Networking can be a complex and technical field, full of jargon and terminology that can be overwhelming for beginners. Whether you’re a seasoned IT professional or just starting out in the field, having a cheatsheet of key networking concepts and terminology can be a valuable resource. In this article, we’ll provide you with the ultimate networking cheatsheet, covering everything from the basics of networking to more advanced topics, such as routing protocols and network security.

Desktop View Recommended

Computer Network Protocols

Computer network protocols are a set of rules and standards that define how data is transmitted and received over a network. Each protocol serves a specific purpose and is designed to work with other protocols to enable efficient and reliable communication between devices.

ProtocolDescription
HTTPHypertext Transfer Protocol used for web browsing
HTTPSHTTP over SSL/TLS encrypted protocol for secure web browsing
FTPFile Transfer Protocol used for transferring files between computers
SSHSecure Shell protocol used for secure remote access and file transfer
SMTPSimple Mail Transfer Protocol used for sending email messages between servers
POPPost Office Protocol used for retrieving email messages from a mail server
IMAPInternet Message Access Protocol used for retrieving email messages and managing mailboxes on a mail server
DNSDomain Name System protocol used for translating domain names into IP addresses
DHCPDynamic Host Configuration Protocol used for assigning IP addresses to devices on a network
SNMPSimple Network Management Protocol used for managing and monitoring network devices
TCPTransmission Control Protocol used for establishing reliable connections between devices on a network
UDPUser Datagram Protocol used for establishing unreliable connections between devices on a network
ICMPInternet Control Message Protocol used for error reporting and diagnostic messages
ARPAddress Resolution Protocol used for mapping IP addresses to MAC addresses

Network Topologies

Network TopologyDescription
Bus TopologyA single cable connects all devices in a linear sequence. Each device communicates with the others through the cable. If the cable fails, the entire network goes down.
Star TopologyAll devices are connected to a central hub or switch. If a cable fails, only the device connected to that cable is affected.
Ring TopologyDevices are connected in a circular loop. Each device communicates with the device next to it, and messages travel around the loop in one direction. If a cable fails, the entire network goes down.
Mesh TopologyEach device is connected to every other device in the network. This provides redundancy and fault tolerance, but requires more cabling than other topologies.
Tree TopologyAlso known as a hierarchical topology, devices are organized in a hierarchical structure with multiple levels. This provides scalability and fault tolerance, but can be complex to manage.
Hybrid TopologyA combination of two or more different topologies. This provides the benefits of each topology, but can be more complex to manage.

Classes in Computer Networking

Computer networks use IP addresses to identify devices on a network. The IP address is divided into four octets, with each octet containing 8 bits. Classes in computer networking refer to the range of IP addresses that are assigned to a network based on the first octet of the IP address.

ClassRange of IP AddressesDefault Subnet Mask
Class A1.0.0.0 to 126.255.255.255255.0.0.0
Class B128.0.0.0 to 191.255.255.255255.255.0.0
Class C192.0.0.0 to 223.255.255.255255.255.255.0
Class D224.0.0.0 to 239.255.255.255N/A
Class E240.0.0.0 to 255.255.255.255N/A

Class A networks use IP addresses in the range of 1.0.0.0 to 126.255.255.255, with the first octet representing the network ID and the remaining three octets representing the host ID. The default subnet mask for Class A networks is 255.0.0.0.

Class B networks use IP addresses in the range of 128.0.0.0 to 191.255.255.255, with the first two octets representing the network ID and the remaining two octets representing the host ID. The default subnet mask for Class B networks is 255.255.0.0.

Class C networks use IP addresses in the range of 192.0.0.0 to 223.255.255.255, with the first three octets representing the network ID and the remaining octet representing the host ID. The default subnet mask for Class C networks is 255.255.255.0.

Class D and Class E networks are reserved for special purposes and are not typically used for standard network addressing. Class D addresses are used for multicast addressing, while Class E addresses are reserved for experimental purposes.

Understanding IP address classes is important for subnetting and network planning, as it allows network administrators to efficiently allocate IP addresses and design networks that meet their specific needs.

OSI Model

LayerNameDescriptionProtocol Data Unit (PDU)
7ApplicationProvides user interfaces and support for services such as email, file transfer, and network printingData
6PresentationFormats and encrypts data for transmissionData
5SessionManages connections between applicationsData
4TransportProvides reliable, end-to-end data delivery and error recoverySegment
3NetworkDetermines the best path for data transmission and performs logical addressingPacket
2Data LinkTransfers data between network devices and manages physical addressingFrame
1PhysicalDefines physical specifications for network hardware and cablingBit

TCP/IP Model

LayerNameDescriptionProtocol Data Unit (PDU)
4ApplicationProvides network services to end-user applications, such as email, file transfer, and web browsingData
3TransportProvides reliable, end-to-end data delivery and error recoverySegment
2InternetDetermines the best path for data transmission and performs logical addressingPacket
1Network Access/LinkTransfers data between network devices and manages physical addressingFrame

The TCP/IP model is a four-layered model used for communication over the Internet. It stands for Transmission Control Protocol/Internet Protocol, and it is the most widely used networking protocol suite in the world. The TCP/IP model is less structured than the OSI model, and its layers are more closely integrated.

The Application layer corresponds to layers 5, 6, and 7 of the OSI model, and it provides network services to end-user applications, such as email, file transfer, and web browsing. The Transport layer corresponds to layer 4 of the OSI model, and it provides reliable, end-to-end data delivery and error recovery. The Internet layer corresponds to layer 3 of the OSI model, and it determines the best path for data transmission and performs logical addressing. The Network Access/Link layer corresponds to layers 1 and 2 of the OSI model, and it transfers data between network devices and manages physical addressing.

SSL/TLS (Secure Sockets Layer/Transport Layer Security)

ProtocolPurposeKey Features
SSLSecure communication over a networkEncryption, authentication, message integrity
TLS 1.0Secure communication over a networkEncryption, authentication, message integrity
TLS 1.1Secure communication over a networkEncryption, authentication, message integrity, improved security over TLS 1.0
TLS 1.2Secure communication over a networkEncryption, authentication, message integrity, improved security over TLS 1.1, support for newer cryptographic algorithms
TLS 1.3Secure communication over a networkEncryption, authentication, message integrity, improved security over TLS 1.2, faster and more efficient, support for only the strongest cryptographic algorithms

IP Addressing

ClassRangeDefault Subnet Mask
A1.0.0.0 – 126.255.255.255255.0.0.0
B128.0.0.0 – 191.255.255.255255.255.0.0
C192.0.0.0 – 223.255.255.255255.255.255.0
D224.0.0.0 – 239.255.255.255Not applicable
E240.0.0.0 – 255.255.255.255Not applicable

IP addressing is the process of assigning unique numerical identifiers to devices on a network. An IP address consists of four numbers separated by periods, each ranging from 0 to 255. IP addresses are divided into classes, each of which has a default subnet mask.

Class A addresses are used for large networks, with the first octet representing the network and the remaining three octets representing the hosts. Class B addresses are used for medium-sized networks, with the first two octets representing the network and the remaining two octets representing the hosts. Class C addresses are used for small networks, with the first three octets representing the network and the remaining octet representing the hosts.

Class D addresses are used for multicast groups, while Class E addresses are reserved for experimental use.

IEEE 802

IEEE 802 StandardDescription
802.1QVirtual LAN (VLAN) tagging standard
802.1XPort-based network access control (PNAC) standard
802.2Logical link control (LLC) layer protocol
802.3Ethernet standard
802.3abGigabit Ethernet standard
802.3ae10 Gigabit Ethernet standard
802.3afPower over Ethernet (PoE) standard
802.3atPoE+ standard
802.3bt4-pair PoE standard
802.11Wireless LAN (WLAN) standard
802.11aWLAN standard operating in the 5 GHz frequency band
802.11bWLAN standard operating in the 2.4 GHz frequency band
802.11gWLAN standard operating in the 2.4 GHz frequency band with higher data rates than 802.11b
802.11nWLAN standard with improved speed and range
802.11acWLAN standard with even higher speed and range than 802.11n
802.11axWLAN standard designed for high-density environments with many devices
802.15Wireless personal area network (WPAN) standard
802.15.4Low-rate WPAN standard used in Zigbee and other mesh networking protocols
802.16Broadband Wireless Access (BWA) standard
802.22Wireless regional area network (WRAN) standard for long-range, rural broadband

The IEEE 802 standard is a set of specifications for LANs and WANs that define how devices communicate with each other over a network. Each 802 standard focuses on a specific aspect of networking, such as Ethernet, wireless LANs, or network access control. The standard is maintained by the IEEE 802 LAN/MAN Standards Committee, which works to develop and update the standards as networking technology evolves.

Subnetting

Subnet MaskCIDRUsable IPsNetwork AddressBroadcast Address
255.255.255.128/25126192.168.1.0192.168.1.127
255.255.255.192/2662192.168.1.0192.168.1.63
255.255.255.224/2730192.168.1.0192.168.1.31
255.255.255.240/2814192.168.1.0192.168.1.15
255.255.255.248/296192.168.1.0192.168.1.7
255.255.255.252/302192.168.1.0192.168.1.3

Subnetting is the process of dividing a network into smaller, more manageable sub-networks, or subnets. Subnetting allows network administrators to better organize and manage their networks, and it also helps improve network performance and security.

The subnet mask is used to identify the network and host portions of an IP address. The CIDR notation is used to specify the number of bits in the subnet mask. The usable IPs column refers to the number of IP addresses available for hosts on each subnet. The network address column refers to the first IP address in each subnet, while the broadcast address column refers to the last IP address in each subnet.

Default Gateway

Operating SystemDefault Gateway Format
Windows0.0.0.0
macOS0.0.0.0
Linux0.0.0.0
Cisco IOS0.0.0.0

The default gateway is the IP address of the router that a device uses to send traffic to destinations outside of its own network.

On most operating systems, the default gateway is specified as 0.0.0.0, which means that any traffic that is not destined for the local network will be sent to the default gateway.

In Cisco IOS, the default gateway is also specified as 0.0.0.0, but it can be changed to a specific IP address using the “ip default-gateway” command.

It’s important to configure the default gateway correctly to ensure that devices can communicate with other networks and the internet.

DNS

Record TypeDescription
AMaps a hostname to an IPv4 address
AAAAMaps a hostname to an IPv6 address
CNAMEMaps an alias hostname to the canonical hostname
MXSpecifies the mail exchange server(s) for a domain
TXTStores arbitrary text data associated with a hostname
NSSpecifies the name server(s) for a domain

DNS, or Domain Name System, is a hierarchical naming system used to translate human-readable domain names into IP addresses that machines can understand.

DNS uses various types of resource records, or DNS records, to store information about domain names and their associated IP addresses. The A record maps a hostname to an IPv4 address, while the AAAA record maps a hostname to an IPv6 address. The CNAME record maps an alias hostname to the canonical hostname.

The MX record specifies the mail exchange server(s) for a domain, while the TXT record stores arbitrary text data associated with a hostname. The NS record specifies the name server(s) for a domain.

DNS is a critical component of the internet infrastructure, and it is used for a wide range of applications, including web browsing, email, and online gaming.

MAC Address

MAC AddressManufacturerInterface
00-11-22-33-44-55IntelEthernet
00-66-77-88-99-AACiscoEthernet
44-33-22-11-00-FFAppleWi-Fi
11-22-33-44-55-66SamsungBluetooth

DHCP

DHCP OptionDescription
1Subnet Mask
3Default Gateway
6DNS Server
15DNS Domain Name
51Lease Time
53DHCP Message Type
54DHCP Server Identifier
55Parameter Request List
58Renewal Time
59Rebinding Time
82DHCP Relay Agent Information

DHCP, or Dynamic Host Configuration Protocol, is a protocol used to automatically assign IP addresses and other network configuration parameters to devices on a network.

DHCP options are additional configuration parameters that can be assigned to devices along with an IP address. Option 1 specifies the subnet mask, while option 3 specifies the default gateway. Option 6 specifies the DNS server(s), while option 15 specifies the DNS domain name.

Option 51 specifies the length of time for which a device can use its assigned IP address, while option 53 specifies the type of DHCP message being sent. Option 54 specifies the IP address of the DHCP server, while option 55 specifies the list of parameters that the device is requesting.

Options 58 and 59 specify the time periods for renewing and rebinding the lease, respectively. Option 82 is used by DHCP relay agents to include additional information about the client and the network in the DHCP request message.

DHCP is commonly used in large networks to simplify network administration and reduce the risk of IP address conflicts.

NAT

NAT TypeDescription
Static NATMaps a public IP address to a single private IP address
Dynamic NATMaps a public IP address to a pool of private IP addresses
PAT (Port Address Translation)Maps a public IP address and port to a private IP address and port

NAT, or Network Address Translation, is a technique used to allow multiple devices on a private network to share a single public IP address.

Static NAT maps a single public IP address to a specific private IP address, while dynamic NAT maps a public IP address to a pool of private IP addresses. This allows multiple devices on a private network to share a single public IP address, as each device is assigned a unique private IP address from the pool.

PAT, or Port Address Translation, is a form of NAT that maps a public IP address and port to a private IP address and port. This allows multiple devices on a private network to share a single public IP address, with each device being assigned a unique port number.

NAT is commonly used in small to medium-sized networks to allow devices on a private network to access the internet using a single public IP address.

VLAN

VLAN TypeDescription
Port-Based VLANAssigns devices to VLANs based on the switch port they are connected to
Tag-Based VLANAssigns devices to VLANs based on a unique VLAN ID that is added to each Ethernet frame

VLAN, or Virtual Local Area Network, is a technique used to create logical groups of devices on a physical network.

Port-based VLAN assigns devices to VLANs based on the switch port they are connected to. For example, all devices connected to switch port 1 may be assigned to VLAN 1, while all devices connected to switch port 2 may be assigned to VLAN 2.

Tag-based VLAN assigns devices to VLANs based on a unique VLAN ID that is added to each Ethernet frame. This allows devices to be assigned to VLANs regardless of which switch port they are connected to, as long as they are configured to use the correct VLAN ID.

VLANs are commonly used in large networks to improve network security, optimize network performance, and simplify network administration. By creating separate logical networks for different departments or functions, VLANs can reduce network congestion and improve overall network efficiency.

VPN

VPN TypeDescription
Site-to-Site VPNConnects two or more networks together over the internet
Remote Access VPNAllows remote users to securely access a private network over the internet

VPN, or Virtual Private Network, is a technique used to create a secure and encrypted connection over the internet between two or more devices or networks.

Site-to-Site VPN connects two or more networks together over the internet, allowing devices on each network to communicate securely with devices on the other network(s). This is commonly used by businesses with multiple locations or by organizations that need to securely connect with partner networks.

Remote Access VPN allows remote users to securely access a private network over the internet. This is commonly used by employees who need to access company resources from a remote location, such as from home or while traveling. Remote access VPN can be configured to require user authentication and can be set up to provide access to specific network resources.

VPNs use encryption and tunneling protocols to ensure that data transmitted over the internet is secure and protected from unauthorized access. VPNs are commonly used in businesses and organizations to improve network security and enable remote access to network resources.

Firewall

Firewall TypeDescription
Network FirewallProtects an entire network from unauthorized access and attacks
Host-based FirewallProtects an individual computer from unauthorized access and attacks

Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

Network Firewall is a firewall that protects an entire network from unauthorized access and attacks. Network firewalls can be hardware or software-based and are typically installed at the perimeter of a network to block unauthorized access from the internet.

Host-based Firewall is a firewall that protects an individual computer from unauthorized access and attacks. Host-based firewalls are typically software-based and are installed on individual computers to control access to network resources and block unauthorized traffic.

Firewalls use a variety of techniques to control and monitor network traffic, including packet filtering, stateful inspection, and application-level filtering. By blocking unauthorized access and filtering out malicious traffic, firewalls help to protect networks and the data transmitted over them from security threats.

Port

Port NumberProtocolDescription
21FTPFile Transfer Protocol
22SSHSecure Shell
25SMTPSimple Mail Transfer Protocol
53DNSDomain Name System
80HTTPHypertext Transfer Protocol
110POP3Post Office Protocol version 3
143IMAPInternet Message Access Protocol
443HTTPSHTTP Secure

A port is a number used by networking protocols to identify a specific process or service on a network device.

Each port number is associated with a specific protocol or service. For example, port 21 is associated with FTP (File Transfer Protocol), which is used for transferring files between computers over a network. Port 80 is associated with HTTP (Hypertext Transfer Protocol), which is used for web browsing and accessing web pages.

Ports are used by network devices to route incoming traffic to the correct process or service. By default, each protocol or service is assigned a specific port number, although this can be changed by the network administrator if needed.

Port numbers are an important aspect of network security, as some ports are more vulnerable to attacks than others. Network administrators can use firewalls and other security measures to block incoming traffic on certain ports to improve network security.

Switch

Switch TypeDescription
Unmanaged SwitchSimple plug-and-play switch without configuration options
Managed SwitchConfigurable switch with advanced features and network management capabilities

A switch is a networking device that connects devices on a network and allows them to communicate with each other.

Unmanaged Switch is a plug-and-play switch that does not require any configuration. Unmanaged switches are typically used in small networks where there are only a few devices that need to be connected.

Managed Switch is a switch that has advanced features and network management capabilities. Managed switches can be configured to allow for better network optimization, security, and troubleshooting. Managed switches are typically used in larger networks where there are multiple devices that need to be connected and managed.

Switches use a technique called packet switching to forward data between devices on a network. Switches create a virtual circuit between the devices on the network, allowing them to communicate with each other without interference from other devices on the network.

Switches can also be used to create VLANs (Virtual Local Area Networks), which are used to separate different groups of devices on a network for improved security and network performance. Managed switches provide more advanced VLAN configuration options and can be used to create more complex network topologies.

Router

Router TypeDescription
Wired RouterConnects devices on a network using wired connections
Wireless RouterConnects devices on a network using wireless connections
Edge RouterConnects an internal network to an external network, such as the internet
Core RouterRoutes traffic between different networks within a large organization

A router is a networking device that connects multiple networks and forwards data packets between them.

Wired Router is a router that connects devices on a network using wired connections, such as Ethernet cables. Wired routers are typically used in small to medium-sized networks.

Wireless Router is a router that connects devices on a network using wireless connections, such as Wi-Fi. Wireless routers are typically used in home and small office networks.

Edge Router is a router that connects an internal network to an external network, such as the internet. Edge routers are typically used in large networks and are responsible for routing traffic between the internal network and the external network.

Core Router is a router that routes traffic between different networks within a large organization. Core routers are typically used in large enterprise networks and are responsible for handling large volumes of traffic and ensuring high network performance.

Routers use routing tables to determine the best path for forwarding data packets between networks. Routers also use a variety of protocols, such as Border Gateway Protocol (BGP) and Open Shortest Path First (OSPF), to exchange routing information with other routers on the network.

By forwarding data packets between networks, routers allow devices on different networks to communicate with each other, enabling the internet and other large-scale networks to function.

Bandwidth

TermDescription
BandwidthThe maximum amount of data that can be transmitted over a network in a given time period
ThroughputThe actual amount of data that is transmitted over a network in a given time period
LatencyThe time it takes for a data packet to travel from one point on a network to another point
JitterThe variation in latency over time

Bandwidth is the maximum amount of data that can be transmitted over a network in a given time period, typically measured in bits per second (bps) or bytes per second (Bps). Bandwidth is determined by the capacity of the network connection, such as the speed of an internet connection or the capacity of a network cable.

Throughput is the actual amount of data that is transmitted over a network in a given time period, typically measured in bits per second (bps) or bytes per second (Bps). Throughput is influenced by a variety of factors, such as network congestion, packet loss, and errors in the network.

Latency is the time it takes for a data packet to travel from one point on a network to another point. Latency is influenced by factors such as the physical distance between devices, the number of devices on the network, and the speed of the network connection.

Jitter is the variation in latency over time. Jitter is typically caused by network congestion, packet loss, and other factors that can cause delays in the transmission of data packets.

Bandwidth, throughput, latency, and jitter are important factors in network performance and can impact the speed and reliability of data transmission. Network administrators often use tools such as network analyzers and bandwidth monitoring software to measure and analyze these metrics to optimize network performance.

Latency

TermDescription
LatencyThe time it takes for a data packet to travel from one point on a network to another point
Round Trip Time (RTT)The time it takes for a data packet to travel from a device to a destination and back
PingA network tool used to measure latency by sending a small data packet to a destination and measuring the time it takes to receive a response
Quality of Service (QoS)A network management technique used to prioritize certain types of network traffic to reduce latency and improve network performance

Latency is the time it takes for a data packet to travel from one point on a network to another point, typically measured in milliseconds (ms). Latency is influenced by factors such as the physical distance between devices, the number of devices on the network, and the speed of the network connection.

Round Trip Time (RTT) is the time it takes for a data packet to travel from a device to a destination and back. RTT is typically measured using a network tool such as ping.

Ping is a network tool used to measure latency by sending a small data packet to a destination and measuring the time it takes to receive a response. Ping is often used to diagnose network connectivity issues and measure network performance.

Quality of Service (QoS) is a network management technique used to prioritize certain types of network traffic to reduce latency and improve network performance. QoS can be used to prioritize critical network traffic such as voice and video to ensure high-quality communication.

Reducing latency is important for many applications such as online gaming, video conferencing, and real-time data processing. Network administrators can use a variety of techniques such as QoS, traffic shaping, and network optimization to reduce latency and improve network performance.

Throughput

TermDescription
ThroughputThe amount of data that can be transmitted over a network in a given period of time
BandwidthThe maximum amount of data that can be transmitted over a network in a given period of time
Data Transfer RateThe rate at which data can be transmitted over a network
GoodputThe actual amount of useful data that is transmitted over a network, excluding any protocol overhead

Throughput is the amount of data that can be transmitted over a network in a given period of time, typically measured in bits per second (bps), kilobits per second (Kbps), or megabits per second (Mbps). Throughput is influenced by factors such as network congestion, the number of devices on the network, and the speed of the network connection.

Bandwidth is the maximum amount of data that can be transmitted over a network in a given period of time, typically measured in bps, Kbps, or Mbps. Bandwidth is determined by the speed of the network connection and is often used interchangeably with throughput.

Data Transfer Rate is the rate at which data can be transmitted over a network, typically measured in bps, Kbps, or Mbps. Data Transfer Rate takes into account any protocol overhead and is a more accurate measure of the actual data throughput of a network.

Goodput is the actual amount of useful data that is transmitted over a network, excluding any protocol overhead. Goodput is typically lower than throughput because of the additional data overhead required by network protocols.

Improving throughput is important for many applications such as file transfers, video streaming, and online gaming. Network administrators can use a variety of techniques such as network optimization, load balancing, and Quality of Service (QoS) to improve network throughput and ensure a better user experience.

Conclusion

In conclusion, networking can be a complex and challenging field, but having a comprehensive cheatsheet of key concepts and terminology can make it easier to understand and navigate. We hope that this ultimate networking cheatsheet has provided you with a valuable resource for mastering the basics and beyond, and that you’ll use it as a reference in your networking journey. Whether you’re studying for a certification exam, troubleshooting network issues, or simply looking to expand your knowledge, this cheatsheet is the perfect tool to have in your arsenal.

Shares:

Leave a Reply

Your email address will not be published. Required fields are marked *