Fundamentals 12 min read

Master Computer Networking with 38 Essential Mind Maps

This article presents a comprehensive collection of 38 mind‑maps that systematically cover core computer networking concepts—from the TCP/IP stack and protocol layers to routing, VLANs, VPNs, and related technologies—providing a visual roadmap for learners to master the fundamentals.

Liangxu Linux
Liangxu Linux
Liangxu Linux
Master Computer Networking with 38 Essential Mind Maps

01 TCP/IP Network Protocol Stack

The TCP/IP stack consists of four layers: Application, Transport, Internet, and Link. Each layer provides specific services, e.g., HTTP at the Application layer, TCP/UDP at Transport, IP at Internet, and Ethernet at Link.

TCP/IP Network Protocol Stack
TCP/IP Network Protocol Stack

02 TCP/IP Protocol Layering

Layering separates concerns: the Application layer hosts protocols like HTTP, DNS; the Transport layer provides reliable (TCP) or best‑effort (UDP) delivery; the Internet layer handles routing via IP; the Link layer manages framing and media access.

TCP/IP Protocol Layering
TCP/IP Protocol Layering

03 Transmission Media Overview

Common media include twisted‑pair copper (UTP/STP), coaxial cable, fiber‑optic (single‑mode, multimode), and wireless (radio, microwave). Selection depends on bandwidth, distance, and cost.

Transmission Media Overview
Transmission Media Overview

04 Ethernet Frame Structure

An Ethernet II frame contains: preamble, destination MAC, source MAC, EtherType/Length, payload (46‑1500 bytes), and CRC. VLAN tagging inserts a 4‑byte 802.1Q header after the source MAC.

Ethernet Frame Structure
Ethernet Frame Structure

05 IP Addressing

IPv4 uses 32‑bit addresses expressed in dotted‑decimal notation (e.g., 192.168.1.1). Subnet masks define network and host portions. CIDR notation (e.g., /24) replaces classful masks. IPv6 expands to 128‑bit addresses written in hexadecimal groups.

IP Addressing
IP Addressing

06 ICMP Protocol

ICMP provides diagnostic and control messages for IP, such as Echo Request/Reply (ping), Destination Unreachable, Time Exceeded, and Redirect. It operates directly over IP (protocol number 1).

ICMP Protocol
ICMP Protocol

07 ARP Protocol

ARP resolves IPv4 addresses to MAC addresses on a local LAN. An ARP request is broadcast; the host owning the IP replies with its MAC. Gratuitous ARP can announce a host's address.

ARP Protocol
ARP Protocol

08 Link Aggregation

Link Aggregation (LACP, IEEE 802.3ad) combines multiple physical links into a single logical channel, increasing bandwidth and providing redundancy. Traffic is distributed using hash algorithms based on MAC/IP/port fields.

Link Aggregation
Link Aggregation

09 VLAN Principles and Configuration

VLANs (IEEE 802.1Q) segment a Layer‑2 domain into separate broadcast domains. Each VLAN is identified by a 12‑bit VLAN ID (1‑4094). Switch ports are configured as access (single VLAN) or trunk (multiple VLANs with tagging).

VLAN Principles and Configuration
VLAN Principles and Configuration

10 VLAN Routing

Inter‑VLAN routing is performed by a Layer‑3 device (router or Layer‑3 switch). Each VLAN is assigned a SVI (Switched Virtual Interface) with an IP address; routing protocols or static routes forward traffic between SVIs.

VLAN Routing
VLAN Routing

11 Wireless LAN (WLAN)

WLANs use IEEE 802.11 standards (a/b/g/n/ac/ax). Key concepts include SSID, BSSID, authentication (WPA2/WPA3), channel selection, and roaming. Access points bridge wireless frames to the wired LAN.

Wireless LAN (WLAN)
Wireless LAN (WLAN)

12 DHCP

Dynamic Host Configuration Protocol automatically assigns IPv4 addresses, subnet masks, gateways, and DNS servers. DHCP operates over UDP ports 67 (server) and 68 (client) using a four‑step DORA process (Discover, Offer, Request, Acknowledge).

DHCP
DHCP

13 FTP

File Transfer Protocol uses separate control (port 21) and data (port 20 or passive ports) connections. It supports active and passive modes, binary/ascii transfer types, and authentication via username/password.

FTP
FTP

14 Telnet

Telnet provides unencrypted, line‑oriented remote terminal access over TCP port 23. Because credentials travel in clear text, it is deprecated in favor of SSH.

Telnet
Telnet

15 Access Control Lists (ACL)

ACLs filter traffic based on Layer‑3/4 fields (source/destination IP, protocol, ports). Standard ACLs match only source IP; extended ACLs can match source/destination IP, protocol, and ports. ACLs are applied inbound or outbound on interfaces.

Access Control Lists (ACL)
Access Control Lists (ACL)

16 AAA (Authentication, Authorization, Accounting)

AAA frameworks (e.g., RADIUS, TACACS+) centralize user authentication, define permitted actions (authorization), and log usage (accounting). They are essential for secure network device management.

AAA (Authentication, Authorization, Accounting)
AAA (Authentication, Authorization, Accounting)

17 GRE Principles and Configuration

Generic Routing Encapsulation (GRE) tunnels encapsulate any Layer‑3 protocol within IP. Configuration involves defining a tunnel interface, specifying source/destination IPs, and optionally setting a key for security.

GRE Principles and Configuration
GRE Principles and Configuration

18 IPSec VPN Principles and Configuration

IPSec provides confidentiality, integrity, and authentication for IP traffic. It uses two modes: Transport (protects payload) and Tunnel (protects entire packet). Key components are IKE for SA negotiation, ESP/AH for protection, and security policies.

IPSec VPN Principles and Configuration
IPSec VPN Principles and Configuration

19 Routing Basics

Routing moves packets between networks based on destination IP. Core concepts include routing tables, next‑hop determination, static vs dynamic routing, and default routes.

Routing Basics
Routing Basics

20 Static Routing Basics

Static routes are manually entered with destination network, mask, and next‑hop IP. They are simple, predictable, and useful for stub networks or backup paths.

Static Routing Basics
Static Routing Basics

21 VRP Basics

VRP (Versatile Routing Platform) is Huawei’s network‑OS. It supports routing protocols (OSPF, BGP), VLANs, ACLs, and device management via CLI similar to Cisco IOS.

VRP Basics
VRP Basics

22 Command Line Basics

Fundamental CLI commands include display (show configuration), system-view (enter configuration mode), interface (select interface), and quit (exit). Use ? for context‑sensitive help.

Command Line Basics
Command Line Basics

23 File System Basics

VRP file system commands: dir (list files), cd (change directory), copy (copy files), delete (remove files). Configuration files are stored as .cfg and can be backed up via TFTP.

File System Basics
File System Basics

24 IPv6 Basics Introduction

IPv6 expands the address space to 128 bits, represented as eight 16‑bit hexadecimal groups. Features include simplified header, built‑in security (IPsec), and autoconfiguration via SLAAC and DHCPv6.

IPv6 Basics Introduction
IPv6 Basics Introduction

25 IPv6 Routing Basics

IPv6 routing uses the same principles as IPv4 but with larger addresses. Common protocols include OSPFv3 and BGP4+. Link‑local addresses (fe80::/10) are used for neighbor discovery.

IPv6 Routing Basics
IPv6 Routing Basics

26 DHCPv6

DHCPv6 provides stateful address assignment and other configuration parameters (DNS, domain). It operates over UDP ports 546 (client) and 547 (server). Prefix Delegation enables routers to assign subnets to downstream devices.

DHCPv6
DHCPv6

27 HDLC & PPP Principles and Applications

HDLC is a synchronous, bit‑oriented framing protocol used on point‑to‑point links. PPP (Point‑to‑Point Protocol) builds on HDLC, adding LCP for link configuration, NCP for network‑layer protocol negotiation, and optional authentication (PAP/CHAP).

HDLC & PPP Principles and Applications
HDLC & PPP Principles and Applications

28 Frame Relay Principles and Configuration

Frame Relay is a packet‑switched WAN technology using DLCIs (Data Link Connection Identifiers) to identify virtual circuits. It provides low‑overhead, variable‑length frames and relies on LMI for status monitoring.

Frame Relay Principles and Configuration
Frame Relay Principles and Configuration

29 PPPoE

PPP over Ethernet encapsulates PPP frames inside Ethernet. It is widely used for DSL broadband. The discovery stage uses PADI/PADO/PADR/PADS packets; the session stage establishes a PPP link with LCP, authentication, and IPCP.

PPPoE
PPPoE

30 NAT (Network Address Translation)

NAT translates private IP addresses to a public address. Types include static NAT, dynamic NAT, and PAT (Port Address Translation, also called NAT overload). NAT modifies source IP/port in outbound packets and restores them on return.

NAT (Network Address Translation)
NAT (Network Address Translation)

31 Switch Network Basics

Layer‑2 switches forward frames based on MAC address tables. They support features such as port security, spanning‑tree, and VLAN tagging. Switches reduce broadcast domains when combined with VLANs.

Switch Network Basics
Switch Network Basics

32 STP (Spanning Tree Protocol)

STP (IEEE 802.1D) prevents loops in Layer‑2 networks by creating a tree topology. It elects a root bridge, calculates path costs, and blocks redundant ports. BPDU packets carry the topology information.

STP (Spanning Tree Protocol)
STP (Spanning Tree Protocol)

33 RSTP Principles and Configuration

Rapid STP (IEEE 802.1w) improves convergence time by using proposal/agreement handshakes and port roles (alternate, backup). Configuration typically involves enabling stp mode rstp on Huawei devices.

RSTP Principles and Configuration
RSTP Principles and Configuration

34 OSPF (Link State Routing Protocol)

OSPF divides the network into areas, with Area 0 as the backbone. Routers exchange LSAs to build a link‑state database, then run Dijkstra’s algorithm to compute shortest‑path trees. Supports authentication and stub areas.

OSPF (Link State Routing Protocol)
OSPF (Link State Routing Protocol)

35 VRP System Management

System management tasks include backup/restore of configuration, firmware upgrades via upgrade command, license activation, and monitoring via display version and display cpu.

VRP System Management
VRP System Management

36 GRE Principles and Configuration (Repeated)

See section 17 for details.

GRE Principles and Configuration
GRE Principles and Configuration

37 IPSec VPN Principles and Configuration (Repeated)

See section 18 for details.

IPSec VPN Principles and Configuration
IPSec VPN Principles and Configuration
Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

ProtocolsroutingTCP/IPfundamentalsComputer Networksmind maps
Liangxu Linux
Written by

Liangxu Linux

Liangxu, a self‑taught IT professional now working as a Linux development engineer at a Fortune 500 multinational, shares extensive Linux knowledge—fundamentals, applications, tools, plus Git, databases, Raspberry Pi, etc. (Reply “Linux” to receive essential resources.)

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.