Networking can be a complex and technical field, full of jargon and terminology that can be overwhelming for beginners. Whether you’re a seasoned IT professional or just starting out in the field, having a cheatsheet of key networking concepts and terminology can be a valuable resource. In this article, we’ll provide you with the ultimate networking cheatsheet, covering everything from the basics of networking to more advanced topics, such as routing protocols and network security.
Desktop View Recommended
Computer Network Protocols
Computer network protocols are a set of rules and standards that define how data is transmitted and received over a network. Each protocol serves a specific purpose and is designed to work with other protocols to enable efficient and reliable communication between devices.
Protocol | Description |
---|---|
HTTP | Hypertext Transfer Protocol used for web browsing |
HTTPS | HTTP over SSL/TLS encrypted protocol for secure web browsing |
FTP | File Transfer Protocol used for transferring files between computers |
SSH | Secure Shell protocol used for secure remote access and file transfer |
SMTP | Simple Mail Transfer Protocol used for sending email messages between servers |
POP | Post Office Protocol used for retrieving email messages from a mail server |
IMAP | Internet Message Access Protocol used for retrieving email messages and managing mailboxes on a mail server |
DNS | Domain Name System protocol used for translating domain names into IP addresses |
DHCP | Dynamic Host Configuration Protocol used for assigning IP addresses to devices on a network |
SNMP | Simple Network Management Protocol used for managing and monitoring network devices |
TCP | Transmission Control Protocol used for establishing reliable connections between devices on a network |
UDP | User Datagram Protocol used for establishing unreliable connections between devices on a network |
ICMP | Internet Control Message Protocol used for error reporting and diagnostic messages |
ARP | Address Resolution Protocol used for mapping IP addresses to MAC addresses |
Network Topologies
Network Topology | Description |
---|---|
Bus Topology | A single cable connects all devices in a linear sequence. Each device communicates with the others through the cable. If the cable fails, the entire network goes down. |
Star Topology | All devices are connected to a central hub or switch. If a cable fails, only the device connected to that cable is affected. |
Ring Topology | Devices are connected in a circular loop. Each device communicates with the device next to it, and messages travel around the loop in one direction. If a cable fails, the entire network goes down. |
Mesh Topology | Each device is connected to every other device in the network. This provides redundancy and fault tolerance, but requires more cabling than other topologies. |
Tree Topology | Also known as a hierarchical topology, devices are organized in a hierarchical structure with multiple levels. This provides scalability and fault tolerance, but can be complex to manage. |
Hybrid Topology | A combination of two or more different topologies. This provides the benefits of each topology, but can be more complex to manage. |
Classes in Computer Networking
Computer networks use IP addresses to identify devices on a network. The IP address is divided into four octets, with each octet containing 8 bits. Classes in computer networking refer to the range of IP addresses that are assigned to a network based on the first octet of the IP address.
Class | Range of IP Addresses | Default Subnet Mask |
---|---|---|
Class A | 1.0.0.0 to 126.255.255.255 | 255.0.0.0 |
Class B | 128.0.0.0 to 191.255.255.255 | 255.255.0.0 |
Class C | 192.0.0.0 to 223.255.255.255 | 255.255.255.0 |
Class D | 224.0.0.0 to 239.255.255.255 | N/A |
Class E | 240.0.0.0 to 255.255.255.255 | N/A |
Class A networks use IP addresses in the range of 1.0.0.0 to 126.255.255.255, with the first octet representing the network ID and the remaining three octets representing the host ID. The default subnet mask for Class A networks is 255.0.0.0.
Class B networks use IP addresses in the range of 128.0.0.0 to 191.255.255.255, with the first two octets representing the network ID and the remaining two octets representing the host ID. The default subnet mask for Class B networks is 255.255.0.0.
Class C networks use IP addresses in the range of 192.0.0.0 to 223.255.255.255, with the first three octets representing the network ID and the remaining octet representing the host ID. The default subnet mask for Class C networks is 255.255.255.0.
Class D and Class E networks are reserved for special purposes and are not typically used for standard network addressing. Class D addresses are used for multicast addressing, while Class E addresses are reserved for experimental purposes.
Understanding IP address classes is important for subnetting and network planning, as it allows network administrators to efficiently allocate IP addresses and design networks that meet their specific needs.
OSI Model
Layer | Name | Description | Protocol Data Unit (PDU) |
---|---|---|---|
7 | Application | Provides user interfaces and support for services such as email, file transfer, and network printing | Data |
6 | Presentation | Formats and encrypts data for transmission | Data |
5 | Session | Manages connections between applications | Data |
4 | Transport | Provides reliable, end-to-end data delivery and error recovery | Segment |
3 | Network | Determines the best path for data transmission and performs logical addressing | Packet |
2 | Data Link | Transfers data between network devices and manages physical addressing | Frame |
1 | Physical | Defines physical specifications for network hardware and cabling | Bit |
TCP/IP Model
Layer | Name | Description | Protocol Data Unit (PDU) |
---|---|---|---|
4 | Application | Provides network services to end-user applications, such as email, file transfer, and web browsing | Data |
3 | Transport | Provides reliable, end-to-end data delivery and error recovery | Segment |
2 | Internet | Determines the best path for data transmission and performs logical addressing | Packet |
1 | Network Access/Link | Transfers data between network devices and manages physical addressing | Frame |
The TCP/IP model is a four-layered model used for communication over the Internet. It stands for Transmission Control Protocol/Internet Protocol, and it is the most widely used networking protocol suite in the world. The TCP/IP model is less structured than the OSI model, and its layers are more closely integrated.
The Application layer corresponds to layers 5, 6, and 7 of the OSI model, and it provides network services to end-user applications, such as email, file transfer, and web browsing. The Transport layer corresponds to layer 4 of the OSI model, and it provides reliable, end-to-end data delivery and error recovery. The Internet layer corresponds to layer 3 of the OSI model, and it determines the best path for data transmission and performs logical addressing. The Network Access/Link layer corresponds to layers 1 and 2 of the OSI model, and it transfers data between network devices and manages physical addressing.
SSL/TLS (Secure Sockets Layer/Transport Layer Security)
Protocol | Purpose | Key Features |
---|---|---|
SSL | Secure communication over a network | Encryption, authentication, message integrity |
TLS 1.0 | Secure communication over a network | Encryption, authentication, message integrity |
TLS 1.1 | Secure communication over a network | Encryption, authentication, message integrity, improved security over TLS 1.0 |
TLS 1.2 | Secure communication over a network | Encryption, authentication, message integrity, improved security over TLS 1.1, support for newer cryptographic algorithms |
TLS 1.3 | Secure communication over a network | Encryption, authentication, message integrity, improved security over TLS 1.2, faster and more efficient, support for only the strongest cryptographic algorithms |
IP Addressing
Class | Range | Default Subnet Mask |
---|---|---|
A | 1.0.0.0 – 126.255.255.255 | 255.0.0.0 |
B | 128.0.0.0 – 191.255.255.255 | 255.255.0.0 |
C | 192.0.0.0 – 223.255.255.255 | 255.255.255.0 |
D | 224.0.0.0 – 239.255.255.255 | Not applicable |
E | 240.0.0.0 – 255.255.255.255 | Not applicable |
IP addressing is the process of assigning unique numerical identifiers to devices on a network. An IP address consists of four numbers separated by periods, each ranging from 0 to 255. IP addresses are divided into classes, each of which has a default subnet mask.
Class A addresses are used for large networks, with the first octet representing the network and the remaining three octets representing the hosts. Class B addresses are used for medium-sized networks, with the first two octets representing the network and the remaining two octets representing the hosts. Class C addresses are used for small networks, with the first three octets representing the network and the remaining octet representing the hosts.
Class D addresses are used for multicast groups, while Class E addresses are reserved for experimental use.
IEEE 802
IEEE 802 Standard | Description |
---|---|
802.1Q | Virtual LAN (VLAN) tagging standard |
802.1X | Port-based network access control (PNAC) standard |
802.2 | Logical link control (LLC) layer protocol |
802.3 | Ethernet standard |
802.3ab | Gigabit Ethernet standard |
802.3ae | 10 Gigabit Ethernet standard |
802.3af | Power over Ethernet (PoE) standard |
802.3at | PoE+ standard |
802.3bt | 4-pair PoE standard |
802.11 | Wireless LAN (WLAN) standard |
802.11a | WLAN standard operating in the 5 GHz frequency band |
802.11b | WLAN standard operating in the 2.4 GHz frequency band |
802.11g | WLAN standard operating in the 2.4 GHz frequency band with higher data rates than 802.11b |
802.11n | WLAN standard with improved speed and range |
802.11ac | WLAN standard with even higher speed and range than 802.11n |
802.11ax | WLAN standard designed for high-density environments with many devices |
802.15 | Wireless personal area network (WPAN) standard |
802.15.4 | Low-rate WPAN standard used in Zigbee and other mesh networking protocols |
802.16 | Broadband Wireless Access (BWA) standard |
802.22 | Wireless regional area network (WRAN) standard for long-range, rural broadband |
The IEEE 802 standard is a set of specifications for LANs and WANs that define how devices communicate with each other over a network. Each 802 standard focuses on a specific aspect of networking, such as Ethernet, wireless LANs, or network access control. The standard is maintained by the IEEE 802 LAN/MAN Standards Committee, which works to develop and update the standards as networking technology evolves.
Subnetting
Subnet Mask | CIDR | Usable IPs | Network Address | Broadcast Address |
---|---|---|---|---|
255.255.255.128 | /25 | 126 | 192.168.1.0 | 192.168.1.127 |
255.255.255.192 | /26 | 62 | 192.168.1.0 | 192.168.1.63 |
255.255.255.224 | /27 | 30 | 192.168.1.0 | 192.168.1.31 |
255.255.255.240 | /28 | 14 | 192.168.1.0 | 192.168.1.15 |
255.255.255.248 | /29 | 6 | 192.168.1.0 | 192.168.1.7 |
255.255.255.252 | /30 | 2 | 192.168.1.0 | 192.168.1.3 |
Subnetting is the process of dividing a network into smaller, more manageable sub-networks, or subnets. Subnetting allows network administrators to better organize and manage their networks, and it also helps improve network performance and security.
The subnet mask is used to identify the network and host portions of an IP address. The CIDR notation is used to specify the number of bits in the subnet mask. The usable IPs column refers to the number of IP addresses available for hosts on each subnet. The network address column refers to the first IP address in each subnet, while the broadcast address column refers to the last IP address in each subnet.
Default Gateway
Operating System | Default Gateway Format |
---|---|
Windows | 0.0.0.0 |
macOS | 0.0.0.0 |
Linux | 0.0.0.0 |
Cisco IOS | 0.0.0.0 |
The default gateway is the IP address of the router that a device uses to send traffic to destinations outside of its own network.
On most operating systems, the default gateway is specified as 0.0.0.0, which means that any traffic that is not destined for the local network will be sent to the default gateway.
In Cisco IOS, the default gateway is also specified as 0.0.0.0, but it can be changed to a specific IP address using the “ip default-gateway” command.
It’s important to configure the default gateway correctly to ensure that devices can communicate with other networks and the internet.
DNS
Record Type | Description |
---|---|
A | Maps a hostname to an IPv4 address |
AAAA | Maps a hostname to an IPv6 address |
CNAME | Maps an alias hostname to the canonical hostname |
MX | Specifies the mail exchange server(s) for a domain |
TXT | Stores arbitrary text data associated with a hostname |
NS | Specifies the name server(s) for a domain |
DNS, or Domain Name System, is a hierarchical naming system used to translate human-readable domain names into IP addresses that machines can understand.
DNS uses various types of resource records, or DNS records, to store information about domain names and their associated IP addresses. The A record maps a hostname to an IPv4 address, while the AAAA record maps a hostname to an IPv6 address. The CNAME record maps an alias hostname to the canonical hostname.
The MX record specifies the mail exchange server(s) for a domain, while the TXT record stores arbitrary text data associated with a hostname. The NS record specifies the name server(s) for a domain.
DNS is a critical component of the internet infrastructure, and it is used for a wide range of applications, including web browsing, email, and online gaming.
MAC Address
MAC Address | Manufacturer | Interface |
---|---|---|
00-11-22-33-44-55 | Intel | Ethernet |
00-66-77-88-99-AA | Cisco | Ethernet |
44-33-22-11-00-FF | Apple | Wi-Fi |
11-22-33-44-55-66 | Samsung | Bluetooth |
DHCP
DHCP Option | Description |
---|---|
1 | Subnet Mask |
3 | Default Gateway |
6 | DNS Server |
15 | DNS Domain Name |
51 | Lease Time |
53 | DHCP Message Type |
54 | DHCP Server Identifier |
55 | Parameter Request List |
58 | Renewal Time |
59 | Rebinding Time |
82 | DHCP Relay Agent Information |
DHCP, or Dynamic Host Configuration Protocol, is a protocol used to automatically assign IP addresses and other network configuration parameters to devices on a network.
DHCP options are additional configuration parameters that can be assigned to devices along with an IP address. Option 1 specifies the subnet mask, while option 3 specifies the default gateway. Option 6 specifies the DNS server(s), while option 15 specifies the DNS domain name.
Option 51 specifies the length of time for which a device can use its assigned IP address, while option 53 specifies the type of DHCP message being sent. Option 54 specifies the IP address of the DHCP server, while option 55 specifies the list of parameters that the device is requesting.
Options 58 and 59 specify the time periods for renewing and rebinding the lease, respectively. Option 82 is used by DHCP relay agents to include additional information about the client and the network in the DHCP request message.
DHCP is commonly used in large networks to simplify network administration and reduce the risk of IP address conflicts.
NAT
NAT Type | Description |
---|---|
Static NAT | Maps a public IP address to a single private IP address |
Dynamic NAT | Maps a public IP address to a pool of private IP addresses |
PAT (Port Address Translation) | Maps a public IP address and port to a private IP address and port |
NAT, or Network Address Translation, is a technique used to allow multiple devices on a private network to share a single public IP address.
Static NAT maps a single public IP address to a specific private IP address, while dynamic NAT maps a public IP address to a pool of private IP addresses. This allows multiple devices on a private network to share a single public IP address, as each device is assigned a unique private IP address from the pool.
PAT, or Port Address Translation, is a form of NAT that maps a public IP address and port to a private IP address and port. This allows multiple devices on a private network to share a single public IP address, with each device being assigned a unique port number.
NAT is commonly used in small to medium-sized networks to allow devices on a private network to access the internet using a single public IP address.
VLAN
VLAN Type | Description |
---|---|
Port-Based VLAN | Assigns devices to VLANs based on the switch port they are connected to |
Tag-Based VLAN | Assigns devices to VLANs based on a unique VLAN ID that is added to each Ethernet frame |
VLAN, or Virtual Local Area Network, is a technique used to create logical groups of devices on a physical network.
Port-based VLAN assigns devices to VLANs based on the switch port they are connected to. For example, all devices connected to switch port 1 may be assigned to VLAN 1, while all devices connected to switch port 2 may be assigned to VLAN 2.
Tag-based VLAN assigns devices to VLANs based on a unique VLAN ID that is added to each Ethernet frame. This allows devices to be assigned to VLANs regardless of which switch port they are connected to, as long as they are configured to use the correct VLAN ID.
VLANs are commonly used in large networks to improve network security, optimize network performance, and simplify network administration. By creating separate logical networks for different departments or functions, VLANs can reduce network congestion and improve overall network efficiency.
VPN
VPN Type | Description |
---|---|
Site-to-Site VPN | Connects two or more networks together over the internet |
Remote Access VPN | Allows remote users to securely access a private network over the internet |
VPN, or Virtual Private Network, is a technique used to create a secure and encrypted connection over the internet between two or more devices or networks.
Site-to-Site VPN connects two or more networks together over the internet, allowing devices on each network to communicate securely with devices on the other network(s). This is commonly used by businesses with multiple locations or by organizations that need to securely connect with partner networks.
Remote Access VPN allows remote users to securely access a private network over the internet. This is commonly used by employees who need to access company resources from a remote location, such as from home or while traveling. Remote access VPN can be configured to require user authentication and can be set up to provide access to specific network resources.
VPNs use encryption and tunneling protocols to ensure that data transmitted over the internet is secure and protected from unauthorized access. VPNs are commonly used in businesses and organizations to improve network security and enable remote access to network resources.
Firewall
Firewall Type | Description |
---|---|
Network Firewall | Protects an entire network from unauthorized access and attacks |
Host-based Firewall | Protects an individual computer from unauthorized access and attacks |
Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Network Firewall is a firewall that protects an entire network from unauthorized access and attacks. Network firewalls can be hardware or software-based and are typically installed at the perimeter of a network to block unauthorized access from the internet.
Host-based Firewall is a firewall that protects an individual computer from unauthorized access and attacks. Host-based firewalls are typically software-based and are installed on individual computers to control access to network resources and block unauthorized traffic.
Firewalls use a variety of techniques to control and monitor network traffic, including packet filtering, stateful inspection, and application-level filtering. By blocking unauthorized access and filtering out malicious traffic, firewalls help to protect networks and the data transmitted over them from security threats.
Port
Port Number | Protocol | Description |
---|---|---|
21 | FTP | File Transfer Protocol |
22 | SSH | Secure Shell |
25 | SMTP | Simple Mail Transfer Protocol |
53 | DNS | Domain Name System |
80 | HTTP | Hypertext Transfer Protocol |
110 | POP3 | Post Office Protocol version 3 |
143 | IMAP | Internet Message Access Protocol |
443 | HTTPS | HTTP Secure |
A port is a number used by networking protocols to identify a specific process or service on a network device.
Each port number is associated with a specific protocol or service. For example, port 21 is associated with FTP (File Transfer Protocol), which is used for transferring files between computers over a network. Port 80 is associated with HTTP (Hypertext Transfer Protocol), which is used for web browsing and accessing web pages.
Ports are used by network devices to route incoming traffic to the correct process or service. By default, each protocol or service is assigned a specific port number, although this can be changed by the network administrator if needed.
Port numbers are an important aspect of network security, as some ports are more vulnerable to attacks than others. Network administrators can use firewalls and other security measures to block incoming traffic on certain ports to improve network security.
Switch
Switch Type | Description |
---|---|
Unmanaged Switch | Simple plug-and-play switch without configuration options |
Managed Switch | Configurable switch with advanced features and network management capabilities |
A switch is a networking device that connects devices on a network and allows them to communicate with each other.
Unmanaged Switch is a plug-and-play switch that does not require any configuration. Unmanaged switches are typically used in small networks where there are only a few devices that need to be connected.
Managed Switch is a switch that has advanced features and network management capabilities. Managed switches can be configured to allow for better network optimization, security, and troubleshooting. Managed switches are typically used in larger networks where there are multiple devices that need to be connected and managed.
Switches use a technique called packet switching to forward data between devices on a network. Switches create a virtual circuit between the devices on the network, allowing them to communicate with each other without interference from other devices on the network.
Switches can also be used to create VLANs (Virtual Local Area Networks), which are used to separate different groups of devices on a network for improved security and network performance. Managed switches provide more advanced VLAN configuration options and can be used to create more complex network topologies.
Router
Router Type | Description |
---|---|
Wired Router | Connects devices on a network using wired connections |
Wireless Router | Connects devices on a network using wireless connections |
Edge Router | Connects an internal network to an external network, such as the internet |
Core Router | Routes traffic between different networks within a large organization |
A router is a networking device that connects multiple networks and forwards data packets between them.
Wired Router is a router that connects devices on a network using wired connections, such as Ethernet cables. Wired routers are typically used in small to medium-sized networks.
Wireless Router is a router that connects devices on a network using wireless connections, such as Wi-Fi. Wireless routers are typically used in home and small office networks.
Edge Router is a router that connects an internal network to an external network, such as the internet. Edge routers are typically used in large networks and are responsible for routing traffic between the internal network and the external network.
Core Router is a router that routes traffic between different networks within a large organization. Core routers are typically used in large enterprise networks and are responsible for handling large volumes of traffic and ensuring high network performance.
Routers use routing tables to determine the best path for forwarding data packets between networks. Routers also use a variety of protocols, such as Border Gateway Protocol (BGP) and Open Shortest Path First (OSPF), to exchange routing information with other routers on the network.
By forwarding data packets between networks, routers allow devices on different networks to communicate with each other, enabling the internet and other large-scale networks to function.
Bandwidth
Term | Description |
---|---|
Bandwidth | The maximum amount of data that can be transmitted over a network in a given time period |
Throughput | The actual amount of data that is transmitted over a network in a given time period |
Latency | The time it takes for a data packet to travel from one point on a network to another point |
Jitter | The variation in latency over time |
Bandwidth is the maximum amount of data that can be transmitted over a network in a given time period, typically measured in bits per second (bps) or bytes per second (Bps). Bandwidth is determined by the capacity of the network connection, such as the speed of an internet connection or the capacity of a network cable.
Throughput is the actual amount of data that is transmitted over a network in a given time period, typically measured in bits per second (bps) or bytes per second (Bps). Throughput is influenced by a variety of factors, such as network congestion, packet loss, and errors in the network.
Latency is the time it takes for a data packet to travel from one point on a network to another point. Latency is influenced by factors such as the physical distance between devices, the number of devices on the network, and the speed of the network connection.
Jitter is the variation in latency over time. Jitter is typically caused by network congestion, packet loss, and other factors that can cause delays in the transmission of data packets.
Bandwidth, throughput, latency, and jitter are important factors in network performance and can impact the speed and reliability of data transmission. Network administrators often use tools such as network analyzers and bandwidth monitoring software to measure and analyze these metrics to optimize network performance.
Latency
Term | Description |
---|---|
Latency | The time it takes for a data packet to travel from one point on a network to another point |
Round Trip Time (RTT) | The time it takes for a data packet to travel from a device to a destination and back |
Ping | A network tool used to measure latency by sending a small data packet to a destination and measuring the time it takes to receive a response |
Quality of Service (QoS) | A network management technique used to prioritize certain types of network traffic to reduce latency and improve network performance |
Latency is the time it takes for a data packet to travel from one point on a network to another point, typically measured in milliseconds (ms). Latency is influenced by factors such as the physical distance between devices, the number of devices on the network, and the speed of the network connection.
Round Trip Time (RTT) is the time it takes for a data packet to travel from a device to a destination and back. RTT is typically measured using a network tool such as ping.
Ping is a network tool used to measure latency by sending a small data packet to a destination and measuring the time it takes to receive a response. Ping is often used to diagnose network connectivity issues and measure network performance.
Quality of Service (QoS) is a network management technique used to prioritize certain types of network traffic to reduce latency and improve network performance. QoS can be used to prioritize critical network traffic such as voice and video to ensure high-quality communication.
Reducing latency is important for many applications such as online gaming, video conferencing, and real-time data processing. Network administrators can use a variety of techniques such as QoS, traffic shaping, and network optimization to reduce latency and improve network performance.
Throughput
Term | Description |
---|---|
Throughput | The amount of data that can be transmitted over a network in a given period of time |
Bandwidth | The maximum amount of data that can be transmitted over a network in a given period of time |
Data Transfer Rate | The rate at which data can be transmitted over a network |
Goodput | The actual amount of useful data that is transmitted over a network, excluding any protocol overhead |
Throughput is the amount of data that can be transmitted over a network in a given period of time, typically measured in bits per second (bps), kilobits per second (Kbps), or megabits per second (Mbps). Throughput is influenced by factors such as network congestion, the number of devices on the network, and the speed of the network connection.
Bandwidth is the maximum amount of data that can be transmitted over a network in a given period of time, typically measured in bps, Kbps, or Mbps. Bandwidth is determined by the speed of the network connection and is often used interchangeably with throughput.
Data Transfer Rate is the rate at which data can be transmitted over a network, typically measured in bps, Kbps, or Mbps. Data Transfer Rate takes into account any protocol overhead and is a more accurate measure of the actual data throughput of a network.
Goodput is the actual amount of useful data that is transmitted over a network, excluding any protocol overhead. Goodput is typically lower than throughput because of the additional data overhead required by network protocols.
Improving throughput is important for many applications such as file transfers, video streaming, and online gaming. Network administrators can use a variety of techniques such as network optimization, load balancing, and Quality of Service (QoS) to improve network throughput and ensure a better user experience.
Conclusion
In conclusion, networking can be a complex and challenging field, but having a comprehensive cheatsheet of key concepts and terminology can make it easier to understand and navigate. We hope that this ultimate networking cheatsheet has provided you with a valuable resource for mastering the basics and beyond, and that you’ll use it as a reference in your networking journey. Whether you’re studying for a certification exam, troubleshooting network issues, or simply looking to expand your knowledge, this cheatsheet is the perfect tool to have in your arsenal.