CompTIA Network+ Networking Fundamentals Study Guide
Overview
This study guide covers the core networking fundamentals tested on the CompTIA Network+ exam, including the OSI model, network topologies, IP addressing, protocols, devices, and essential networking concepts. Mastery of these topics forms the backbone of the Network+ certification and real-world network administration. Use this guide alongside practice questions to reinforce understanding and identify knowledge gaps.
---
The OSI Model
Overview
The OSI (Open Systems Interconnection) model is a 7-layer conceptual framework that standardizes how network communication functions are divided and implemented. Every layer has a specific role and communicates only with the layers directly above and below it.
Layer-by-Layer Breakdown
| Layer | Number | PDU | Key Devices | Key Protocols |
|---|---|---|---|---|
| Physical | 1 | Bits | Hubs, Cables, Repeaters | Ethernet (physical) |
| Data Link | 2 | Frame | Switches, NICs | Ethernet (MAC), 802.1Q |
| Network | 3 | Packet | Routers | IP, ICMP, ARP |
| Transport | 4 | Segment | — | TCP, UDP |
| Session | 5 | Data | — | NetBIOS, RPC |
| Presentation | 6 | Data | — | SSL/TLS, JPEG, MPEG |
| Application | 7 | Data | — | HTTP, DNS, FTP, SMTP |
Key Concepts Per Layer
Mnemonic
> "Please Do Not Throw Sausage Pizza Away" — Physical, Data Link, Network, Transport, Session, Presentation, Application (Layers 1→7)
>
> Reverse (top-down): "All People Seem To Need Data Processing"
Key Terms
Watch Out For ⚠️
---
Network Topologies & Types
Physical Topologies
| Topology | Description | Pros | Cons |
|---|---|---|---|
| Bus | All devices share a single cable | Simple, cheap | Single point of failure; entire network fails if cable breaks |
| Star | All devices connect to a central switch/hub | Easy troubleshooting; isolated failures | Switch = single point of failure |
| Ring | Devices connected in a circular loop | Predictable performance | One break can disrupt the network |
| Mesh | Devices interconnect directly with each other | Highly redundant | Expensive and complex |
| Hybrid | Combination of two or more topologies | Flexible | Complex to manage |
Mesh Topology Formula
> Full mesh links = n(n-1)/2
> - 4 nodes: 4(3)/2 = 6 links
> - 6 nodes: 6(5)/2 = 15 links
Network Types by Geographic Size
| Type | Coverage Area | Example Use |
|---|---|---|
| PAN (Personal Area Network) | ~10 meters | Bluetooth headset, USB devices |
| LAN (Local Area Network) | Building/campus | Office network |
| MAN (Metropolitan Area Network) | City/campus region | ISP city-wide network |
| WAN (Wide Area Network) | Country/global | The Internet |
Key Terms
Watch Out For ⚠️
---
IP Addressing & Subnetting
IPv4 Address Classes
| Class | Range | Default Mask | Private Range (RFC 1918) |
|---|---|---|---|
| A | 1.0.0.0 – 126.255.255.255 | /8 (255.0.0.0) | 10.0.0.0 – 10.255.255.255 |
| B | 128.0.0.0 – 191.255.255.255 | /16 (255.255.0.0) | 172.16.0.0 – 172.31.255.255 |
| C | 192.0.0.0 – 223.255.255.255 | /24 (255.255.255.0) | 192.168.0.0 – 192.168.255.255 |
| D | 224.0.0.0 – 239.255.255.255 | N/A | Multicast |
| E | 240.0.0.0 – 255.255.255.255 | N/A | Experimental/Reserved |
Special IPv4 Ranges
| Range | Purpose |
|---|---|
| 127.0.0.0/8 | Loopback (localhost) |
| 169.254.0.0/16 | APIPA (no DHCP available) |
| 0.0.0.0 | Unspecified/default route |
| 255.255.255.255 | Limited broadcast |
Subnetting Quick Reference
| CIDR | Subnet Mask | Total Addresses | Usable Hosts | Block Size |
|---|---|---|---|---|
| /24 | 255.255.255.0 | 256 | 254 | 256 |
| /25 | 255.255.255.128 | 128 | 126 | 128 |
| /26 | 255.255.255.192 | 64 | 62 | 64 |
| /27 | 255.255.255.224 | 32 | 30 | 32 |
| /28 | 255.255.255.240 | 16 | 14 | 16 |
| /29 | 255.255.255.248 | 8 | 6 | 8 |
| /30 | 255.255.255.252 | 4 | 2 | 4 |
Usable Host Formula
> Usable Hosts = 2^(host bits) – 2
> - /28 has 4 host bits → 2^4 – 2 = 14 usable hosts
Worked Example: 192.168.10.64/26
IPv6 Essentials
| Feature | Detail |
|---|---|
| Address length | 128 bits (vs. IPv4's 32 bits) |
| Address space | ~3.4 × 10^38 unique addresses |
| Notation | 8 groups of 4 hex digits (hextets), separated by colons |
| :: compression | Replaces one or more consecutive all-zero hextets; used only once per address |
| Loopback | ::1 |
| Link-local | fe80::/10 |
Key Terms
Watch Out For ⚠️
---
Protocols & Ports
Critical Port Numbers to Memorize
| Port | Protocol | Transport | Description |
|---|---|---|---|
| 20 | FTP Data | TCP | Active mode data transfer |
| 21 | FTP Control | TCP | Commands and control |
| 22 | SSH | TCP | Secure remote access |
| 23 | Telnet | TCP | Unencrypted remote access |
| 25 | SMTP | TCP | Server-to-server email relay |
| 53 | DNS | UDP/TCP | Domain name resolution |
| 67/68 | DHCP | UDP | IP address assignment |
| 80 | HTTP | TCP | Unencrypted web traffic |
| 110 | POP3 | TCP | Email retrieval |
| 143 | IMAP | TCP | Email retrieval (synced) |
| 161/162 | SNMP | UDP | Network device monitoring |
| 389 | LDAP | TCP | Directory services |
| 443 | HTTPS | TCP | Encrypted web traffic (TLS) |
| 465 | SMTPS | TCP | SMTP over SSL |
| 587 | SMTP Submission | TCP | Authenticated client email |
| 3389 | RDP | TCP | Remote Desktop Protocol |
TCP vs. UDP Comparison
| Feature | TCP | UDP |
|---|---|---|
| Connection | Connection-oriented (3-way handshake) | Connectionless |
| Reliability | Guaranteed delivery, ordering, error-checking | No guarantees |
| Speed | Slower (overhead) | Faster (low overhead) |
| Use Cases | HTTP, FTP, SSH, SMTP | DNS, DHCP, VoIP, streaming |
TCP Three-Way Handshake
> SYN → SYN-ACK → ACK
> 1. Client sends SYN (synchronize)
> 2. Server responds with SYN-ACK
> 3. Client sends ACK — connection established
DNS Behavior
- Zone transfers between DNS servers
- Responses exceeding 512 bytes
Key Terms
Watch Out For ⚠️
---
Networking Devices & Media
Device Comparison
| Device | OSI Layer | Key Function |
|---|---|---|
| Hub | Layer 1 | Broadcasts all traffic to all ports; single collision domain |
| Switch | Layer 2 | Forwards frames by MAC address; separate collision domain per port |
| Router | Layer 3 | Routes packets between networks using IP addresses |
| Layer 3 Switch | Layers 2 & 3 | Switches at Layer 2, routes between VLANs at Layer 3 |
| Proxy Server | Layer 7 | Intermediary for client requests; caching, filtering, anonymity |
| Load Balancer | Layer 4/7 | Distributes traffic across multiple servers for redundancy |
| Firewall | Layers 3–7 | Filters traffic based on rules; enforces security policies |
Collision Domains vs. Broadcast Domains
| Device | Collision Domains | Broadcast Domains |
|---|---|---|
| Hub | 1 (all ports share) | 1 |
| Switch | 1 per port | 1 (unless VLANs used) |
| Router |