Fundamentals 6 min read

Essential Networking Fundamentals: Ethernet, WLAN, Protocols, and More

This guide provides a comprehensive visual overview of core networking concepts, covering Ethernet frame structure, WLAN standards, structured cabling, network interconnection devices, routing protocols, IP datagram format, private address ranges, TCP/UDP packet formats, common ports, DHCP workflow, Kerberos authentication, SNMP versions, RISC vs CISC differences, RAID technologies, OSI layer functions, and digital transmission standards.

Liangxu Linux
Liangxu Linux
Liangxu Linux
Essential Networking Fundamentals: Ethernet, WLAN, Protocols, and More

Ethernet Frame Structure

An Ethernet frame consists of a 7‑byte preamble, a 1‑byte start‑frame delimiter (SFD), a 6‑byte destination MAC address, a 6‑byte source MAC address, a 2‑byte EtherType/Length field, a payload (46‑1500 bytes for standard Ethernet), and a 4‑byte frame check sequence (FCS) for error detection.

Wireless LAN (IEEE 802.11) Standards

Key 802.11 families include:

802.11a : 5 GHz band, up to 54 Mbps, OFDM modulation.

802.11b : 2.4 GHz band, up to 11 Mbps, DSSS.

802.11g : 2.4 GHz, up to 54 Mbps, OFDM.

802.11n : 2.4/5 GHz, up to 600 Mbps, MIMO.

802.11ac : 5 GHz, up to several Gbps, wider channels.

802.11ax (Wi‑Fi 6) : 2.4/5/6 GHz, OFDMA, target‑wake‑time, higher efficiency.

Structured Cabling System

A hierarchical cabling architecture comprises:

Backbone : fiber or high‑grade copper linking equipment rooms.

Horizontal cabling : twisted‑pair (Cat5e, Cat6, Cat6a, Cat7) from distribution points to work‑area outlets.

Termination points : patch panels, wall jacks, and RJ‑45 connectors.

Network Interconnection Devices

Hub : Layer 1 repeater, broadcasts incoming frames to all ports.

Switch : Layer 2 device, forwards frames based on MAC tables, supports VLANs.

Router : Layer 3 device, routes packets between IP subnets using routing tables.

Bridge : Connects two LAN segments, learns MAC addresses to reduce collisions.

Firewall : Enforces security policies, can operate at multiple OSI layers.

Common Routing Protocols

Interior Gateway Protocols (IGPs): RIP (distance‑vector, hop count limit 15), OSPF (link‑state, area hierarchy), EIGRP (advanced distance‑vector, Cisco‑proprietary). Exterior Gateway Protocol (EGP): BGP (path‑vector, policy‑based routing for the Internet).

IPv4 Datagram Format

0                   1                   2                   3
+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
|Version| IHL |Type of Service| Total Length                |
+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
| Identification | Flags | Fragment Offset                     |
+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
| TTL | Protocol | Header Checksum                               |
+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
| Source IP Address                                            |
+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
| Destination IP Address                                       |
+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
| Options (if IHL > 5)                                         |
+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+
| Payload                                                       |
+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+---+

Private IPv4 Address Ranges

10.0.0.0/8 – large internal networks.

172.16.0.0/12 – medium‑size networks.

192.168.0.0/16 – home and small‑office networks.

TCP and UDP Packet Formats

TCP Header (minimum 20 bytes): source port, destination port, sequence number, acknowledgment number, data offset, reserved bits, flags (SYN, ACK, FIN, etc.), window size, checksum, urgent pointer, optional options.

UDP Header (8 bytes): source port, destination port, length, checksum.

Common Port Numbers

80 TCP – HTTP

443 TCP – HTTPS

22 TCP – SSH

53 TCP/UDP – DNS

25 TCP – SMTP

DHCP Service Process (DORA)

Discover : client broadcasts DHCPDISCOVER.

Offer : server replies with DHCPOFFER containing an IP lease.

Request : client broadcasts DHCPREQUEST to accept the offer.

Acknowledgement : server sends DHCPACK confirming the lease.

Kerberos Authentication Workflow

The client first contacts the Authentication Server (AS) to obtain a Ticket‑Granting Ticket (TGT). Using the TGT, the client requests a service ticket from the Ticket‑Granting Server (TGS) for a specific service. The client then presents the service ticket to the target server to gain access, achieving mutual authentication without transmitting passwords.

SNMP Protocol Versions

SNMPv1 : community‑string based, basic GET/SET operations.

SNMPv2c : same security model as v1 but adds bulk retrieval and improved error handling.

SNMPv3 : introduces user‑based security model (USM) with authentication (MD5/SHA) and encryption (DES/AES).

RISC vs. CISC

RISC (Reduced Instruction Set Computing) uses fixed‑length, simple instructions that typically execute in one clock cycle, enabling deep pipelining. CISC (Complex Instruction Set Computing) provides variable‑length, feature‑rich instructions that can perform multi‑step operations, reducing the number of instructions per program but often requiring multiple cycles per instruction.

RAID Technology

RAID 0 : striping, no redundancy, high throughput.

RAID 1 : mirroring, fault tolerance, read performance.

RAID 5 : block-level striping with distributed parity, balance of capacity, performance, and fault tolerance.

RAID 6 : double parity, tolerates two simultaneous disk failures.

RAID 10 : mirrored stripes, combines RAID 1 and RAID 0 benefits.

OSI Model Layer Functions

Physical : transmission of raw bits over a medium.

Data Link : framing, MAC addressing, error detection.

Network : routing, logical addressing (IP).

Transport : end‑to‑end reliability (TCP) or best‑effort delivery (UDP).

Session : dialog control, synchronization.

Presentation : data translation, encryption, compression.

Application : network‑aware services (HTTP, FTP, DNS).

Digital Transmission Standards

Key concepts include:

Baud rate : symbol changes per second; may differ from bit rate when multi‑level signaling is used.

Encoding schemes : NRZ, Manchester, 8b/10b, PAM‑5 (used in 1000BASE‑T).

Common standards : Ethernet variants (10BASE‑T, 100BASE‑TX, 1000BASE‑T, 10GBASE‑R), DSL, SONET/SDH, and optical carrier levels (OC‑3, OC‑12).

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

ProtocolsNetworkingfundamentalsOSI modelethernet
Liangxu Linux
Written by

Liangxu Linux

Liangxu, a self‑taught IT professional now working as a Linux development engineer at a Fortune 500 multinational, shares extensive Linux knowledge—fundamentals, applications, tools, plus Git, databases, Raspberry Pi, etc. (Reply “Linux” to receive essential resources.)

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.