Introduction To
Computer Network Tutorials
Computer Networks
A computer network is a set of connected computers. Computers on a network are called nodes. The connection between computers can be done via cabling, most commonly the Ethernet cable, or wirelessly through radio waves. Connected computers can share resources, like access to the Internet, printers, file servers, and others. A network is a multipurpose connection, which allows a single computer to do more.
It is the interconnection of multiple devices, generally termed as Hosts connected using multiple paths for the purpose of sending/receiving data or media.
This course will enhance your knowledge on computer nwetworks . follow the course structure and Learn!
Course Structure
Basics
- Basics of Computer Networking
- The Internet and the Web
- Internet and Web programming: Behind the scenes
- The New Internet | Internet of Everything
- Unknown facts of Networking
- Computer Network | Network goals
- Line Configuration in Computer Networks
- Transmission Modes in Computer Networks (Simplex, Half-Duplex and Full-Duplex)
- Types of Transmission Media
- Computer Network | Difference between Unicast, Broadcast and Multicast
- Introduction to basic Networking terminology
- Network Topologies | Computer Networks
- Computer Network | Types of area networks – LAN, MAN and WAN
- Telecom Networks
- Computer Network | Access networks
- Computer Network | TCP/IP Model
- Computer Network | Layers of OSI Model
- Introduction to Active Directory Domain Services
- Advantages and Disadvantages of Computer Networking
Data Link Layer
- LAN Technologies | ETHERNET
- Make all numbers of an array equal
- Computer Networks | Internetworking
- Computer Network | Framing In Data Link Layer
- Computer Network | Introduction of MAC Address
- Computer Network | MAC Filtering
- Computer Network | Multiple Access Protocols
- Computer Network | Ethernet Frame Format
- Computer Network | EtherChannel
- Computer Network | Difference between Byte stuffing and Bit stuffing
- Computer Networks | Implementing Byte stuffing using Java
- Computer Network | Circuit Switching
- Computer Network | Packet Switching and Delays
- Computer Network | Circuit Switching VS Packet Switching
- Differences between Virtual Circuits & Datagram Networks
- Computer Network | Switching techniques: Message switching
- Computer Network | Types of switches
- Computer Network | Maximum data rate (channel capacity) for noiseless and noisy channels
- Computer Network | Hot Spot 2.0
- Computer Network | Collision Avoidance in wireless networks
- Traditional wireless mobile communication
- Computer Network | Carrier sense multiple access (CSMA)
- Collision Detection in CSMA/CD
- Computer Network | Efficiency of CSMA/CD
- Back-off Algorithm for CSMA/CD
- Computer Network | Controlled Access Protocols
- Virtual LAN (VLAN)
- Inter VLAN Routing by Layer 3 Switch
- Computer Network | Private VLAN
- Computer Network | VLAN ACL (VACL)
- Access and trunk ports
- Computer Network | Role-based access control
- Computer Network | Port security
- Inter-Switch Link (ISL) and IEEE 802.1Q
- Computer Network | Dynamic Trunking Protocol (DTP)
- Sliding Window Protocol | Set 1 (Sender Side)
- Sliding Window Protocol | Set 2 (Receiver Side)
- Computer Network | Sliding Window protocols Summary With Questions
- Stop and Wait ARQ
- Difference between Stop and Wait, GoBackN and Selective Repeat
- Computer Network | Manchester Encoding
- Computer Networks | Error Detection
- Computer Network | Hamming Code
- Program to remotely Power On a PC over the internet using the Wake-on-LAN protocol.
- Basics of Wi-Fi
- IEEE 802.11 Mac Frame
- Computer Network | Efficiency Of Token Ring
- Computer Network | Token Bus (IEEE 802.4)
- Computer Network | Multiplexing (Channel Sharing)
- Computer Network | Frequency division and Time division multiplexing
Network Layer
- Computer Network | Integrated services digital network (ISDN)
- Network Layer | Introduction and IPv4 Datagram Header
- IP Addressing | Introduction and Classful Addressing
- IP Addressing | Classless Addressing
- Computer Network | IPv4 classless Subnet equation
- Computer Network | Supernetting
- Network Layer | IPv4 Datagram Fragmentation and Delays
- Fragmentation at Network Layer
- Internet Protocol v6 | IPv6
- Computer Network | Internet Protocol version 6 (IPv6) Header
- Differences between IPv4 and IPv6
- Internet Control Message Protocol (ICMP) | Computer Networks
- Computer Networks | Longest Prefix Matching in Routers
- Computer Network | Routing v/s Routed Protocols
- Computer Network | Fixed and Flooding Routing algorithms
- Computer Network | Classes of routing protocols
- Computer Network | Types of routing
- Computer Network | Classification of Routing Algorithms
- Computer Network | Routing Protocols Set 1 (Distance Vector Routing)
- Computer Network | (Route Poisoning and Count to infinity problem)
- Computer Network | Redundant link problems
- Computer Network | Administrative Distance (AD) and Autonomous System (AS)
- Computer Networks | Unicast Routing – Link State Routing
- Computer Network | Link state advertisement (LSA)
- Computer Network | Securing Routing Protocols
- Computer Network | Distance vector routing v/s Link state routing
- Computer Network | Routing Information Protocol (RIP)
- Routing Interface Protocol (RIP) V1 & V2
- Computer Network | Redistribution
- Computer Network | EIGRP fundamentals
- Computer Network | EIGRP Configuration
- Computer Network | Features of Enhanced Interior Gateway Routing Protocol (EIGRP)
- Computer Network | EIGRP cost calculation
- Computer Network | Open shortest path first (OSPF) protocol fundamentals
- Open shortest path first (OSPF) router roles and configuration
- Computer Network | Open shortest path first (OSPF) protocol States
- Computer Network | Open shortest path first (OSPF) – Set 2
- Probabilistic shortest path routing algorithm for optical networks
- Computer Network | Types of Spanning Tree Protocol (STP)
- Computer Network | Network address translation (NAT)
- Computer Network | Types of Network address translation (NAT)
- Computer Network | Static NAT (on ASA)
- Computer Network | Dynamic NAT (on ASA)
- VRRP(Virtual Router Redundancy Protocol) | Introduction and configuration
- Computer Networks | Hot Standby Router Protocol (HSRP)
- Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP)
- Router on a stick | Introduction and Configuration
- Computer Networks | Traceroute
- What’s difference between Ping and Traceroute?
- Computer Network | ARP, Reverse ARP(RARP), Inverse ARP(InARP), Proxy ARP and Gratuitous ARP
- Computer Network | How ARP works?
- Computer Network | Packet flow in the same network
- Computer Network | Packet flow in different network
- Computer Network | Wifi protected access (WPA)
- Computer Network | Wifi protected setup (WPS)
- Computer Network | LiFi vs. WiFi
- Computer Network | Service Set Identifier (SSID)
- Computer Network | Access-lists (ACL)
- Computer Network | Context based access control (CBAC)
- Computer Network | Standard Access-list
- Computer Network | Extended access-list
- Computer Network | Reflexive Access-list
- Computer Network | Time based access-list
- Computer Network | AAA (Authentication, Authorization and Accounting)
- Computer Network | AAA (authentication) configuration (locally)
- Challenge Response Authentication Mechanism (CRAM)
- Computer Network | Synchronous Optical Network (SONET)
- Computer Network | RADIUS
- Computer Network | TACACS+
- Computer Network | TACACS+ and RADIUS
Transport Layer
- Computer Network | TCP Connection Establishment
- Computer Network | TCP 3-Way Handshake Process
- Computer Network | TCP Timers
- Computer Network | TCP Connection Termination
- TCP Sequence Number | Wrap Around Concept
- Computer Network | Transport Layer responsibilities
- Computer Network | Multiplexing and Demultiplexing in Transport Layer
- Computer Network | User Datagram Protocol (UDP)
- P2P(Peer To Peer) File Sharing
- Computer Networks | Congestion Control
- Computer Network | TCP Congestion Control
- Computer Networks | Congestion control techniques
- Computer Network | Leaky bucket algorithm
- Computer Network | Error Control in TCP
- Computer Network | TCP flags
- TCP | Services and Segment structure
- TCP Server-Client implementation in C
- TCP and UDP server using select
- Computer Network | Servers
Application Layer
- Protocols in Application Layer
- Simple Mail Transfer Protocol (SMTP)
- DNS (Domain Name Server) | NetWorking
- Why does DNS use UDP and not TCP?
- Computer Network | Address Resolution in DNS
- Computer Network | DNS Spoofing or DNS Cache poisoning
- Types of DNS Attacks and Tactics for Security
- What’s difference between http:// and https:// ?
- What’s difference between HTML and HTTP ?
- HTTP Non-Persistent & Persistent Connection | Set 1
- Computer Network | File Transfer Protocol (FTP)
- What are the differences between HTTP, FTP, and SMTP?
- Computer Network | Asynchronous Transfer Mode (ATM)
- Computer Network | What is Local Host?
- Computer Network | Dynamic Host Configuration Protocol (DHCP)
- Computer Network | DHCP Relay Agent
- How DHCP server dynamically assigns IP address to a host?
- What’s difference between The Internet and The Web ?
- Computer Network | Simple network management protocol (SNMP)
- Computer Network | Multipurpose Internet mail extension (MIME)
- Computer Network | MIME Media Types
- Computer Network | Quality of Service and Multimedia
- Web Caching and the Conditional GET Statements
Network Security and Cryptography
- Network Security | The CIA triad
- Introduction to Firewall
- Types of firewall and possible attacks
- Computer Network | Firewall methodologies
- Computer Network | Zone-based firewall
- Computer Network | Zone-based firewall (Configuration)
- How to setup firewall in Linux?
- Message Authentication Codes
- Computer Network | How message authentication code works?
- Computer Network | HMAC Algorithm
- Computer Network | Password authentication protocol (PAP)
- Basic Network Attacks
- Computer Network | Birthday attack
- Vishing (Voice Phishing)
- Computer Network | System security
- Private Browsing
- Computer Network | Threat Modelling
- DFD Based Threat modelling | Set 1
- DFD Based Threat Modelling | Set 2
- Types of Viruses
- Computer Network | Denial of Service DDoS attack
- Computer Network | Unicode
- Computer Network | RC4 Encryption Algorithm
- RSA Algorithm in Cryptography
- RSA Algorithm using Multiple Precision Arithmetic Library
- Weak RSA decryption with Chinese-remainder theorem
- How to solve RSA Algorithm Problems?
- Hash Functions in System Security
- Computer Network | DNA Cryptography
- Computer Network | RC5 Encryption Algorithm
- ElGamal Encryption Algorithm
- Caesar Cipher
- Computer Network | Cryptography Introduction
- Cryptography | Traditional Symmetric Ciphers
- Computer Network | Block cipher modes of operation
- Cryptography | Development of Cryptography
- Difference between AES and DES ciphers
- Transforming a Plain Text message to Cipher Text
- What is a cryptocurrency?
- Cryptography | Introduction to Crypto-terminologies
- Quantum Cryptography
- Computer Network | IP security (IPSec)
- What is Packet Sniffing ?
- Introduction to Sniffers
- Computer Network | Data encryption standard (DES) | Set 1
- End to End Encryption (E2EE) in Computer Networks
- Types of Security attacks | Active and Passive attacks
- Types of Wireless and Mobile Device Attacks
- Types of Email Attacks
- Sybil Attack
- Malware and its types
Security And Attacks
Compression Techniques
Network Experiments
- Let’s experiment with Networking
- MANET: Mobile Ad hoc Network
- Computer Network | Types of MANET
- Simple Chat Room using Python
- Socket Programming in Java
- C Program to find IP Address, Subnet Mask & Default Gateway
- Computer Network | Introduction to variable length subnet mask (VLSM)
- Extracting MAC address using Python
- Computer Network | Open shortest path first (OSPF) – Set 2 TCP Server-Client implementation in C Computer Network | Birthday attack TCP and UDP server using select Types of Security attacks | Active and Passive attacks
- Java Implementation of Deffi-Hellman Algorithm between Client and Server
- Socket Programming in Python
- Socket Programming with Multi-threading in Python
- Cyclic Redundancy Check in Python
- Explicitly assigning port number to client in Socket
- Netstat command in Linux
- nslookup command in Linux with Examples
- UDP Server-Client implementation in C
- C program for file Transfer using UDP
- Java program to find IP address of your computer
- Finding IP address of a URL in Java
- Program to calculate the Round Trip Time (RTT)
- Network configuration and trouble shooting commands in Linux
- Implementing Checksum Using Java
- C Program to display hostname and IP address
- Program to determine class, Network and Host ID of an IPv4 address
- Program to determine Class, Broadcast address and Network address of an IPv4 address
- Program for IP forwarding table lookup
- Wi-Fi Password of All Connected Networks in Windows/Linux
Devices
- Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter)
- Computer Network | Inside a Router
- Computer Network | Bridges (local Internetworking device)
- Computer Network | Switch functions at layer 2
- Computer Network | Collision Domain and Broadcast Domain
- Computer Network | Root Bridge Election in Spanning Tree Protocol
Misc
- Onion Routing
- Computer Network | Types of Server Virtualization
- Cloud Computing | Characteristics of Virtualization
- On-premises cost estimates of Virtualization
- Hardware Based Virtualization
- Digital Subscriber Line (DSL)
- Computer Network | Image Steganography
- Network Neutrality | All you need to know
- Basics of NS2 and Otcl/tcl script
- Computer Network | Voice over Internet Protocol (VoIP)
- Computer Network | Cisco router modes
- Computer Network | Cisco router basic commands
- Computer Network | Backing up Cisco IOS router image
- Computer Network | Basic configuration of adaptive security appliance (ASA)
- Computer Network | Adaptive security appliance (ASA) features
- Computer Network | Default flow of traffic (ASA)
- Computer Network | Cisco ASA Redistribution example
- Computer Network | Telnet and SSH on Adaptive security appliance (ASA)
- Near Field Communication (NFC)
- Relabel-to-front Algorithm
- Berkeley’s Algorithm
- Cristian’s Algorithm
- Universal Serial Bus (USB) in Computer Network
- Type-C Port in Computer Network