The OSI (Open Systems Interconnection) model is a seven-layer framework that describes how network communication occurs. Understanding each layer is critical for the Network+ exam.
| Layer | Name | Function | Examples |
|---|---|---|---|
| 7 | Application | User applications and services | HTTP, HTTPS, FTP, SMTP, DNS, Telnet |
| 6 | Presentation | Data encryption, compression, translation | SSL/TLS, JPEG, GIF, ASCII |
| 5 | Session | Establish, maintain, terminate connections | NetBIOS, RPC, PPTP |
| 4 | Transport | End-to-end communication and reliability | TCP, UDP, SCTP |
| 3 | Network | Routing and logical addressing | IP, ICMP, IGMP, IPsec |
| 2 | Data Link | Physical addressing and frame formatting | Ethernet, PPP, MAC addressing, switching |
| 1 | Physical | Physical transmission of raw bits | Cables, hubs, repeaters, electrical signals |
TCP vs. UDP: TCP (Transmission Control Protocol) is connection-oriented, reliable, and slower. UDP (User Datagram Protocol) is connectionless, fast, and unreliable. TCP is used for email, web browsing, and file transfers. UDP is used for streaming, gaming, and VoIP.
IP Addressing: IPv4 addresses are 32-bit addresses written in dotted decimal notation (192.168.1.1). IPv6 addresses are 128-bit addresses written in hexadecimal format. Subnet masks determine which portion of an IP address represents the network and which represents the host.
MAC Addressing: Media Access Control addresses are 48-bit physical addresses expressed in hexadecimal (00:1A:2B:3C:4D:5E). They operate at Layer 2 and are used for local network communication.
Network infrastructure encompasses the physical and logical components that enable communication between devices. Understanding these components is essential for the Network+ exam, as questions frequently test your knowledge of device functions, placement, and proper configuration.
Routers operate at Layer 3 (Network layer) and forward packets between networks using IP addresses. They maintain routing tables and use routing protocols like OSPF and BGP to determine optimal paths. Routers connect different subnets and provide network segmentation.
Switches operate at Layer 2 (Data Link layer) and forward frames within a local network using MAC addresses. They maintain MAC address tables (CAM tables) and eliminate collision domains through port-based switching. Managed switches support VLANs, port security, and STP. Unmanaged switches provide basic connectivity without configuration options.
Firewalls operate at Layers 3-7 and filter traffic based on rules. Stateful firewalls track connection states and are more secure than stateless firewalls. Next-generation firewalls (NGFWs) add application-layer filtering, intrusion prevention, and deep packet inspection.
Access Points (APs) extend network coverage wirelessly and operate at Layer 1-2. They bridge wired and wireless networks, support multiple SSIDs, and authenticate devices using WPA2/WPA3 security protocols.
| Device | Layer | Primary Function |
|---|---|---|
| Hub | Layer 1 | Repeats signals; creates single collision domain |
| Bridge | Layer 2 | Connects two network segments; learns MAC addresses |
| Gateway | Layer 3-7 | Translates protocols between different networks |
| Load Balancer | Layer 4-7 | Distributes traffic across multiple servers |
| Proxy Server | Layer 7 | Intermediates client requests; caches content |
Understand the difference between managed and unmanaged switches, recognize when Layer 3 switches are appropriate for inter-VLAN routing, and know that firewalls should be placed at network perimeters. Remember that devices operate at specific OSI layers, and this determines their functionality and placement within network architecture.
IPv4 Address Structure
An IPv4 address consists of 32 bits divided into four octets (8 bits each), written in dotted decimal notation (e.g., 192.168.1.100). Each octet ranges from 0-255. The address is divided into two parts: the network portion and the host portion. The subnet mask determines where this division occurs.
Subnet Mask Basics
A subnet mask uses 1s to identify the network portion and 0s to identify the host portion. Common subnet masks include 255.255.255.0 (/24), 255.255.255.128 (/16), and 255.255.255.255 (/32). CIDR notation (/X) indicates how many bits are used for the network. For example, /24 means 24 network bits and 8 host bits.
| CIDR Notation | Subnet Mask | Host Bits | Usable Hosts |
|---|---|---|---|
| /24 | 255.255.255.0 | 8 | 254 |
| /25 | 255.255.255.128 | 7 | 126 |
| /26 | 255.255.255.192 | 6 | 62 |
| /28 | 255.255.255.240 | 4 | 14 |
| /30 | 255.255.255.252 | 2 | 2 |
Key Subnetting Formula
Number of usable hosts = 2^(host bits) - 2. The -2 accounts for the network address (all host bits 0) and broadcast address (all host bits 1), which cannot be assigned to devices.
IP Address Classes (Legacy)
Private IP Ranges (RFC 1918)
Special Addresses
Wireless networking enables devices to connect without physical cables using radio frequencies. Understanding wireless standards, security, and troubleshooting is essential for Network+ certification.
Wireless networks operate under IEEE 802.11 standards, each defined by letter designation and operating frequency band:
| Standard | Frequency Band | Max Speed | Range | Notes |
|---|---|---|---|---|
| 802.11a | 5 GHz | 54 Mbps | ~50 meters | Less interference, shorter range |
| 802.11b | 2.4 GHz | 11 Mbps | ~100 meters | Slower, longer range |
| 802.11g | 2.4 GHz | 54 Mbps | ~100 meters | Backward compatible with 802.11b |
| 802.11n | 2.4/5 GHz | 600 Mbps | ~150 meters | MIMO technology, dual-band |
| 802.11ac | 5 GHz | 3.5 Gbps | ~100 meters | High-speed, short range |
| 802.11ax (WiFi 6) | 2.4/5/6 GHz | 9.6 Gbps | ~100 meters | OFDMA, improved efficiency |
Secure wireless networks using proper authentication and encryption:
The 2.4 GHz band contains 11 channels in North America (1-11), with only channels 1, 6, and 11 non-overlapping. The 5 GHz band offers more channels with less interference. Channel overlap causes packet collisions and performance degradation. Use WiFi analyzers to identify interference from neighboring networks and select optimal channels.
Key configuration settings include:
Site surveys measure signal strength, identify dead zones, and detect interference before deployment. Common wireless issues include poor signal strength, slow speeds, dropped connections, and interference from microwaves or cordless phones. Use tools like WiFi analyzers and spectrum analyzers to diagnose problems. Position access points centrally, avoid obstacles, and maintain proper spacing between multiple APs.
Network security protects data confidentiality, integrity, and availability across network infrastructure. Troubleshooting security issues requires understanding attack vectors, defense mechanisms, and diagnostic tools.
When investigating security problems, use diagnostic tools and systematic approaches: