From nmap online manual
If no host discovery options are given, Nmap sends an ICMP echo request, a TCP SYN packet to port 443, a TCP ACK packet to port 80, and an ICMP timestamp request. (For IPv6, the ICMP timestamp request is omitted because it is not part of ICMPv6.) These defaults are equivalent to the -PE -PS443 -PA80 -PP options. The exceptions to this are the ARP (for IPv4) and Neighbor Discovery (for IPv6) scans which are used for any targets on a local ethernet network. For unprivileged Unix shell users, the default probes are a SYN packet to ports 80 and 443 using the connect system call. This host discovery is often sufficient when scanning local networks, but a more comprehensive set of discovery probes is recommended for security auditing
give it a try with something like nmap -F yourNetworkAddress/YourNetMask (if you dont know how to calculate the submask search for network calculator like this).
If you are starting to use nmap the visual GUI (zenmap) , reading the manual and analyze the network traffic you are generating (use wireshark)will really help you to understand what you are doing in the under layer , and will prevent you to do anything dangerous for you and other users.