Unit 1. Introduction
Unit 1. Introduction
Introduction
Data communication networks are continuously present in our lives. We are surrounded by
interconnected devices: telephones, televisions, computers, printers, household appliances,
cars ...
In recent decades, the Internet has become indispensable. Our current society would be
meanless without it. But for all this communication to take place, it is necessary to establish a
series of rules that allow orchestrate communication between all components efficiently.
Exercise 1
If you are accessing a web page, is the Operating System used by the web server
important? What about the browser you are using?
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
1
Network Services
© Eva Campos Unit 1. Introduction
2. Network Architectures
The Internet is based in a layered architecture that allows the data exchange.
In the late 70s, data communication networks were expanding considerably. As the number
of networks increased, new functionalities emerged that had to be implemented in a certain
way. To avoid the implementation of "proprietary" technologies, where each company
implemented communication in its own way, the need to obtain a reference model that
standardized network communication was raised.
Thus arose the ISO / OSI reference model that divides the different functionalities of the
networks into levels. It is structured in 7 levels, and although it is not a network architecture, it
is the theoretical reference model on which current networks are based.
Application
Presentation
Session
Transport
Network
Data Link
Physical
2
Network Services
© Eva Campos Unit 1. Introduction
The TCP / IP architecture was developed in the 1970s by the United States
Department of Defense for the ARPANET, the network that was the origin of the Internet.
It has many similarities with the OSI reference model, in fact the reference model was mainly
based on this architecture. Really TCP/IP is the standard more used in the network
implementations. This is because when the ISO / OSI model was defined, this architecture
was already established with good results and could not be modified.
Application
Transport
Network
Network Interface
Exercise 2
Make a comparison between the ISO / OSI reference model and the TCP / IP architecture,
indicating which levels correspond to each of them.
3
Network Services
© Eva Campos Unit 1. Introduction
Exercise 3
Taking into account your previous knowledge of local area networks and using the Internet,
complete this table. Then put it in common with the rest of your classmates.
Level 7 Application
Level 6 Presentation
Level 5 Sesion
Level 4 Transport
Level 3 Network
Level 1 Physical
3. IP Address
Our goal is to become network administrators, and for that it is essential that we are able to
configure the IP addressing of a network based on its characteristics and the IP addresses
that we have available.
IP x IP y
The local area network will be designed according to our needs. The LAN will be connected
to Internet through the router provided by our ISP (Internet Provider). This router will be
connected to the company's outside network. This router allows us access to the Internet.
2
Network Services
© Eva Campos Unit 1. Introduction
Exercise 4
Who will assign IP x to the corresponding link of the router? What about IP y?
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
Remember that each IP address is made up of 32 bits, which are grouped into 4 bytes. Doing
some quick calculations:
Taking into account the very high demand that exists for IP addresses in the global network
(Internet), knowing that there cannot be repeated addresses, we can clearly assume the
problem of the great shortage of IPs that currently exists.
The solution was already proposed years ago, IPv6, where the addresses instead of having
32 bits have 64 bits. However, today IPv4 is still widely used and it is with which we are going
to work.
3.2. IP Classes
So that the IP addresses can adapt to the characteristics of the different networks, they were
classified into 3 types. Each of them has a number of bits dedicated to identifying the network
and the remaining bits will identify the hosts.
Thus, we can assign a type A address if our network is very large, a type B address if our
network is medium and a type C address if our network is small. (In local area networks we
will normally use type C addresses, at most one of type B for large local networks).
3
Network Services
© Eva Campos Unit 1. Introduction
Exercise 5
Complete the following table indicating the number of addresses assignable to hosts that
each of the IP classes will have.
The mask indicates how many bits of the IP address identify the network.
4
Network Services
© Eva Campos Unit 1. Introduction
Exercise 6
If we only took into account the different IP classes, the mask would not make sense because
the range defined with the classes would help us to know the number of bits that identify the
network. However, the enormous growth of networks made it necessary to add greater
flexibility and to be able to divide networks into smaller subnets (subnetting) as well as join
several networks into a larger one (supernetting).
Once we know an IP address and its mask, we will know if that IP is an address that can be
assigned to a network device, or instead it is an IP address that identifies a network or a
broadcast address.
There are some addresses that are reserved for special cases. Some are these:
• 255.255.255.255 → broadcast address
• 0.0.0.0 → this machine in this network (only for cases where the host does not have
IP assigned yet)
• 127.0.0.0/8 → any direction of this network is a loopback address, which serve to verify
the good network operation in the machine.
5
Network Services
© Eva Campos Unit 1. Introduction
Exercise 7
In each case, you must indicate whether it is a network, broadcast, host or special address.
3.6. Subnetting
As we have already study, the number of IP addresses is limited, and there are times when
the IP address classes are not perfectly suited to the network requirements. In order to adapt
them and achieve optimal performance of the IP addresses, subnets and supernets can be
created.
Now we are going to remember using an example how we can get subnets.
Example:
The network administrator has been given an IP address, 193.152.2.0, and he must create
three different subnets, one for the administration department, one for the production
department and the last one for the IT department.
• The first thing the administrator has to do is identify the data he has to work with:
193.152.2.0 is a type C network address, so the first three bytes identify the network
and the last one identifies the host. (8 bits to identify the host)
193.152.2.0
network host
• He needs to create 3 subnets, therefore he will have to take some of the bits that
identify the host and turn them into subnet bits.
o How many bits will he need to create 3 subnets? If we need 3 networks we will
have to take 2 bits, which allows us up to 4 different values.
6
Network Services
© Eva Campos Unit 1. Introduction
Exercise 8
The network administrator has the IP 198.2.2.0, and has to make as many subnets as possible
as long as the number of hosts is 130.
How many bits are needed for each network to have 130 hosts?______________________
How many bits are needed to identify the network?__________________________________
How many network can be created?_____________________________________________
Subnet address Broadcast address 1st host IP Last host IP Subnet mask
1
2
3
4
5
6
7
8
Exercise 9
We have the IP 130.57.0.0. We must get 4 subnets. Complete the next table.
Subnet address Broadcast address 1st host IP Last host IP Subnet mask
1
2
3
4
7
Network Services
© Eva Campos Unit 1. Introduction
Exercise 10
Exercise 11
We are the network administrators and we have been assigned an IP address, 220.3.3.0.
However, we want to configure our network so that each department (there are 6 in total) in
the company is on a different network. Solve the problem by indicating for each department
what is its network address, the broadcast address, the number of available hosts and what
the netmask is.
Subnet address Broadcast address 1st host IP Last host IP Subnet mask
1
2
3
4
5
6
7
8
8
Network Services
© Eva Campos Unit 1. Introduction
Exercise 12
Our company has been assigned the IP 193.128.0.0. We need to create smaller networks,
because each of our networks will have a maximum of 25 computers. Create all possible
subnets meeting those requirements.
Subnet address Broadcast address 1st host IP Last host IP Subnet mask
1
2
3
4
5
6
7
8
Just remember that IP addresses must be unique on the Internet, but ... is it possible that on
your home PC have the same IP address on the computer class?
This has an explanation. These IP addresses are always within a local area network, never
on the Internet because they are private IP addresses and are not routed by routers. As
these addresses can only be used within Local Area Networks they are "invisible" on the
Internet.
9
Network Services
© Eva Campos Unit 1. Introduction
Exercise 13:
Indicate for each range of private IPs reserved in each class, how many networks there are
and how many hosts each has.
Host A
IP:192.168.0.1/24
Internet
R2
R1
LAN 2
LAN 1 Host Z
IP:192.168.0.1/24
The local networks LAN1 and LAN2 have been addressed with private IP addresses,
specifically with the network address 192.168.0.0/24. Casually, computers A and Z have the
same IP address. Team A sends a message to Team Z, what source and destination IP
addresses will the packet leaving the LAN1 network have?
Logically it would not make sense that the source and destination IPs were the same
(192.168.0.1), in addition we have already explained previously that these IP addresses are
not routed by the routers.
That IP cannot travel through the network until it reaches LAN2, so router R1 will act as a NAT
server.
The NAT service will transform the internal IP on an external, so that the package reaches
Internet with a public IP. The packet will be routed through the network until it reaches R2.
Again R2 must act as a NAT server and convert the public address that the packet has as the
destination IP into the private address of the Z computer.
10
Network Services
© Eva Campos Unit 1. Introduction
The ports are used to identify the Application level protocol that is sending or receiving the
message. As we have seen previously, they are indicated in the transport layer protocol
(TCP or UDP).
Exercise 14
Complete the previous table indicating if the service is TCP or UDP. What are the main
characteristics of these two protocols and when is it convenient to use one or the other?
5.1. Client/Server
When you go to the bakery and ask for the bread you need for that day, the baker serves it for
you. Clearly, in this case you would be the Client and the baker the Server. Something similar
happens with the programs that we use daily.
When you access a web address from your mobile phone, another device connected to the
network, a web server, is returning the content of said web to you. Your browser used from
the mobile would be the client.
In general, the client / server structure is based on the tasks being offered by servers that
allow clients to use them on demand.
11
Network Services
© Eva Campos Unit 1. Introduction
Exercise 15
Indicate at least three situations in which you use the Client / Server architecture from your
computer.
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
There is another architectural less used, Peer to peer. Here there are no clients or servers, it
is a peer network that allows a decentralized management. An example could be the eMule
or bitTorrent applications.
Exercise 16
Exercise 17
Can a host be a client and a server at the same time? Justify your answer.
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
12
Network Services
© Eva Campos Unit 1. Introduction
We are all used to connecting our computer, phone or tablet to our home network almost
automatically. However, there are a number of basic data that a device must have in order to
access the Internet.
Check the network configuration of your classroom computer and identify the IP address,
mask, gateway, and DNS servers address.
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
13
Network Services
© Eva Campos Unit 1. Introduction
Exercise 19
Suppose you just hire a new employee in our office and is enabling your workspace. We
have a personal computer that we want to connect to the local area network so that it has
access to the network printer, to the data servers ... and we also want it to have access to
the Internet.
Indicates the minimum network data that we must configure on the computer in each of
these situations:
7. Network services
There are many services that a network offers. Most of them implements the Client/Server
structure. The most important services are the following:
a. Dynamic Host Configuration Protocol
b. Domain Name Server
c. Transfer of Files
d. Remote access
e. Web service
f. Email service
14
Network Services
© Eva Campos Unit 1. Introduction
Exercise 20
Search the Internet for the meaning of the acronyms of each of the protocols indicated in the
table and indicate what type of service they belong to (a, b, c, d, e, or f)
15
Network Services