← Home

CompTIA Network+ Study Guide

Networking Fundamentals

OSI Model and Network Layers

The OSI (Open Systems Interconnection) model is a seven-layer framework that describes how network communication occurs. Understanding each layer is critical for the Network+ exam.

Layer Name Function Examples
7 Application User applications and services HTTP, HTTPS, FTP, SMTP, DNS, Telnet
6 Presentation Data encryption, compression, translation SSL/TLS, JPEG, GIF, ASCII
5 Session Establish, maintain, terminate connections NetBIOS, RPC, PPTP
4 Transport End-to-end communication and reliability TCP, UDP, SCTP
3 Network Routing and logical addressing IP, ICMP, IGMP, IPsec
2 Data Link Physical addressing and frame formatting Ethernet, PPP, MAC addressing, switching
1 Physical Physical transmission of raw bits Cables, hubs, repeaters, electrical signals

Key Networking Concepts

TCP vs. UDP: TCP (Transmission Control Protocol) is connection-oriented, reliable, and slower. UDP (User Datagram Protocol) is connectionless, fast, and unreliable. TCP is used for email, web browsing, and file transfers. UDP is used for streaming, gaming, and VoIP.

IP Addressing: IPv4 addresses are 32-bit addresses written in dotted decimal notation (192.168.1.1). IPv6 addresses are 128-bit addresses written in hexadecimal format. Subnet masks determine which portion of an IP address represents the network and which represents the host.

MAC Addressing: Media Access Control addresses are 48-bit physical addresses expressed in hexadecimal (00:1A:2B:3C:4D:5E). They operate at Layer 2 and are used for local network communication.

Bandwidth and Latency

  • Bandwidth: The maximum data transfer rate, measured in bits per second (bps), kilobits (Kbps), megabits (Mbps), or gigabits (Gbps)
  • Latency: The delay in data transmission, measured in milliseconds (ms). Lower latency is better for real-time applications
  • Throughput: The actual data transfer rate achieved, which is typically less than theoretical bandwidth due to overhead and congestion
  • Jitter: Variation in latency; critical for voice and video applications

Network Types

  • LAN (Local Area Network): Covers small geographic areas like offices or buildings
  • WAN (Wide Area Network): Spans large geographic distances using leased lines or public networks
  • VLAN (Virtual LAN): Logically segments networks without physical separation
  • MAN (Metropolitan Area Network): Covers city-sized areas
  • PAN (Personal Area Network): Covers very small areas like Bluetooth connections

Network Infrastructure & Devices

Network Infrastructure & Devices

Network infrastructure encompasses the physical and logical components that enable communication between devices. Understanding these components is essential for the Network+ exam, as questions frequently test your knowledge of device functions, placement, and proper configuration.

Core Network Devices

Routers operate at Layer 3 (Network layer) and forward packets between networks using IP addresses. They maintain routing tables and use routing protocols like OSPF and BGP to determine optimal paths. Routers connect different subnets and provide network segmentation.

Switches operate at Layer 2 (Data Link layer) and forward frames within a local network using MAC addresses. They maintain MAC address tables (CAM tables) and eliminate collision domains through port-based switching. Managed switches support VLANs, port security, and STP. Unmanaged switches provide basic connectivity without configuration options.

Firewalls operate at Layers 3-7 and filter traffic based on rules. Stateful firewalls track connection states and are more secure than stateless firewalls. Next-generation firewalls (NGFWs) add application-layer filtering, intrusion prevention, and deep packet inspection.

Access Points (APs) extend network coverage wirelessly and operate at Layer 1-2. They bridge wired and wireless networks, support multiple SSIDs, and authenticate devices using WPA2/WPA3 security protocols.

Supporting Infrastructure Devices

Device Layer Primary Function
Hub Layer 1 Repeats signals; creates single collision domain
Bridge Layer 2 Connects two network segments; learns MAC addresses
Gateway Layer 3-7 Translates protocols between different networks
Load Balancer Layer 4-7 Distributes traffic across multiple servers
Proxy Server Layer 7 Intermediates client requests; caches content

Network Segmentation & Design

  • VLANs (Virtual LANs) segment networks logically without physical separation, improving security and performance
  • Subnetting divides networks into smaller portions using subnet masks; reduces broadcast domains
  • DMZ (Demilitarized Zone) isolates public-facing services from internal networks
  • Redundancy through failover devices and Spanning Tree Protocol (STP) prevents single points of failure

Key Exam Considerations

Understand the difference between managed and unmanaged switches, recognize when Layer 3 switches are appropriate for inter-VLAN routing, and know that firewalls should be placed at network perimeters. Remember that devices operate at specific OSI layers, and this determines their functionality and placement within network architecture.

IP Addressing & Subnetting

IP Addressing & Subnetting

IPv4 Address Structure

An IPv4 address consists of 32 bits divided into four octets (8 bits each), written in dotted decimal notation (e.g., 192.168.1.100). Each octet ranges from 0-255. The address is divided into two parts: the network portion and the host portion. The subnet mask determines where this division occurs.

Subnet Mask Basics

A subnet mask uses 1s to identify the network portion and 0s to identify the host portion. Common subnet masks include 255.255.255.0 (/24), 255.255.255.128 (/16), and 255.255.255.255 (/32). CIDR notation (/X) indicates how many bits are used for the network. For example, /24 means 24 network bits and 8 host bits.

CIDR Notation Subnet Mask Host Bits Usable Hosts
/24 255.255.255.0 8 254
/25 255.255.255.128 7 126
/26 255.255.255.192 6 62
/28 255.255.255.240 4 14
/30 255.255.255.252 2 2

Key Subnetting Formula

Number of usable hosts = 2^(host bits) - 2. The -2 accounts for the network address (all host bits 0) and broadcast address (all host bits 1), which cannot be assigned to devices.

IP Address Classes (Legacy)

  • Class A: 1.0.0.0 - 126.255.255.255 (Default mask /8, supports ~16 million hosts)
  • Class B: 128.0.0.0 - 191.255.255.255 (Default mask /16, supports ~65,000 hosts)
  • Class C: 192.0.0.0 - 223.255.255.255 (Default mask /24, supports 254 hosts)
  • Class D: 224.0.0.0 - 239.255.255.255 (Multicast)
  • Class E: 240.0.0.0 - 255.255.255.255 (Reserved)

Private IP Ranges (RFC 1918)

  • 10.0.0.0/8 (Class A private)
  • 172.16.0.0/12 (Class B private)
  • 192.168.0.0/16 (Class C private)

Special Addresses

  • 127.0.0.1: Loopback address for testing
  • 169.254.0.0/16: Link-local address (APIPA)
  • 0.0.0.0: Default route or "this network"
  • 255.255.255.255: Broadcast to local network

Wireless Networking

Wireless Networking

Wireless networking enables devices to connect without physical cables using radio frequencies. Understanding wireless standards, security, and troubleshooting is essential for Network+ certification.

IEEE 802.11 Standards

Wireless networks operate under IEEE 802.11 standards, each defined by letter designation and operating frequency band:

Standard Frequency Band Max Speed Range Notes
802.11a 5 GHz 54 Mbps ~50 meters Less interference, shorter range
802.11b 2.4 GHz 11 Mbps ~100 meters Slower, longer range
802.11g 2.4 GHz 54 Mbps ~100 meters Backward compatible with 802.11b
802.11n 2.4/5 GHz 600 Mbps ~150 meters MIMO technology, dual-band
802.11ac 5 GHz 3.5 Gbps ~100 meters High-speed, short range
802.11ax (WiFi 6) 2.4/5/6 GHz 9.6 Gbps ~100 meters OFDMA, improved efficiency

Wireless Security Protocols

Secure wireless networks using proper authentication and encryption:

  • WEP (Wired Equivalent Privacy) - Deprecated; uses 64 or 128-bit encryption; vulnerable to attacks
  • WPA (WiFi Protected Access) - Uses TKIP encryption; temporary improvement over WEP
  • WPA2 - Uses AES encryption; government-approved; standard for most networks
  • WPA3 - Latest standard; uses 192-bit encryption; protects against brute-force attacks

Wireless Channels and Interference

The 2.4 GHz band contains 11 channels in North America (1-11), with only channels 1, 6, and 11 non-overlapping. The 5 GHz band offers more channels with less interference. Channel overlap causes packet collisions and performance degradation. Use WiFi analyzers to identify interference from neighboring networks and select optimal channels.

Access Point Configuration

Key configuration settings include:

  • SSID (Service Set Identifier) - Network name; can be hidden for basic security
  • Authentication type - Open, shared key, or 802.1X
  • Power settings - Transmission power level adjustment
  • Band selection - 2.4 GHz, 5 GHz, or dual-band operation
  • Quality of Service (QoS) - Prioritize traffic types

Site Survey and Troubleshooting

Site surveys measure signal strength, identify dead zones, and detect interference before deployment. Common wireless issues include poor signal strength, slow speeds, dropped connections, and interference from microwaves or cordless phones. Use tools like WiFi analyzers and spectrum analyzers to diagnose problems. Position access points centrally, avoid obstacles, and maintain proper spacing between multiple APs.

Network Security & Troubleshooting

Network Security & Troubleshooting

Network security protects data confidentiality, integrity, and availability across network infrastructure. Troubleshooting security issues requires understanding attack vectors, defense mechanisms, and diagnostic tools.

Common Security Threats

  • Malware: Viruses, worms, trojans, ransomware, and spyware that compromise systems
  • Social Engineering: Phishing, pretexting, and baiting to manipulate users into divulging credentials
  • Man-in-the-Middle (MITM): Attacker intercepts communications between two parties
  • Denial of Service (DoS): Floods network with traffic to exhaust resources; DDoS uses multiple sources
  • Brute Force: Repeated login attempts using common password combinations
  • SQL Injection: Malicious SQL code inserted into input fields to manipulate databases

Security Defense Mechanisms

  • Firewalls: Filter traffic based on rules; stateful firewalls track connection states
  • Intrusion Detection Systems (IDS): Monitor traffic for suspicious patterns; generate alerts without blocking
  • Intrusion Prevention Systems (IPS): Actively block malicious traffic in real-time
  • VPN (Virtual Private Network): Encrypts data across untrusted networks using tunneling protocols
  • Authentication: MFA (multi-factor authentication) requires multiple verification methods
  • Encryption: SSL/TLS for data in transit; AES-256 for data at rest
  • Access Control Lists (ACLs): Restrict network access based on source/destination IP and ports

Troubleshooting Security Issues

When investigating security problems, use diagnostic tools and systematic approaches:

  • Packet Analysis (Wireshark): Capture and examine traffic for unauthorized access or data exfiltration
  • Log Review: Check firewall, IDS/IPS, and authentication logs for anomalies
  • Network Scanning (Nmap): Identify open ports and running services that may be vulnerable
  • Vulnerability Scanning: Use tools like OpenVAS or Qualys to detect weaknesses
  • Port Security: Enable MAC address filtering on switches to prevent unauthorized device connections
  • Certificate Validation: Verify SSL/TLS certificates to detect MITM attacks

Best Practices

  • Implement principle of least privilege—users access only necessary resources
  • Apply defense-in-depth—multiple layers of security controls
  • Maintain current patches and firmware to close known vulnerabilities
  • Document security policies and conduct regular security audits
  • Use strong passwords (minimum 12 characters) and enforce password rotation
  • Disable unnecessary services and ports to reduce attack surface
  • Implement network segmentation to isolate critical systems

Ready to test your knowledge?

Apply what you've learned with the full practice test.

Take Practice Test →

← Back to CompTIA Network+ Home