Comprehensive networking

Created by Dallas Palumbo

Physical Layer
Handles the transmission of raw bits over physical media like cables and wireless signals. Deals with voltage levels

1/60

TermDefinition
Physical Layer
Handles the transmission of raw bits over physical media like cables and wireless signals. Deals with voltage levels
Data Link Layer
Provides node-to-node data transfer and handles error detection/correction. Uses MAC addresses and is where switches operate. Includes LLC and MAC sublayers
Network Layer
Responsible for logical addressing and routing packets between different networks. This is where routers operate and IP addresses are used
Transport Layer
Ensures reliable data transfer between hosts with error checking and flow control. Handles segmentation and can provide connection-oriented or connectionless communication
Session Layer
The Session Layer (Layer 5) of the OSI model is responsible for establishing, managing, and terminating dialogues (sessions) between applications on different devices.
Presentation Layer
Translates data between application and network formats. Handles encryption
Application Layer
Closest to end users and provides network services directly to applications. Where protocols like HTTP
TCP/IP Application Layer
Combines OSI layers 5-7. Provides network services and protocols that applications use to communicate
TCP/IP Transport Layer
Provides end-to-end communication services. Uses TCP for reliable
TCP/IP Internet Layer
Handles logical addressing and routing of packets across networks. IP protocol operates here along with ICMP and ARP
TCP/IP Network Access Layer
Combines OSI layers 1-2. Handles physical transmission of data and local network protocols like Ethernet and WiFi
Class A IP Range
1.0.0.0 to 126.0.0.0 with default mask 255.0.0.0. First bit is 0
Class B IP Range
128.0.0.0 to 191.255.0.0 with default mask 255.255.0.0. First two bits are 10
Class C IP Range
192.0.0.0 to 223.255.255.0 with default mask 255.255.255.0. First three bits are 110
Private IP Ranges
10.0.0.0/8
Subnet Mask
Binary pattern that determines which portion of an IP address represents the network and which represents the host
CIDR Notation
Shorthand method using a slash followed by the number of network bits. Example: 192.168.1.0/24 means first 24 bits are network
Default Gateway
Router IP address that devices use to send traffic destined for other networks. Acts as the exit point from the local network
IPv6
128-bit addressing system using hexadecimal notation separated by colons. Designed to replace IPv4 due to address exhaustion
TCP
Connection-oriented protocol that guarantees delivery with error checking
UDP
Connectionless protocol that sends data without establishing a connection or guaranteeing delivery. Faster but less reliable
HTTP
Port 80 protocol for transferring web pages and resources. Uses request-response model between clients and servers
HTTPS
Port 443 protocol that adds encryption to HTTP using SSL/TLS. Secures data transmission between client and server
DNS
Port 53 service that translates domain names into IP addresses. Operates hierarchically with root
DHCP
Port 67/68 protocol that automatically assigns IP addresses and network configuration to devices on a network
ARP
Protocol that maps IP addresses to MAC addresses on a local network. Maintains a cache of recent mappings
ICMP
Protocol used for diagnostic and error-reporting purposes. Powers tools like ping and traceroute
FTP
Port 21 protocol for transferring files between systems. Sends credentials and data in cleartext
SFTP
Port 22 protocol that provides secure file transfer over SSH with encryption. Not related to FTPS
SSH
Port 22 protocol providing secure remote access and command execution. Uses encryption and supports key-based authentication
Router
Operates at Layer 3 and forwards packets between different networks based on IP addresses. Makes routing decisions
Switch
Operates at Layer 2 and forwards frames within a network based on MAC addresses. Creates separate collision domains
Hub
Operates at Layer 1 and broadcasts all traffic to every connected device. Creates one large collision domain
Firewall
Security device that monitors and filters traffic based on predetermined rules. Can operate at multiple layers
Access Point
Device that allows wireless devices to connect to a wired network. Broadcasts SSIDs and manages wireless connections
Modem
Device that modulates and demodulates signals to connect a local network to an ISP. Converts between analog and digital
Load Balancer
Distributes network traffic across multiple servers to optimize resource use and prevent overload
MAC Address
48-bit physical address burned into network interface hardware. Consists of 6 hexadecimal octets separated by colons or hyphens
Port Numbers
16-bit numbers that identify specific processes or services on a host. Range from 0-65535 with well-known ports below 1024
Common Ports
HTTP:80
Broadcast
Transmission sent to all devices on a network segment. Uses MAC address FF:FF:FF:FF:FF:FF or IP ending in .255
Unicast
One-to-one transmission sent from one source to one specific destination. Most common traffic type
Multicast
One-to-many transmission sent to a group of interested recipients. Uses special IP address range 224.0.0.0 to 239.255.255.255
Collision Domain
Network segment where data packets can collide. Switches create separate collision domains for each port
Broadcast Domain
Network segment where broadcast traffic is propagated. Routers separate broadcast domains while switches don't
NAT
Technique that translates private IP addresses to public ones for internet communication. Conserves public IP addresses
VLAN
Logical segmentation of a network at Layer 2 that creates separate broadcast domains on the same physical switch
VPN
Encrypted tunnel that allows secure communication over public networks. Creates a virtual private connection
Bandwidth
Maximum data transfer rate of a network connection. Measured in bits per second
Throughput
Actual data transfer rate achieved in practice. Usually lower than bandwidth due to overhead and congestion
Latency
Time delay for data to travel from source to destination. Measured in milliseconds and affects responsiveness
Half-Duplex
Communication mode where data flows in both directions but only one direction at a time. Example: walkie-talkies
Full-Duplex
Communication mode where data flows in both directions simultaneously. Modern switches and NICs use this
Packet Structure
Data unit consisting of header (source/destination info
Three-Way Handshake
TCP connection establishment process using SYN
command - ipconfig
Displays IP configuration information
command - ping
Tests Connections to other IP ports
command - netstat
Displays network connections.
command - tracert
Displays the route taken to the destination
command - nslookup
Directly queries the name server for information on a destination domain.