Computer Network Tutorials

Recent Articles on Computer Networks

Basics :

Data Link Layer :

  1. Local Area Network (LAN) Technologies.
  2. Computer Network | Bridges (local Internetworking device)
  3. Internetworking
  4. Framing In Data Link Layer
  5. Introduction of MAC Address
  6. MAC Filtering
  7. Multiple Access Protocols
  8. Ethernet Frame Format
  9. EtherChannel
  10. Difference between Byte stuffing and Bit stuffing
  11. Implementing Byte stuffing using Java
  12. Circuit Switching
  13. Packet Switching and Delays
  14. Circuit Switching VS Packet Switching
  15. Differences between Virtual Circuits & Datagram Networks
  16. Switching techniques: Message switching
  17. Types of switches
  18. Maximum data rate (channel capacity) for noiseless and noisy channels
  19. Hot Spot 2.0
  20. Collision Avoidance in wireless networks
  21. Traditional wireless mobile communication
  22. Carrier sense multiple access (CSMA)
  23. Collision Detection in CSMA/CD
  24. Efficiency of CSMA/CD
  25. Back-off Algorithm for CSMA/CD
  26. Controlled Access Protocols
  27. Virtual LAN (VLAN)


  28. Inter VLAN Routing by Layer 3 Switch
  29. Computer Network | Private VLAN
  30. Computer Network | VLAN ACL (VACL)
  31. Access and trunk ports
  32. Role-based access control
  33. Port security
  34. Inter-Switch Link (ISL) and IEEE 802.1Q
  35. Dynamic Trunking Protocol (DTP)
  36. Sliding Window Protocol | Set 1 (Sender Side)
  37. Sliding Window Protocol | Set 2 (Receiver Side)
  38. Sliding Window protocols Summary
  39. Stop and Wait ARQ
  40. Difference between Stop and Wait, GoBackN and Selective Repeat
  41. Manchester Encoding
  42. Error Detection
  43. Hamming Code
  44. Program to remotely Power On a PC over the Internet using the Wake-on-LAN protocol.
  45. Basics of Wi-Fi
  46. IEEE 802.11 Mac Frame
  47. Efficiency Of Token Ring
  48. Token Bus (IEEE 802.4)
  49. Multiplexing (Channel Sharing)
  50. Frequency division and Time division multiplexing

>> Quiz on Data Link Layer

Network Layer :

  1. Integrated services digital network (ISDN)
  2. Introduction and IPv4 Datagram Header
  3. IP Addressing | Introduction and Classful Addressing
  4. IP Addressing | Classless Addressing
  5. IPv4 classless Subnet equation
  6. Supernetting
  7. Ipv4 Datagram Fragmentation and Delays
  8. Fragmentation at Network Layer
  9. Internet Protocol v6 | IPv6
  10. Internet Protocol version 6 (IPv6) Header
  11. Differences between IPv4 and IPv6
  12. Internet Control Message Protocol (ICMP)
  13. Longest Prefix Matching in Routers
  14. Routing v/s Routed Protocols
  15. Fixed and Flooding Routing algorithms
  16. Classes of routing protocols
  17. Types of routing
  18. Classification of Routing Algorithms
  19. Routing Protocols Set 1 (Distance Vector Routing)
  20. Route Poisoning and Count to infinity problem
  21. Redundant link problems
  22. Administrative Distance (AD) and Autonomous System (AS)
  23. Unicast Routing – Link State Routing
  24. Link state advertisement (LSA)
  25. Securing Routing Protocols
  26. Distance vector routing v/s Link state routing
  27. Routing Information Protocol (RIP)
  28. Routing Interface Protocol (RIP) V1 & V2
  29. Redistribution
  30. EIGRP fundamentals
  31. EIGRP Configuration
  32. Features of Enhanced Interior Gateway Routing Protocol (EIGRP)
  33. EIGRP cost calculation
  34. Open shortest path first (OSPF) protocol fundamentals
  35. Open shortest path first (OSPF) router roles and configuration
  36. Open shortest path first (OSPF) protocol States
  37. Open shortest path first (OSPF) – Set 2
  38. Probabilistic shortest path routing algorithm for optical networks
  39. Types of Spanning Tree Protocol (STP)
  40. Network address translation (NAT)
  41. Types of Network address translation (NAT)
  42. Static NAT (on ASA)
  43. Dynamic NAT (on ASA)
  44. VRRP(Virtual Router Redundancy Protocol) | Introduction and configuration
  45. Hot Standby Router Protocol (HSRP)
  46. Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP)
  47. Router on a stick | Introduction and Configuration
  48. Traceroute
  49. What’s difference between Ping and Traceroute?
  50. ARP, Reverse ARP(RARP), Inverse ARP(InARP), Proxy ARP and Gratuitous ARP
  51. How ARP works?
  52. Packet flow in the same network
  53. Packet flow in different network
  54. Wifi protected access (WPA)
  55. Wifi protected setup (WPS)
  56. LiFi vs. WiFi
  57. Service Set Identifier (SSID)
  58. Access-lists (ACL)
  59. Context based access control (CBAC)
  60. Standard Access-list
  61. Extended access-list
  62. Reflexive Access-list
  63. Time based access-list
  64. AAA (Authentication, Authorization and Accounting)
  65. AAA (authentication) configuration (locally)
  66. Challenge Response Authentication Mechanism (CRAM)
  67. Synchronous Optical Network (SONET)
  68. RADIUS
  69. TACACS+
  70. TACACS+ and RADIUS

>> Quiz on Network Layer
>> Quiz on IP addressing

Transport Layer :

Application Layer :

Network Security and Cryptography :

  1. The CIA triad
  2. Introduction to Firewall
  3. Types of firewall and possible attacks
  4. Firewall methodologies
  5. Zone-based firewall
  6. Zone-based firewall (Configuration)
  7. How to setup firewall in Linux?
  8. Message Authentication Codes
  9. How message authentication code works?
  10. HMAC Algorithm
  11. Password authentication protocol (PAP)
  12. Basic Network Attacks
  13. Birthday attack
  14. Vishing (Voice Phishing)
  15. System security
  16. Private Browsing
  17. Threat Modelling
  18. DFD Based Threat modelling | Set 1
  19. DFD Based Threat Modelling | Set 2
  20. Types of Viruses
  21. Deniel of Service and Prevention
  22. Denial of Service DDoS attack
  23. Unicode
  24. RC4 Encryption Algorithm
  25. RSA Algorithm in Cryptography
  26. RSA Algorithm using Multiple Precision Arithmetic Library
  27. Weak RSA decryption with Chinese-remainder theorem
  28. How to solve RSA Algorithm Problems?
  29. Hash Functions in System Security
  30. DNA Cryptography
  31. RC5 Encryption Algorithm
  32. ElGamal Encryption Algorithm
  33. Caesar Cipher
  34. Cryptography Introduction
  35. Cryptography | Traditional Symmetric Ciphers
  36. Block cipher modes of operation
  37. Cryptography | Development of Cryptography
  38. Difference between AES and DES ciphers
  39. Transforming a Plain Text message to Cipher Text
  40. What is a cryptocurrency?
  41. Introduction to Crypto-terminologies
  42. Quantum Cryptography
  43. End to End Encryption (E2EE) in Computer Networks
  44. IP security (IPSec)
  45. What is Packet Sniffing ?
  46. Introduction to Sniffers
  47. Data encryption standard (DES) | Set 1
  48. End to End Encryption (E2EE) in Computer Network
  49. Types of Security attacks | Active and Passive attacks
  50. Types of Wireless and Mobile Device Attacks
  51. Types of Email Attacks
  52. Sybil Attack
  53. Malware and its types

>> Quiz on Network Security and Cryptography

Compression Techniques :

Network Experiments :

Devices :

Misc :

Quick Links :



My Personal Notes arrow_drop_up


Writing code in comment? Please use ide.geeksforgeeks.org, generate link and share the link here.