- OSI Model: A seven-layer model that helps understand how network protocols interact (Physical, Data Link, Network, Transport, Session, Presentation, Application).
- TCP/IP Model: A four-layer model commonly used in practical networking (Network Interface, Internet, Transport, Application).
- Router: Directs traffic between networks.
- Switch: Connects devices within a network and forwards data based on MAC addresses.
- Access Point (AP): Provides wireless connectivity within a network.
- IPv4 and IPv6 addressing schemes.
- Subnetting: Breaking a network into smaller, manageable pieces.
- Public vs. Private IP addresses, NAT (Network Address Translation).
- TCP (Transmission Control Protocol): Ensures reliable communication.
- UDP (User Datagram Protocol): Fast but less reliable communication.
- DNS (Domain Name System): Translates domain names into IP addresses.
- DHCP (Dynamic Host Configuration Protocol): Automatically assigns IP addresses to devices.
- Bus, Star, Mesh, and Hybrid topologies.
- Wired (Ethernet) vs. Wireless topologies.
- LAN (Local Area Network): Small network, typically within a single location.
- WAN (Wide Area Network): Larger network that spans geographical locations.
- VLANs (Virtual LANs): Allow segmentation of a network into smaller, isolated parts.
- Routers, switches, firewalls, load balancers, and proxy servers.
- Wireless access points and their configuration (SSID, security protocols).
- Wi-Fi standards (802.11a/b/g/n/ac/ax).
- Wireless security (WPA2, WPA3).
- Frequency bands (2.4 GHz vs. 5 GHz).
- Copper (e.g., Cat5e, Cat6) vs. Fiber (e.g., single-mode, multi-mode).
- Connectors (RJ45, SC, LC).
- Signal interference and cable management best practices.
- SNMP (Simple Network Management Protocol): Used for monitoring network devices.
- Syslog: Centralized logging of events from network devices.
- NMS (Network Management Systems): Tools used to monitor and manage large networks.
- Importance of keeping accurate network diagrams, configuration documentation, and performance logs.
- Latency, bandwidth, throughput, and jitter.
- Understanding QoS (Quality of Service) to prioritize critical traffic.
- Role of SLAs (Service Level Agreements) in setting uptime and performance expectations.
- Incident response and change management processes.
- Firewalls: Filter incoming and outgoing traffic.
- Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS).
- VPNs (Virtual Private Networks): Secure connections over the internet.
- AAA (Authentication, Authorization, Accounting) frameworks.
- Multifactor authentication (MFA) and RADIUS/TACACS+ protocols.
- Role-based access control (RBAC).
- Symmetric vs. asymmetric encryption.
- Encryption protocols such as SSL/TLS, IPSec.
- Wi-Fi security (WPA2, WPA3).
- Malware, DDoS attacks, phishing, and man-in-the-middle attacks.
- Mitigation strategies: firewalls, antivirus, patch management.
- Identify the problem, establish a theory, test the theory, establish a plan, implement the solution, verify functionality, and document the process.
- IP addressing issues (e.g., duplicate IP addresses, subnetting errors).
- Hardware failures (e.g., faulty cables, NICs, switches).
- Wireless interference or weak signal strength.
- DNS resolution issues.
- Ping, traceroute, nslookup, and ipconfig/ifconfig.
- Packet sniffers like Wireshark.
- Network analyzers to check traffic flow and detect bottlenecks.
Acronym | Definition |
---|---|
IP | Internet Protocol: Governs the format of data sent over the internet or local networks. |
TCP | Transmission Control Protocol: Ensures reliable, ordered communication between devices. |
UDP | User Datagram Protocol: A communication protocol that allows data transmission without guaranteed delivery. |
DNS | Domain Name System: Translates domain names into IP addresses. |
DHCP | Dynamic Host Configuration Protocol: Assigns IP addresses to devices on a network automatically. |
LAN | Local Area Network: A network that spans a small geographic area, like a home or office. |
WAN | Wide Area Network: A network that spans a large geographic area, such as cities or countries. |
MAC | Media Access Control: A unique identifier assigned to a network interface card for communication on a network. |
SSID | Service Set Identifier: The name of a wireless network. |
VPN | Virtual Private Network: A secure way of accessing a private network over a public network. |
NAT | Network Address Translation: Converts private IP addresses to a public IP for internet access. |
QoS | Quality of Service: Mechanisms that prioritize certain types of network traffic. |
WPA2 | Wi-Fi Protected Access 2: A wireless security standard for protecting networks. |
IDS | Intrusion Detection System: Monitors network traffic for suspicious activity. |
IPS | Intrusion Prevention System: Detects and prevents identified threats on a network. |
SSL | Secure Sockets Layer: A protocol for securing data transmitted over the internet. |
RADIUS | Remote Authentication Dial-In User Service: A protocol for managing network access authentication. |
MFA | Multi-Factor Authentication: A method of confirming identity by using more than one authentication factor. |