a peer network that allows a decentralized management. An example could be the eMule
or bitTorrent applications.

Exercise 16

Complete the next table

Client/Server Peer to peer

Pros Cons Pros Cons

Exercise 17

Can a host be a client and a server at the same time? Justify your answer.
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________

12
Network Services
© Eva Campos Unit 1. Introduction

6. Connectivity between devices

We are all used to connecting our computer, phone or tablet to our home network almost
automatically. However, there are a number of basic data that a device must have in order to
access the Internet.

This data is:


• IP address: identify the device in the local network
• Subnet mask: indicates the amount of bits that idenfity the network, therefore it
indicates the number of hosts of the network too
• Gateway: indicates "the exit" to the rest of the networks. It will be the address to
which all messages addressed to an address other than the network where the
device is located will be sent.
• DNS Server: They are addresses that are provided directly by the company that
provides us with the Internet. They are responsible for translating Internet names to IP
addresses. One primary and one alternate are configured to increase fault tolerance.
Exercise 18

Check the network configuration of your classroom computer and identify the IP address,
mask, gateway, and DNS servers address.
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________

13
Network Services
© Eva Campos Unit 1. Introduction

Exercise 19

Suppose you just hire a new employee in our office and is enabling your workspace. We
have a personal computer that we want to connect to the local area network so that it has
access to the network printer, to the data servers ... and we also want it to have access to
the Internet.

Indicates the minimum network data that we must configure on the computer in each of
these situations:

a) Print on our network printer


_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________

b) Access an ftp server connected to an external server at IP 10.52.36.7


_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________

c) Access the company's corporate website www.mioficina.com.


_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________

7. Network services

There are many services that a network offers. Most of them implements the Client/Server
structure. The most important services are the following:
a. Dynamic Host Configuration Protocol
b. Domain Name Server
c. Transfer of Files
d. Remote access
e. Web service
f. Email service

We will study them in this year.

14
Network Services
© Eva Campos Unit 1. Introduction

Exercise 20

Search the Internet for the meaning of the acronyms of each of the protocols indicated in the
table and indicate what type of service they belong to (a, b, c, d, e, or f)

Protocol Meaning of the acronyms Type of service


DHCP
FTP
SNMTP
HTTP
SSH
Telnet
POP3
DNS
IMAP

15
Network Services

You might also like