PAN (Personal Area Network)
Browse / Networking Fundamentals Cheatsheet
Networking Fundamentals Cheatsheet
A comprehensive cheat sheet covering essential networking concepts, protocols, and tools. Ideal for students, network administrators, and software developers looking to grasp the fundamentals of computer networks.
Network Fundamentals
Network Types
|
Small network for personal devices, e.g., Bluetooth connection between a phone and headset. |
LAN (Local Area Network) |
Network within a limited area, such as a home, school, or office. Ethernet and Wi-Fi are common technologies. |
MAN (Metropolitan Area Network) |
Larger network spanning a city or metropolitan area. Connects multiple LANs together. |
WAN (Wide Area Network) |
Network covering a large geographical area, such as the internet. Connects multiple LANs and MANs. |
VLAN (Virtual LAN) |
Logically separate networks within a physical network. Improves security and network management. |
SAN (Storage Area Network) |
A dedicated high-speed network connecting servers to storage devices, providing block-level access to data. |
Network Topologies
Bus Topology |
All devices connected to a single cable. Simple but vulnerable; a break in the cable disrupts the entire network. |
Star Topology |
All devices connected to a central hub or switch. More robust than bus, but the central device is a single point of failure. |
Ring Topology |
Devices connected in a circular fashion. Data travels in one direction. Failure of one device can disrupt the network. |
Mesh Topology |
Each device is connected to multiple other devices. Highly redundant but expensive to implement. |
Tree Topology |
Combines features of bus and star topologies. Hierarchical structure. |
Hybrid Topology |
A combination of two or more different topologies. Offers flexibility and customization. |
Key Networking Devices
Hub |
Simple device that broadcasts data to all connected devices. Operates at Layer 1 (Physical Layer). |
Switch |
Forwards data only to the intended recipient based on MAC address. Operates at Layer 2 (Data Link Layer). |
Router |
Forwards data between different networks based on IP address. Operates at Layer 3 (Network Layer). |
Firewall |
Security device that controls network traffic based on predefined rules. Can operate at multiple layers. |
Wireless Access Point (WAP) |
Allows wireless devices to connect to a wired network. Typically operates at Layer 2. |
Load Balancer |
Distributes network traffic across multiple servers to optimize performance and availability. |
OSI and TCP/IP Models
OSI Model Layers
Layer 7: Application |
Provides network services to applications (e.g., HTTP, SMTP, FTP). |
Layer 6: Presentation |
Handles data formatting, encryption, and decryption. |
Layer 5: Session |
Manages connections between applications. |
Layer 4: Transport |
Provides reliable or unreliable data delivery (e.g., TCP, UDP). |
Layer 3: Network |
Handles routing of data packets (e.g., IP). |
Layer 2: Data Link |
Provides error-free transmission of data frames (e.g., Ethernet). |
Layer 1: Physical |
Defines physical characteristics of the network (e.g., cables, connectors). |
TCP/IP Model Layers
Layer 4: Application |
Combines the functions of the OSI Application, Presentation, and Session layers. (e.g., HTTP, SMTP, DNS). |
Layer 3: Transport |
Provides reliable or unreliable data delivery (e.g., TCP, UDP). |
Layer 2: Internet |
Handles routing of data packets (e.g., IP). |
Layer 1: Network Access |
Combines the functions of the OSI Data Link and Physical layers (e.g., Ethernet, Wi-Fi). |
Key Differences
The OSI model is a conceptual model, while TCP/IP is a practical implementation. |
IP Addressing and Subnetting
IP Address Classes
Class A |
1.0.0.0 - 126.0.0.0 |
Class B |
128.0.0.0 - 191.255.0.0 |
Class C |
192.0.0.0 - 223.255.255.0 |
Class D |
224.0.0.0 - 239.255.255.255 |
Class E |
240.0.0.0 - 255.255.255.254 |
Private IP Addresses
10.0.0.0 - 10.255.255.255 (10.0.0.0/8) |
Subnetting Basics
Subnet Mask |
A 32-bit number that separates the network and host portions of an IP address. Indicates the number of bits used for the network address. |
CIDR Notation |
Shorthand representation of a subnet mask. |
Subnetting Process |
Involves borrowing bits from the host portion to create subnets. This allows a single network to be divided into smaller, more manageable networks. |
Common Networking Protocols
Transport Layer Protocols
TCP (Transmission Control Protocol) |
Connection-oriented protocol that provides reliable, ordered, and error-checked delivery of data. Used for applications like HTTP, SMTP, and FTP. |
UDP (User Datagram Protocol) |
Connectionless protocol that provides fast but unreliable delivery of data. Used for applications like DNS, VoIP, and streaming. |
Application Layer Protocols
HTTP (Hypertext Transfer Protocol) |
Used for transferring web pages and other content between web servers and browsers. Port 80 (default). |
HTTPS (HTTP Secure) |
Secure version of HTTP that uses SSL/TLS encryption. Port 443 (default). |
DNS (Domain Name System) |
Translates domain names to IP addresses. Port 53 (default). |
SMTP (Simple Mail Transfer Protocol) |
Used for sending email. Port 25 (default). |
POP3 (Post Office Protocol version 3) |
Used for retrieving email from a mail server. Port 110 (default). |
IMAP (Internet Message Access Protocol) |
Used for retrieving and managing email on a mail server. Port 143 (default). |
FTP (File Transfer Protocol) |
Used for transferring files between computers. Ports 20 and 21 (default). |
SSH (Secure Shell) |
Used for secure remote access to a computer. Port 22 (default). |