Computer Network Tutorials

Recent Articles on Computer Networks

Basics :

Data Link Layer :

Network Layer :



  1. Introduction and IPv4 Datagram Header
  2. IP Addressing | Introduction and Classful Addressing
  3. IP Addressing | Classless Addressing
  4. Supernetting
  5. Ipv4 Datagram Fragmentation and Delays
  6. Fragmentation at Network Layer
  7. Internet Protocol v6 | IPv6
  8. Internet Protocol version 6 (IPv6) Header
  9. Internet Control Message Protocol (ICMP)
  10. Longest Prefix Matching in Routers
  11. Routing v/s Routed Protocols
  12. Fixed and Flooding Routing algorithms
  13. Classes of routing protocols
  14. Types of routing
  15. Classification of Routing Algorithms
  16. Routing Protocols Set 1 (Distance Vector Routing)
  17. Route Poisoning and Count to infinity problem
  18. Redundant link problems
  19. Administrative Distance (AD) and Autonomous System (AS)
  20. Unicast Routing – Link State Routing
  21. Link state advertisement (LSA)
  22. Securing Routing Protocols
  23. Distance vector routing v/s Link state routing
  24. Routing Information Protocol (RIP)
  25. Redistribution
  26. EIGRP fundamentals
  27. EIGRP Configuration
  28. Features of Enhanced Interior Gateway Routing Protocol (EIGRP)
  29. EIGRP cost calculation
  30. Open shortest path first (OSPF) protocol fundamentals
  31. Open shortest path first (OSPF) router roles and configuration
  32. Open shortest path first (OSPF) protocol States
  33. Probabilistic shortest path routing algorithm for optical networks
  34. Types of Spanning Tree Protocol (STP)
  35. Network address translation (NAT)
  36. Types of Network address translation (NAT)
  37. VRRP(Virtual Router Redundancy Protocol) | Introduction and configuration
  38. Hot Standby Router Protocol (HSRP)
  39. Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP)
  40. Router on a stick | Introduction and Configuration
  41. Traceroute
  42. What’s difference between Ping and Traceroute?
  43. ARP, Reverse ARP(RARP), Inverse ARP(InARP), Proxy ARP and Gratuitous ARP
  44. How ARP works?
  45. Packet flow in the same network
  46. Packet flow in different network
  47. Access-lists (ACL)
  48. Context based access control (CBAC)
  49. Standard Access-list
  50. Extended access-list
  51. Reflexive Access-list
  52. Time based access-list
  53. AAA (Authentication, Authorization and Accounting)
  54. AAA (authentication) configuration (locally)
  55. RADIUS
  56. TACACS+
  57. TACACS+ and RADIUS

>> Quiz on Network Layer
>> Quiz on IP addressing

Transport Layer :

Application Layer :

Network Security and Cryptography :

Compression Techniques :



Network Experiments :

Devices :

Misc :

Quick Links :



My Personal Notes arrow_drop_up