1.1 OSI Reference Model

The Open Systems Interconnection (OSI) model is a conceptual framework that standardizes network communication functions into seven distinct layers.

Layer 7 - Application

Provides network services directly to user applications. Examples: HTTP, HTTPS, FTP, SMTP, DNS

Layer 6 - Presentation

Handles data encryption, compression, and format translation. Examples: SSL/TLS, JPEG, ASCII

Layer 5 - Session

Manages communication sessions between applications. Examples: NetBIOS, SQL sessions, RPC

Layer 4 - Transport

Provides reliable data delivery and flow control. Examples: TCP, UDP

Layer 3 - Network

Handles routing and logical addressing. Examples: IP, ICMP, OSPF, BGP

Layer 2 - Data Link

Manages frame formatting and error detection. Examples: Ethernet, Wi-Fi, PPP

Layer 1 - Physical

Defines physical transmission medium and electrical specifications. Examples: Cables, connectors, radio frequencies

Memory Tip: "All People Seem To Need Data Processing" (Application, Presentation, Session, Transport, Network, Data Link, Physical)

1.2 Network Appliances, Applications & Functions

Physical and Virtual Appliances

Router

Layer 3 device that forwards packets between networks using IP addresses. Determines best path for data transmission.

Switch

Layer 2 device that forwards frames within a network using MAC addresses. Creates separate collision domains.

Firewall

Security device that filters network traffic based on predefined rules. Can be hardware or software-based. Learn more about network security implementations.

IDS/IPS

IDS: Monitors network for malicious activity. IPS: Actively blocks detected threats.

Load Balancer

Distributes incoming network traffic across multiple servers to optimize resource utilization and prevent overload.

Proxy

Acts as intermediary between clients and servers. Can provide caching, filtering, and security functions.

NAS (Network Attached Storage)

File-level storage connected to network, accessible by multiple clients via standard network protocols.

SAN (Storage Area Network)

High-speed network providing block-level storage access, typically using Fibre Channel or iSCSI.

Wireless Components

Access Point (AP)

Device that allows wireless devices to connect to a wired network using Wi-Fi standards (802.11).

Wireless Controller

Centralized device that manages multiple access points, providing configuration, monitoring, and security.

Network Functions

VPN (Virtual Private Network)

Creates secure, encrypted tunnel over public networks for private communication.

QoS (Quality of Service)

Traffic management technique that prioritizes certain types of network traffic to ensure performance.

TTL (Time to Live)

Field in IP header that limits packet lifetime, preventing infinite routing loops.

CDN (Content Delivery Network)

Geographically distributed servers that deliver web content from locations closest to users.

1.3 Cloud Concepts & Connectivity

Cloud computing fundamentals are essential for modern networking. For advanced cloud security concepts, also explore our Security+ Network Architecture guide.

Cloud Deployment Models

Public Cloud

Services offered over public internet, owned by cloud provider. Examples: AWS, Azure, Google Cloud.

Private Cloud

Dedicated cloud infrastructure for single organization, offering greater control and security.

Hybrid Cloud

Combination of public and private clouds, allowing data and applications to move between them.

Service Models

SaaS (Software as a Service)

Complete applications delivered over internet. Examples: Gmail, Office 365, Salesforce.

PaaS (Platform as a Service)

Development platforms provided as service. Examples: Google App Engine, Heroku.

IaaS (Infrastructure as a Service)

Virtualized computing resources over internet. Examples: AWS EC2, Azure VMs.

Cloud Networking Components

VPC (Virtual Private Cloud)

Isolated network environment within cloud provider's infrastructure.

Network Security Groups

Virtual firewalls that control inbound and outbound traffic for cloud resources.

Internet Gateway

Allows communication between VPC and internet, enabling public connectivity.

NAT Gateway

Enables outbound internet access for private subnet resources while blocking inbound access.

1.4 Common Ports, Protocols & Services

Protocol Port(s) Description Security
FTP 20/21 File Transfer Protocol - transfers files between systems ❌ Unencrypted
SSH/SFTP 22 Secure Shell / Secure File Transfer Protocol ✅ Encrypted
Telnet 23 Remote terminal access ❌ Unencrypted
SMTP 25 Simple Mail Transfer Protocol - sends email ❌ Unencrypted
DNS 53 Domain Name System - resolves domain names ⚠️ Can be secured with DNS over HTTPS
DHCP 67/68 Dynamic Host Configuration Protocol - assigns IP addresses ⚠️ Local network protocol
TFTP 69 Trivial File Transfer Protocol - simple file transfer ❌ Unencrypted
HTTP 80 Hypertext Transfer Protocol - web browsing ❌ Unencrypted
NTP 123 Network Time Protocol - time synchronization ⚠️ Can be secured
SNMP 161/162 Simple Network Management Protocol - network monitoring ⚠️ v3 provides encryption
LDAP 389 Lightweight Directory Access Protocol ❌ Unencrypted
HTTPS 443 HTTP Secure - encrypted web browsing ✅ TLS Encrypted
SMB 445 Server Message Block - file sharing ⚠️ Can be encrypted
Syslog 514 System logging protocol ❌ Unencrypted (UDP)
SMTPS 587 SMTP with STARTTLS encryption ✅ Encrypted
LDAPS 636 LDAP over SSL/TLS ✅ Encrypted
SQL Server 1433 Microsoft SQL Server database ⚠️ Can be encrypted
RDP 3389 Remote Desktop Protocol ⚠️ Can be encrypted
SIP 5060/5061 Session Initiation Protocol - VoIP ⚠️ 5061 is encrypted (TLS)

IP Protocol Types

ICMP

Internet Control Message Protocol - error reporting and diagnostics (ping, traceroute)

TCP

Transmission Control Protocol - reliable, connection-oriented transport

UDP

User Datagram Protocol - fast, connectionless transport

GRE

Generic Routing Encapsulation - tunneling protocol

IPSec

IP Security - authentication and encryption at network layer

Traffic Types

Unicast

One-to-one communication between single sender and receiver

Multicast

One-to-many communication to specific group of receivers

Anycast

One-to-nearest communication, routing to closest available server

Broadcast

One-to-all communication within network segment

1.5 Transmission Media & Transceivers

Wireless Technologies

802.11 Standards

802.11a: 5GHz, 54Mbps
802.11b: 2.4GHz, 11Mbps
802.11g: 2.4GHz, 54Mbps
802.11n: 2.4/5GHz, 600Mbps
802.11ac: 5GHz, 6.93Gbps
802.11ax (Wi-Fi 6): 2.4/5GHz, 9.6Gbps

Cellular

Mobile wireless technology: 3G, 4G LTE, 5G networks for data and voice communication

Satellite

Communication via satellites for remote locations and global coverage

Wired Technologies

802.3 Ethernet Standards

10BASE-T: 10Mbps over copper
100BASE-TX: 100Mbps Fast Ethernet
1000BASE-T: 1Gbps Gigabit Ethernet
10GBASE-T: 10Gbps over copper

Fiber Optic

Single-mode: Long distance, single light path
Multi-mode: Shorter distance, multiple light paths

Copper Cables

DAC (Direct Attach Copper): Twinaxial for short distances
Coaxial: Central conductor with shield

Connectors & Transceivers

Fiber Connectors

SC: Square connector, push-pull
LC: Small form factor
ST: Straight tip, bayonet
MPO: Multi-fiber ribbon

Copper Connectors

RJ45: 8-pin Ethernet
RJ11: 6-pin telephone
BNC: Coaxial bayonet
F-type: Cable TV coaxial

Transceivers

SFP: Small Form-factor Pluggable
QSFP: Quad SFP for higher speeds
Support Ethernet and Fibre Channel protocols

1.6 Network Topologies & Architectures

Network Topologies

Star/Hub and Spoke

Central hub connects to all nodes. Easy to manage but single point of failure.

Mesh

Full Mesh: Every node connects to every other node
Partial Mesh: Some nodes have multiple connections

Point-to-Point

Direct connection between two nodes, commonly used for WAN links.

Hybrid

Combination of multiple topology types within same network.

Data Center Architectures

Three-Tier Hierarchical

Core: High-speed backbone
Distribution: Aggregation and policy
Access: End device connectivity

Spine and Leaf

Modern data center design with leaf switches connecting to all spine switches for optimal east-west traffic flow.

Collapsed Core

Combines core and distribution layers for smaller networks.

Traffic Flow Patterns

North-South Traffic

Traffic flowing between data center and external networks (clients, internet).

East-West Traffic

Traffic flowing between servers within the data center (server-to-server communication).

1.7 IPv4 Network Addressing

IPv4 Address Classes

Class A

Range: 1.0.0.0 - 126.255.255.255
Default Mask: /8 (255.0.0.0)
Hosts per Network: 16,777,214

Class B

Range: 128.0.0.0 - 191.255.255.255
Default Mask: /16 (255.255.0.0)
Hosts per Network: 65,534

Class C

Range: 192.0.0.0 - 223.255.255.255
Default Mask: /24 (255.255.255.0)
Hosts per Network: 254

Class D (Multicast)

Range: 224.0.0.0 - 239.255.255.255
Used for multicast group communication

Class E (Experimental)

Range: 240.0.0.0 - 255.255.255.255
Reserved for future use and research

Special Address Ranges

RFC 1918 Private Addresses

Class A: 10.0.0.0/8
Class B: 172.16.0.0/12
Class C: 192.168.0.0/16

APIPA (Automatic Private IP Addressing)

Range: 169.254.0.0/16
Self-assigned when DHCP unavailable

Loopback/Localhost

Range: 127.0.0.0/8
Common: 127.0.0.1
Used for local testing

Subnetting Concepts

CIDR

Classless Inter-Domain Routing eliminates class boundaries, allowing flexible subnet sizing using prefix notation (/24, /28, etc.)

VLSM

Variable Length Subnet Mask allows different subnet sizes within the same network, optimizing IP address utilization.

Subnetting Formula:
• Number of Subnets = 2^(borrowed bits)
• Number of Hosts = 2^(host bits) - 2
• Subtract 2 for network and broadcast addresses

1.8 Modern Network Environments

Software-Defined Networking

SDN

Separates control plane from data plane, enabling centralized network programmability and management.

SD-WAN

Software-defined approach to WAN connectivity with application-aware routing and centralized policy management.

Key Features

Application Aware: Traffic optimization based on application requirements
Zero-touch Provisioning: Automated device deployment
Transport Agnostic: Works over any connection type

Modern Architectures

VXLAN

Virtual Extensible LAN provides Layer 2 overlay networks over Layer 3 infrastructure, enabling data center interconnect.

Zero Trust Architecture

Security model based on "never trust, always verify" with continuous authentication and least privilege access.

SASE/SSE

SASE: Secure Access Service Edge combines networking and security
SSE: Security Service Edge focuses on cloud-delivered security services

Infrastructure as Code

Automation Benefits

Playbooks/Templates: Reusable configuration scripts
Configuration Drift: Automated compliance checking
Dynamic Inventories: Automatically discovered resources

Source Control

Version Control: Track configuration changes
Central Repository: Single source of truth
Branching: Parallel development workflows
Conflict Resolution: Merge conflict identification

FAQ Frequently Asked Questions

What is Domain 1.0 of the CompTIA Network+ N10-009 exam?

Domain 1.0 covers Networking Concepts and represents approximately 23% of the exam. It includes the OSI model, network appliances, cloud concepts, protocols, transmission media, topologies, and IPv4 addressing.

How important is the OSI model for Network+ certification?

The OSI model is fundamental to understanding network communication. You should memorize all seven layers and understand the protocols and functions at each layer, as this knowledge applies throughout the entire exam.

Which ports and protocols are most important to memorize?

Focus on common protocols like HTTP (80), HTTPS (443), SSH (22), FTP (20/21), DNS (53), DHCP (67/68), SMTP (25), POP3 (110), IMAP (143), SNMP (161), and LDAP (389/636). Also understand whether each protocol is encrypted or unencrypted.

What cloud concepts should I focus on for the Network+ exam?

Understand the differences between IaaS, PaaS, and SaaS service models, and public, private, and hybrid deployment models. Also learn about VPCs, network security groups, and connectivity options like VPN and direct connections.