Computer Network TutorialLast Updated : 15 May, 2023ReadDiscuss(20+)CoursesA computer network is a collection of computers or devices connected to share resources. Any device which can share or receive the data is called a Node. Through which the information or data propagate is known as channels, It can be guided or unguided.In this Computer network tutorial, you’ll learn basic to advanced concepts like the Basics of computer networks, data link layer, network layer, network security and cryptography, compression techniques, etc.Recent Articles on Computer NetworksBasicsData Link LayerNetwork LayerTransport LayerApplication LayerNetwork Security and CryptographyCompression TechniquesNetwork ExperimentsDevicesMiscBasics :Basics of Computer NetworkingThe Internet and the WebInternet and Web programming: Behind the scenesThe New Internet | Internet of EverythingUnknown facts of NetworkingNetwork goalsLine Configuration in Computer NetworksTransmission Modes in Computer NetworksTypes of Transmission MediaUnicast, Broadcast and MulticastIntroduction to basic Networking terminologyNetwork TopologiesTypes of area networks – LAN, MAN and WANTelecom NetworksAccess networksTCP/IP ModelLayers of OSI ModelIntroduction to Active Directory Domain ServiceAdvantages and Disadvantages of Computer NetworkingData Link Layer :Local Area Network (LAN) Technologies.Computer Network | Bridges (local Internetworking device)InternetworkingFraming In Data Link LayerIntroduction of MAC AddressMAC FilteringMultiple Access ProtocolsEthernet Frame FormatEtherChannelDifference between Byte stuffing and Bit stuffingImplementing Byte stuffing using JavaCircuit SwitchingPacket Switching and DelaysCircuit Switching VS Packet SwitchingDifferences between Virtual Circuits & Datagram NetworksSwitching techniques: Message switchingTypes of switchesMaximum data rate (channel capacity) for noiseless and noisy channelsHot Spot 2.0Collision Avoidance in wireless networksTraditional wireless mobile communicationCarrier sense multiple access (CSMA)Collision Detection in CSMA/CDEfficiency of CSMA/CDBack-off Algorithm for CSMA/CDControlled Access ProtocolsVirtual LAN (VLAN)Inter VLAN Routing by Layer 3 SwitchComputer Network | Private VLANComputer Network | VLAN ACL (VACL)Access and trunk portsRole-based access controlPort securityInter-Switch Link (ISL) and IEEE 802.1QDynamic Trunking Protocol (DTP)Sliding Window Protocol | Set 1 (Sender Side)Sliding Window Protocol | Set 2 (Receiver Side)Sliding Window Protocol | Set 3 (Selective Repeat)Sliding Window protocols SummaryStop and Wait ARQDifference between Stop and Wait, GoBackN and Selective RepeatManchester EncodingError DetectionHamming CodeProgram to remotely Power On a PC over the Internet using the Wake-on-LAN protocol.Basics of Wi-FiIEEE 802.11 Mac FrameEfficiency Of Token RingToken Bus (IEEE 802.4)Multiplexing (Channel Sharing)Frequency division and Time division multiplexing>> Quiz on Data Link LayerNetwork Layer :Integrated services digital network (ISDN)Introduction and IPv4 Datagram HeaderIP Addressing | Introduction and Classful AddressingIP Addressing | Classless AddressingIPv4 classless Subnet equationSupernettingIpv4 Datagram Fragmentation and DelaysFragmentation at Network LayerInternet Protocol v6 | IPv6Internet Protocol version 6 (IPv6) HeaderDifferences between IPv4 and IPv6Internet Control Message Protocol (ICMP)Longest Prefix Matching in RoutersRouting v/s Routed ProtocolsFixed and Flooding Routing algorithmsClasses of routing protocolsTypes of routingClassification of Routing AlgorithmsRouting Protocols Set 1 (Distance Vector Routing)Route Poisoning and Count to infinity problemRedundant link problemsAdministrative Distance (AD) and Autonomous System (AS)Unicast Routing – Link State RoutingLink state advertisement (LSA)Securing Routing ProtocolsDistance vector routing v/s Link state routingRouting Information Protocol (RIP)Routing Interface Protocol (RIP) V1 & V2RedistributionEIGRP fundamentalsEIGRP ConfigurationFeatures of Enhanced Interior Gateway Routing Protocol (EIGRP)EIGRP cost calculationOpen shortest path first (OSPF) protocol fundamentalsOpen shortest path first (OSPF) router roles and configurationOpen shortest path first (OSPF) protocol StatesOpen shortest path first (OSPF) – Set 2Probabilistic shortest path routing algorithm for optical networksTypes of Spanning Tree Protocol (STP)Network address translation (NAT)Types of Network address translation (NAT)Static NAT (on ASA)Dynamic NAT (on ASA)VRRP(Virtual Router Redundancy Protocol) | Introduction and configurationHot Standby Router Protocol (HSRP)Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP)Router on a stick | Introduction and ConfigurationTracerouteWhat’s difference between Ping and Traceroute?ARP, Reverse ARP(RARP), Inverse ARP(InARP), Proxy ARP and Gratuitous ARPHow ARP works?Packet flow in the same networkPacket flow in different networkWifi protected access (WPA)Wifi protected setup (WPS)LiFi vs. WiFiService Set Identifier (SSID)Access-lists (ACL)Context based access control (CBAC)Standard Access-listExtended access-listReflexive Access-listTime based access-listAAA (Authentication, Authorization and Accounting)AAA (authentication) configuration (locally)Challenge Response Authentication Mechanism (CRAM)Synchronous Optical Network (SONET)RADIUSTACACS+TACACS+ and RADIUS>> Quiz on Network Layer>> Quiz on IP addressingTransport Layer :TCP Connection EstablishmentTCP 3-Way Handshake ProcessTCP TimersTCP Connection TerminationTCP Sequence Number | Wrap Around ConceptTransport Layer responsibilitiesMultiplexing and Demultiplexing in Transport LayerUser Datagram Protocol (UDP)P2P(Peer To Peer) File SharingCongestion ControlTCP Congestion ControlCongestion control techniquesLeaky Bucket AlgorithmError Control in TCPTCP flagsTCP | Services and Segment structureTCP Server-Client implementation in CTCP and UDP server using selectServers>> Quiz on Transport LayerApplication Layer :Protocols in Application LayerSimple Mail Transfer Protocol (SMTP)DNS (Domain Name Server)Why does DNS use UDP and not TCP?Address Resolution in DNSDNS Spoofing or DNS Cache poisoningTypes of DNS Attacks and Tactics for SecurityWhat’s difference between http:// and https:// ?What’s difference between HTML and HTTP ?HTTP Non-Persistent & Persistent Connection | Set 1File Transfer Protocol (FTP)What are the differences between HTTP, FTP, and SMTP?Asynchronous Transfer Mode (ATM)What is Local Host?Dynamic Host Configuration Protocol (DHCP)DHCP Relay AgentHow DHCP server dynamically assigns IP address to a host?What’s difference between The Internet and The Web ?Simple network management protocol (SNMP)Multipurpose Internet mail extension (MIME)Computer Network | MIME Media TypesQuality of Service and MultimediaWeb Caching and the Conditional GET Statements>> Quiz on Application LayerNetwork Security and Cryptography :The CIA triadIntroduction to FirewallTypes of firewall and possible attacksFirewall methodologiesZone-based firewallZone-based firewall (Configuration)How to setup firewall in Linux?Message Authentication CodesHow message authentication code works?HMAC AlgorithmPassword authentication protocol (PAP)Basic Network AttacksBirthday attackVishing (Voice Phishing)System securityPrivate BrowsingThreat ModellingDFD Based Threat modelling | Set 1DFD Based Threat Modelling | Set 2Types of VirusesDeniel of Service and PreventionDenial of Service DDoS attackUnicodeRC4 Encryption AlgorithmRSA Algorithm in CryptographyRSA Algorithm using Multiple Precision Arithmetic LibraryWeak RSA decryption with Chinese-remainder theoremHow to solve RSA Algorithm Problems?Hash Functions in System SecurityDNA CryptographyRC5 Encryption AlgorithmElGamal Encryption AlgorithmCaesar CipherCryptography IntroductionCryptography | Traditional Symmetric CiphersBlock cipher modes of operationCryptography | Development of CryptographyDifference between AES and DES ciphersTransforming a Plain Text message to Cipher TextWhat is a cryptocurrency?Introduction to Crypto-terminologiesQuantum CryptographyEnd to End Encryption (E2EE) in Computer NetworksIP security (IPSec)What is Packet Sniffing ?Introduction to SniffersData encryption standard (DES) | Set 1End to End Encryption (E2EE) in Computer NetworkTypes of Security attacks | Active and Passive attacksTypes of Wireless and Mobile Device AttacksTypes of Email AttacksSybil AttackMalware and its types>> Quiz on Network Security and CryptographyCompression Techniques :LZW (Lempel–Ziv–Welch) Compression techniqueData Compression With Arithmetic CodingShannon-Fano Algorithm for Data CompressionNetwork Experiments :Let’s experiment with NetworkingMobile Ad hoc NetworkTypes of MANETSimple Chat Room using PythonSocket Programming in JavaC Program to find IP Address, Subnet Mask & Default GatewayIntroduction to variable length subnet mask (VLSM)Extracting MAC address using PythonImplementation of Diffie-Hellman AlgorithmJava Implementation of Deffi-Hellman Algorithm between Client and ServerSocket Programming in PythonSocket Programming with Multi-threading in PythonCyclic Redundancy Check in PythonExplicitly assigning port number to client in SocketNetstat command in Linux:nslookup command in Linux with ExamplesUDP Server-Client implementation in CC program for file Transfer using UDPJava program to find IP address of your computerFinding IP address of a URL in JavaProgram to calculate the Round Trip Time (RTT)Network configuration and trouble shooting commands in LinuxImplementing Checksum Using JavaC Program to display hostname and IP addressProgram to determine class, Network and Host ID of an IPv4 addressProgram to determine Class, Broadcast address and Network address of an IPv4 addressProgram for IP forwarding table lookupWi-Fi Password of All Connected Networks in Windows/LinuxDevices :Network Devices (Hub, Repeater, Bridge, Switch, Router and Gateways)Inside a RouterBridges (local Internetworking device)Switch functions at layer 2Collision Domain and Broadcast DomainRoot Bridge Election in Spanning Tree ProtocolMisc :Onion RoutingTypes of Server VirtualizationCloud Computing | Characteristics of VirtualizationOn-premises cost estimates of VirtualizationHardware Based VirtualizationOperating system based VirtualizationDigital Subscriber Line (DSL)Image SteganographyNetwork NeutralityBasics of NS2 and Otcl/tcl scriptVoice over Internet Protocol (VoIP)Cisco router modesCisco router basic commandsBacking up Cisco IOS router imageBasic configuration of adaptive security appliance (ASA)Adaptive security appliance (ASA) featuresDefault flow of traffic (ASA)Cisco ASA Redistribution exampleTelnet and SSH on Adaptive security appliance (ASA)Near Field Communication (NFC)Relabel-to-front AlgorithmBerkeley’s AlgorithmCristian’s AlgorithmUniversal Serial Bus (USB) in Computer NetworkType-C Port in Computer NetworkFAQs on Computer NetworksQ.1 What are the types of computer network?Answer:PAN(Personal Area Network): It is the network connecting computer devices for personal use within a range of 10 meters.LAN(Local Area Network): It is a collection of computers connected to each other in a small area for example school, office, or building.WAN(Wide Area Network): A Wide Area Network is a large area than the LAN. It is spread across the states or countries.MAN(Metropolitan Area Network): A Metropolitan area network is the collection of interconnected Local Area Networks.Q.2 What are link and node?Answer:A link is a connection between two or more computers. Link can be wired or wireless between two nodes. A node is refer to any device in a network like computers, laptops, printers, servers, modems, etc.Q.3 What is the network topology?Answer:Network topology is the physical design of the network, It represents the connectivity between the devices, cables, computers, etc.Q.4 What are different types of network topology?Answer:There are different types of topology are given below:Bus TopologyStar TopologyRing TopologyMesh TopologyTree TopologyHybridQuick Links :Last Minute Notes(LMNs)Quizzes on Computer Networks !‘Practice Problems’ on Computer Networks !