WWW Geeksforgeeks Org Computer Network Cheat Sheet
WWW Geeksforgeeks Org Computer Network Cheat Sheet
Engineering Mathematics Discrete Mathematics Digital Logic and Design Computer Organization and Architecture C Programming Data Structures Algorithms Theory of Computation Compiler Design Operating Syste
Data Structures A computer network is an interconnected computing device that can exchange data and share 914k+ interested Geeks 47k+ intere
resources. These connected devices use a set of rules called communication protocols to Data Structures and GATE CS &
Algorithms - Self Paced
Algorithms transfer information over physical or wireless technology. Modern networks offer more than just
connectivity. Enterprises start with digital transformation. Networks are essential to this Explore Explore
Programming Languages transformation and its success.
Web Technologies
Tutorial Library
GATE CS
DevOps
QUIZ Section
Welcome to geeksforgeeks.org
Your personal
A bus topology, alsodata will beaprocessed
called and information
line topology, is afrom yourof
type device
network topology in
(cookies, unique identifiers, and other device data) may be stored by,
Bus
which all network devices
accessed by are
and shared connected
with through
third party vendors, a central
or used RJ-45
specifically by network cable
Topology this site or app.
or coaxial cable.
Some vendors may process your personal data on the basis of legitimate
interest, which you can object to by managing your options below. Look for
a link at the bottom of this page or in our privacy policy where you can
withdraw
A ring topology isconsent.
a type of network topology in which each device is connected
to two other devices on either side using RJ-45 or coaxial cables.
Manage options Consent
Ring
Topology
Mesh In a mesh topology, each node is connected to at least one other node and often
Topology to multiple nodes. Each node can send and receive messages from other nodes.
A hybrid topology is a type of network topology that uses two or more different
Hybrid
network topologies. These topologies can include mixed bus topologies, mesh
Topology
topologies, ring topologies, star topologies, and tree topologies.
Skip to content
Types of Network:
Network Description
Type
A local area network is a network that covers a small area (for example, a
LAN
company’s network).
A wide Area Network is a network that includes many devices and covers a large
WAN
area. Usually collectively owned.
Your personal data will be processed and information from your device
Internet Layer Network(cookies,
LayeruniqueICMP, IGMP,
identifiers, IPsec,
and other IPv4,
device data)IPv6, IPX,
may be RIP
stored by,
accessed by and shared with third party vendors, or used specifically by
this site or app.
ARP, ATM, CDP, FDDI, Frame Relay, HDLC, MPLS, PPP,
Some
Data Link vendors may process your personal data on the basis of legitimate
Layer
STP,
interest, which you canToken
object toRing
by managing your options below. Look for
Link Layer a link at the bottom of this page or in our privacy policy where you can
withdraw consent.
Physical Layer Bluetooth, Ethernet, DSL, ISDN, 802.11 Wi-Fi
Wi-Fi or
A family of protocols that deal with wireless transmission. –
WLAN
DNS is the host name for the IP address translation service. DNS
is a distributed database implemented on a hierarchy of name
DNS servers. It is an application layer protocol for messaging between 53
Your personal data will be processed and information from your device
(cookies, unique identifiers, and other device data) may be stored by,
SNMP is anaccessed
application layer
by and shared protocol
with third that oruses
party vendors, UDP port
used specifically by
this site or app.
SNMP numbers 161/162. SNMP is also used to monitor networks, 161
Some vendors may process your personal data on the basis of legitimate
detect network errors,
interest, whichand sometimes
you can configure
object to by managing yourremote devices.
options below. Look for
a link at the bottom of this page or in our privacy policy where you can
withdraw consent.
local hosts.
RARP, stand
Yourfor Reverse
personal data willAddress
be processedResolution
and informationProtocol, is a
from your device
(cookies, unique identifiers,
computer network-based protocol and other
useddevice
by data) maycomputers
client be stored by, to
accessed by and shared with third party vendors, or used specifically by
RARP –
request IP this
addresses
site or app. from a gateway server’s Address
Resolution Protocol table
Some vendors mayor cache.
process your personal data on the basis of legitimate
interest, which you can object to by managing your options below. Look for
a link at the bottom of this page or in our privacy policy where you can
withdraw consent.
The D-channel LAPD or Link Access Protocol is basically the
LAPD Layer 2 protocol normally required for the ISDN D-channel. It is –
derived from the LAPB (Link Access Protocol Balanced) protocol.
Skip to content
High-Level Data Link Control (HDLC) commonly uses the term
“frame” to denote units or logs of units of data that are
HDLC frequently transmitted or transmitted from one station to –
another, express. Each frame on the link must start and end with
a flag sequence field (F).
Lightweight perm_identity
Directory Personalised
Accessads and content, ad(LDAP)
Protocol and content
is measurement,
an internet
audience insights and product development
protocol works on TCP/IP, used to access information from
LDAP devices Store and/or is
access information on ato
device 389
directories. LDAP protocol basically used access an active
directory.
Your personal data will be processed and information from your device
(cookies, unique identifiers, and other device data) may be stored by,
GRE or Generic Routing Encapsulation is a tunneling protocol
accessed by and shared with third party vendors, or used specifically by
this Cisco.
developed by site or app.
It encapsulates IP packets i.e. deliverable
GRE 47
inner packetsSome
intovendors
outermay process your personal data on the basis of legitimate
packets.
interest, which you can object to by managing your options below. Look for
a link at the bottom of this page or in our privacy policy where you can
withdraw consent.
The HTTP headers Authorization header is a request type header
that used to contains the credentials information to authenticate
AH 51
a user through a server. If the server responds with 401
Unauthorized and the WWW-Authenticate header not usually.
IEEE Standards:
Standards Description
IEEE 802.1
Rapid reconfiguration of spanning tree
w
IEEE
10 Gigabit Ethernet
802.3ae
IEEE 802.4 Token passing bus access method and Physical layer specifications
IEEE 802.5 Token Ring access method and Physical layer specifications
Distributed Queue Dual Bus (DQDB) access method and Physical layer
IEEE 802.6
specifications (MAN)
IEEE
Wireless with speed upto 54 Mbps
802.11a Your personal data will be processed and information from your device
(cookies, unique identifiers, and other device data) may be stored by,
accessed by and shared with third party vendors, or used specifically by
IEEE this site or app.
Wireless with speed upto 11 Mbps
802.11b Some vendors may process your personal data on the basis of legitimate
interest, which you can object to by managing your options below. Look for
a link at the bottom of this page or in our privacy policy where you can
withdraw consent.
IEEE
Wireless with speed upto 54 Mbps
802.11g
IEEE
Wireless with speed upto 600 Mbps
802.11n
IEEE 802.12 Demand-priority access method, physical layer and repeater specifications
Networking Devices:
Device Description
Server Provides resources to network users, including email, web pages, or files.
Skip to content
A Layer 1 device that does not perform any inspection of traffic. A hub simply
Hub
receives traffic in a port and repeats that traffic out of all the other ports.
A Layer 2 device that makes its forwarding decisions based on the destination
Media Access Control (MAC) address. A switch learns which devices reside off
Switch
which ports by examining the source MAC address. The switch then forwards
traffic only to the appropriate port, and not to all the other ports.
Can operate at both Layer 2 and Layer 3. Also called a Layer 3 switch, a
Multilayer
multilayer switch is a high-performance device that can switch traffic within
switch
the LAN and for- ward packets between subnets.
Media can be copper cabling, fiber-optic cabling, or radio waves. Media varies
Media
in its cost, bandwidth capacity, and distance limitation.
A digital modem used with high-speed DSL or cable Internet service. Both
Broadband
operate in a similar manner to the analog modem, but use higher broadband
modem Welcome to geeksforgeeks.org
frequencies and transmission speeds.
geeksforgeeks.org asks for your consent to
use your personal data to:
A network device with a built-in antenna, transmitter, and adapter that
provides aperm_identity Personalised
connection ads and
point content, WLANs
between ad and content
andmeasurement,
a wired Ethernet LAN. APs
Access point audience insights and product development
usually have several wired RJ-45 ports to support LAN clients. Most small
(AP)
devices office
office or home Store and/or
(SOHO)access information
routers on a device
integrate an AP.
Your personal data will be processed and information from your device
Cables in Networking Devices:
(cookies, unique identifiers, and other device data) may be stored by,
accessed by and shared with third party vendors, or used specifically by
this site or app.
Some vendors may process your personal data on the basis of legitimate
Ethernet Standards Data
interest, Cable
which you can object Fiber your
to by managing Type options below.Maximum
Look for Distance
a link at the bottom of this page or in our privacy policy where you can
(IEEE) withdrawRateconsent. (IEEE)
Skip to content
Speed Common Informal IEEE Formal IEEE Cable Type,
Name Standard Name Standard Name Maximum Length
10
Ethernet 10BASE-T 802.3 Copper, 100 m
Mbps
100 Fast
100BASE-T 802.3u Copper, 100 m
Mbps Ethernet
1000 Gigabit
1000BASE-LX 802.3z Fiber, 5000 m
Mbps Ethernet
1000 Gigabit
1000BASE-T 802.3ab Copper, 100 m
Mbps Ethernet
10 10 Gig
10GBASE-T 802.3an Copper, 100 m
Gbps Ethernet
Type Description
Welcome
It is an internal private network builtto geeksforgeeks.org
within an organization using Internet and
Intranet World Wide Web standards and products
geeksforgeeks.org asksthat
forprovides access to
your consent tocorporate
use your
information for the organization’s personal
employees. data to:
Personalised ads and content, ad and content measurement,
This is a type ofperm_identitynetwork that
audience allows
insights and external users to access an organization’s
product development
Extranet
intranet.
devices Store and/or access information on a device
Transmission Meia:
Your personal data will be processed and information from your device
(cookies, unique identifiers, and other device data) may be stored by,
Guided Media: accessed by and shared with third party vendors, or used specifically by
this site or app.
Some vendors may process your personal data on the basis of legitimate
Type of media interest, which you can object to byDescription
managing your options below. Look for
a link at the bottom of this page or in our privacy policy where you can
withdraw consent.
It is a superimposed winding of two separately insulated conductors. As a
Twisted Pair
rule, several such pairs are grouped together in a protective cover. They are
Cable
the most widely used transmission media.
It has a PVC or Teflon insulating layer and an outer plastic sheath containing
Coaxial Cable
two parallel conductors, each with a separate conformal protective cover.
It uses the concept of light reflection through a glass or plastic core. The
Optical Fiber
core is surrounded by a less dense glass or plastic shell called the cladding.
Cable
Used to transfer large amounts of data.
Microstripline Conductive material is separated from the ground plane by a dielectric layer.
Unguided Media:
Type of Description
media
These are easy to generate and can penetrate buildings. There is no need to
Radio
align the transmit and receive antennas. Frequency Range: 3kHz – 1GHz AM
waves
radios, FM radios, and cordless phones use radio waves for transmission.
Types of Multiplexers:
Type Description
The frequency spectrum is divided into logical channels and each user has
Frequency
exclusive access to his channel. It transmits signals in several different
Division
frequency ranges and multiple video channels over a single cable. Each
Multiplexing
signal is modulated onto a different carrier frequency and the carrier
(FDM)
frequencies are separated by guard bands.
Time Division Each user gets full bandwidth for a short period of time on a regular basis.
Multiplexing
The entire channel is dedicated to her one user, but only for a short time.
(TDM)
Wavelength This is the same as FDM but applied to fiber, with the difference that here
Division the operating frequency is much higher, actually in the optical range. Due
Multiplexing to its extremely high bandwidth, fiber optic has great potential.
Welcome to geeksforgeeks.org
Collision Detection:
geeksforgeeks.org asks for your consent to
use your personal data to:
Type Description
Personalised ads and content, ad and content measurement,
perm_identity audience insights and product development
Carrier Sense Multiple In this method, after sending a frame, the station monitors the media
devices Store and/or access information on a device
Access with Collision to see if the transmission was successful. If successful, the
Detection (CSMA/CD) transmission is terminated, otherwise the frame is retransmitted.
Your personal data will be processed and information from your device
(cookies, unique identifiers, and other device data) may be stored by,
The basic
accessed by andidea
sharedbehind
with third CSMA/CA
party vendors, is thatspecifically
or used stations by must be able to
Carrier Sense Multiple this site or app.
receive while transmitting in order to detect collisions from different
Access with Collision Some vendors may process your personal data on the basis of legitimate
stations.
interest, whichAyou
collision
can objectinto abywired
managing network nearly
your options below.doubles
Look for the energy of
Avoidance (CSMA/CA) athe
link at the bottomsignal,
of this page or in our privacy policy
received allowing stations towhere
detectyou a
can
potential collision.
withdraw consent.
It was developed for wifi, but can also be used for shared media.
ALOHA Multiple stations can transmit data at the same time, which can lead
to collisions and data corruption.
Type Description
The process of encapsulating data (also called payload) received from upper
layers of the network into network layer packets at the source and
Packetizing
decapsulating the payload from the network layer packets at the destination
is called packetization.
These are two other services provided by the network layer. A network has
Routing and
many routes from a source to a destination. The network layer sets some
Forwarding
strategies for finding the best possible route. This process is called routing.
Mode of Communication:
Types Description
In simplex mode, communication is one-way, like one-way. Only one of the two
Simplex
devices on the link can transmit, the other can only receive. Simplex mode allows
Mode
data to be sent in one direction using the full capacity of the channel.
Skip to content
In half-duplex mode, each station can both transmit and receive, but not at the
Half-
same time. When one device transmits, the other device can only receive and
Duplex
vice versa. Half-duplex mode is used when simultaneous communication in both
Mode
directions is not required.
In full-duplex mode, both stations can transmit and receive at the same time. In
full-duplex mode, signals in one direction share the capacity of the link with
Full- signals in the other direction. This sharing can be done in two ways:
Duplex Either the link must contain two physically separate transmission paths, one
Mode for sending and the other for receiving.
Or the capacity is divided between signals traveling in both directions.
CLASS 24 2
0 8 24 27 ( 128) 0.0.0.0
A (16,777,216)
CLASS
10 16 16 14 2 (16,384) 16 2 (65,536) 128.0.0.0
B
CLASS 21 2
110 24 8 Welcome to geeksforgeeks.org
8 2 (256) 192.0.0.0
C (2,097,152)
geeksforgeeks.org asks for your consent to
CLASS NOT use your personal data to:
NOT
1110 NOT DEFINED NOT DEFINED 224.0.0.0
D DEFINED DEFINED
Personalised ads and content, ad and content measurement,
perm_identity audience insights and product development
Your personal data will be processed and information from your device
(cookies, unique identifiers, and other device data) may be stored by,
Subnet Address or Subnet 1st
accessed by andUsable
shared withIP
third party Last usable
vendors, IP
or used specifically by Broadcast
this site or app.
ID Using/16Prefix Address Address Address
Some vendors may process your personal data on the basis of legitimate
interest, which you can object to by managing your options below. Look for
120.0.0.0/24 a link at the bottom of this page or in 120.0.255.254
120.0.0.1 our privacy policy where you can120.0.255.255
withdraw consent.
Subnetting:
10.0.0.0 to
10.0.0.0 255.0.0.0 10.0.0.0/8
10.255.255.255
Skip to content
172.16.0.0 to
172.16.0.0 255.240.0.0 172.16.0.0/12
172.31.255.255
192.168.0.0 to
192.168.0.0 255.255.0.0 192.168.0.0/16
192.168.255.255
Method Description
Encrypt data with a key, that is, the same key is required to decrypt the
Encryption
data. This is how HTTPS works.
MAC Address Allow devices to access or be prevented from accessing the network based
Filtering on their physical address embedded in the device’s network adapter.
Similar Reads
Welcome to geeksforgeeks.org
1. jQuery Cheat Sheet – A Basic Guide to jQuery
geeksforgeeks.org asks for your consent to
use your personal data to:
2. HTML Cheat Sheet - A Basic Guide to HTML
Personalised ads and content, ad and content measurement,
perm_identity
audience
3. CSS Cheat Sheet - A Basic Guide to insights
CSS and product development
5. Nmap Cheat Sheet Your personal data will be processed and information from your device
(cookies, unique identifiers, and other device data) may be stored by,
accessed by and shared with third party vendors, or used specifically by
6. Angular Cheat Sheetthis
- Asite
Basic Guide to Angular
or app.
Some vendors may process your personal data on the basis of legitimate
interest, which you can object to by managing your options below. Look for
7. Basic Network Attacks
a linkinatComputer Network
the bottom of this page or in our privacy policy where you can
withdraw consent.
8. Difference between Storage Area Network (SAN) and Network Attached Storage (NAS)
Previous Next
feedback@geeksforgeeks.org In Media Python Backend LIVE C++ Linked List Greedy JavaScript
Skip to content
Terms and Conditions DevOps LIVE GoLang Queue Pattern Searching ReactJS
Advertise with us
Computer Science Python Data Science & ML DevOps Competitive System Design
GATE CS Notes Python Programming Data Science With Python Git Programming What is System Design
Operating Systems Examples Data Science For Beginner AWS Top DSA for CP Monolithic and Distributed
Computer Network Django Tutorial Machine Learning Tutorial Docker Top 50 Tree Problems SD
Database Management Python Projects Maths For Machine Kubernetes Top 50 Graph Problems Scalability in SD
Software Engineering OpenCV Python Tutorial Pandas Tutorial GCP Top 50 String Problems High Level Design or HLD
Digital Logic Design Python Interview Question NumPy Tutorial Top 50 DP Problems Low Level Design or LLD
Interview Corner GfG School Commerce UPSC SSC/ BANKING Write & Earn
Company Preparation CBSE Notes for Class 8 Accountancy Polity Notes SSC CGL Syllabus Write an Article
Preparation for SDE CBSE Notes for Class 9 Business Studies Geography Notes SBI PO Syllabus Improve an Article
Company Interview Corner CBSE Notes for Class 10 Microeconomics History Notes SBI Clerk Syllabus Pick Topics to Write
Experienced Interview CBSE Notes for Class 11 Macroeconomics Science and Technology IBPS PO Syllabus Write Interview
Internship Interview CBSE Notes for Class 12 Statistics for Economics Notes IBPS Clerk Syllabus Experience
Competitive Programming English Grammar Indian Economic Economics Notes Aptitude Questions Internships
Aptitude Development Important Topics in Ethics SSC CGL Practice Papers Video Internship
Your personal data will be processed and information from your device
(cookies, unique identifiers, and other device data) may be stored by,
accessed by and shared with third party vendors, or used specifically by
this site or app.
Some vendors may process your personal data on the basis of legitimate
interest, which you can object to by managing your options below. Look for
a link at the bottom of this page or in our privacy policy where you can
withdraw consent.