2.9. Reflection Checkpoint: Networking Concepts Mastery
Key Takeaways
Before proceeding, ensure you can:
- Identify which OSI layer a device or protocol operates at
- Recall common ports: 22 (SSH), 53 (DNS), 80 (HTTP), 443 (HTTPS), 3389 (RDP)
- Distinguish IDS (detects/alerts) from IPS (detects/blocks)
- Recognize APIPA (169.254.x.x) as a DHCP failure indicator
- Calculate subnet boundaries using CIDR notation
- Explain the difference between public, private, and hybrid cloud deployments
Connecting Forward
In Phase 3, you'll apply these concepts to actual implementation—configuring routing protocols, VLANs, trunk ports, and wireless networks. The OSI model understanding becomes practical when troubleshooting why traffic doesn't flow between VLANs (Layer 3 routing required) or why a wireless client can't authenticate (Layer 2 security—802.1X).
Self-Check Questions
-
A switch learns that MAC 00:1A:2B:3C:4D:5E is on port 5. A frame arrives on port 3 destined for that MAC. What does the switch do, and why?
-
A server has IP 10.0.0.50/24 and needs to reach 192.168.1.100. Is this local or remote? What address type determines the next step?
-
Your organization needs to host a web application handling credit card data with maximum control over security. Which cloud deployment model would you recommend?