Computer Networking Tutorials
- Home
- Introduction
- Features
- Architecture
- Components
- Types
- Topologies
- Transmission Modes
Networking Models
- Models
- OSI Model
- TCP/IP Model
Physical Layer
- Digital Transmission
- Transmission Media
- Guided Transmission Media
- Unguided Transmission Media
- Multiplexing
- Switching
- Switching Modes
- Switching Techniques
Data Link Layer
- Data Link Layer
- Error Detection
- Error Correction
- Data Link Controls
Network Layer
- Network Layer
- Network Addressing
- Routing
- Network Layer Protocols
Routing Algorithm
- Routing Algorithms
- Distance Vector Routing Algorithm
- Link State Routing Algorithm
Transport Layer
- Transport Layer
- Transport Layer Protocols
Application Layer
- Application Layer
- Client-Server Model
Application Protocols
- DNS
- FTP
- Telnet
- SMTP
- SNMP
- HTTP
Network Security
- Security
- Privacy
- Digital Signature
- PGP
Miscellaneous
- Router
- OSI vs TCP/IP
- TCP vs UDP
- TCP
- TCP Port
- IPv4 vs IPv6
- ARP Packet Format
- ARP Table
- Working of ARP
- FTP Client
- FTP Commands
- FTP Server
- I2P Protocol
- Sliding Window Protocol
- SNMP
- SPI Protocol
- IP
- ARP Commands
- ARP Request
- Address Resolution Protocol
- Address Resolution Protocol and its Types
- TCP Retransmission
- CAN Protocol
- HTTP Status Codes
- HTTP vs HTTPS
- RIP Protocol
- UDP Protocol
- ICMP Protocol
- MQTT Protocol
- OSPF Protocol
- Stop and Wait Protocol
- IMAP Protocol
- POP Protocol
- CIFS
- DAS
- DIMM
- iSCSI
- NAS
- NFS
- NVMe
- SAN
- Border Gateway Protocol
- Go-Back-N ARQ
- RJ Cable
- Connection-Oriented vs Connectionless Service
- CDMA vs GSM
- What is MAC Address?
- Modem vs Router
- Switch vs Router
- USB 2.0 vs USB 3.0
- CSMA/CA vs CSMA/CD
- Multiple Access Protocols
- URI vs URL
- IMAP vs POP3
- SSH Meaning
- UTP vs STP
- Status Code 400
- MIME Protocol
- IP Address
- What is a Proxy Server and How Does it Work?
- How to Set Up and Use a Proxy Server
- What is Network Security?
- WWW is Based on Which Model?
- Proxy Server List
- Fundamentals of Networking
- IP Address Format and Table
- Bus Topology vs Ring Topology
- Bus Topology vs Star Topology
- Circuit Switching vs Packet Switching
- Star vs Ring Topology
- Router vs Bridge
- TCP Connection Termination
- Image Steganography
- Network Neutrality
- Onion Routing
- Adaptive Security Appliance Features
- Relabel-to-Front Algorithm
- Types of Server Virtualization
- Access Lists
- Digital Subscriber Line
- Operating System-Based Virtualization
- Context-Based Access Control
- Cristian's Algorithm
- Service Set Identifier
- Voice over Internet Protocol
- Challenge-Response Authentication Mechanism
- Extended Access List
- Li-Fi vs Wi-Fi
- Reflexive Access List
- Synchronous Optical Network
- Wi-Fi Protected Access
- Wi-Fi Protected Setup
- Standard Access List
- Time Access List
- What is 3D Internet?
- 4G Mobile Communication Technology
- Types of Wireless Transmission Media
- Best Networking Courses
- Data Representation in Networking
- Network Criteria
- Classful vs Classless Addressing
- BOOTP vs RARP
- AGP (Accelerated Graphics Port)
- Advantages and Disadvantages of Satellite Communication
- External IP Address
- Asynchronous Transfer Mode
- Types of Authentication Protocols
- Cisco Packet Tracer
- How Does BOOTP Work?
- Subnetting
- Mesh Topology
- Ring Topology
- Star Topology
- Tree Topology
- Zigbee Technology
- Network Layer in OSI Model
- Physical Layer in OSI Model
- Data Link Layer in OSI Model
- Internet Explorer Shortcut Keys
- Network Layer Security: SSL Protocols
- Presentation Layer in OSI Model
- Session Layer in OSI Model
- Subnet Mask
- Transport Layer Security: SSL and SSL Architecture
- Functions, Advantages, and Disadvantages of Network Layer
- Functions, Advantages, and Disadvantages of the Physical Layer
- Types of Internet Connection
- Noisy and Noiseless Channel
- Advantages and Disadvantages of Bus Topology
- Advantages and Disadvantages of Ring Topology
- Advantages and Disadvantages of Star Topology
- Protocols in Noiseless and Noisy Channel
- Advantages and Disadvantages of Mesh Topology
- Cloud Networking: Managing and Optimizing Cloud-Based Networks
- Collision Domain and Broadcast Domain
- Count-to-Infinity Problem in Distance-Vector Routing
- Difference Between Go-Back-N and Selective Repeat Protocol
- Difference Between Stop-and-Wait, Go-Back-N, and Selective Repeat
- Network Function Virtualization (NFV): Transforming Network Architecture with Virtualized Functions
- Network Layer Security: IPSec Modes
- Network Layer Security: IPSec Protocols and Services
- Ping vs. Traceroute
- Software-Defined Networking (SDN): Benefits and Challenges of Network Virtualization
- Software-Defined Networking (SDN) vs. Network Function Virtualization (NFV)
- Virtual Circuits vs. Datagram Networks
- Bluesmack Attack in Wireless Networks
- Bluesnarfing Attack in Wireless Networks
- Direct Sequence Spread Spectrum
- Warchalking in Wireless Networks
- WEP (Wired Equivalent Privacy)
- Wireless Security Encryption
- Wireless Security in an Enterprise
- Quantum Networking
- Network Automation
- Difference Between MSS and MTU
- What is MTU?
- Mesh Networks
- What is an Autonomous System?
- What is MSS?
- Cyber Security and Software Security
- Information Security and Network Security
- Security Engineer and Security Architect
- Protection Methods for Network Security
- Trusted Systems in Network Security
- Authentication Tokens in Network Security
- Cookies in Network Security
- Intruders in Network Security
- Network Security Toolkit in VirtualBox
- Pivoting: Moving Inside a Network
- Security Environment in CNS
- Voice Biometric Technique in Network Security
- Difference Between Kerberos and LDAP
- Cyber Security and Information Security
- GraphQL Attacks and Security
- Application Layer in OSI Model
- Applications of Remote Sensing
- Seven Layers of IT Security
- What is Ad-Hoc TCP?
- What is Server Name Indication?
- Difference Between Infrastructure and Infrastructure-less Network
- Collision Avoidance in Wireless Networks
- Hotspot 2.0
- Intrusion Prevention System (IPS)
- Modes of Connection: Bluetooth
- Noisy Channel Protocols
- Parzen Windows Density Estimation Technique
- Advantages and Disadvantages of Conventional Testing
- Difference Engine and Analytical Engine
- Principle of Information System Security
- What are Bots, Botnets, and Zombies
- Windows Memory Management
- Wireless DOS Attack on WiFi
- Design Principles of Security in Distributed Systems
- MAC Filtering
- Principles of Network Applications
- Time to Live
- What is 1000-Base-T
- 10Base-T
- Difference Between 802.11ac and 802.11ax
- Differentiate Between Circuit Switching, Message Switching, and Packet Switching
- What is Web 3.0
- Collision Detection in CSMA/CD
- IPv4 Header in CNs
- Layered Architecture in CNs
- Define URL in CNs
- Man in CNs
- Routing Protocols in CNs
- Flooding in CN
- CRC in CN
- Application of CN
- CN Architect
- Design Issues for the Layers of CNs
- What is AMD
- Protocol in CN
- CN Projects
- Different Types of Routers
- Wireless Distribution System
- Network Time Protocol
- ARP and its Types in CN
- ARQ in CNs
- Bluetooth in CNs
- Circuit Switching in CN
- Computer Hardware and Networking Course
- Ring Topology in a CN
- Token Ring in CNs
- Medium Access Control in CN
- Need for CN
- Repeater in CN
- Cning a Top-Down Approach
- What is Multiplexing in CN
- Body Area Network
- Ins and Outs of Data Streaming
- Streaming Stored Video
- Cellular Network
- How Can Devices on a Network Be Identified
- How Does the Internet Work
- Authentication Server
- What is Cloud Backup and How Does it Work
- Communication Protocols in System Design
- Extensible Authentication Protocol
- Role-Based Access Control
- Network Enumeration Tools
- Network Protocol Testing
- Windows Networking Commands
- Advantages and Disadvantages of WLAN
- Anonymous File Transfer Protocol
- Automatic Private IP Addressing
- What is Deep Web
- USB Type-C
- User Authentication
- What is a vCard
- IPv4 Headers
- Difference Between Token Ring and Ethernet/Token Ring
- Server Message Block Protocol
- Session Border Controllers
- Short Message Service Center
- What is a Mail Server
- What are Communication Networks
- Initialization Vector
- What is Fiber Optics
- Open Networking
- Access Ports vs. Trunk Ports
- Edge Routers
- IPTV (Internet Protocol Television)
- Wireless Internet Service Provider
- Wireless Backhaul
- Define Protocol in CN
- Virtual Network Adapter
- Virtual Routing and Forwarding
- Virtual Switches
- VLAN (Virtual LAN)
- Wireless Mesh Network (WMN)
- What is Gateway in CN
- Radio Access Network (RAN)
- What is File Sharing
- Passive Optical Network (PON)
- Private IP Address
- Public Key Certificate
- What is Bridge in CN
- Ping Sweep/ICMP Sweep
- Print Server
- WiFi Pineapple
- Walled Garden
- Wireless ISP
- Bridge vs Repeater
- Hardware Security Module (HSM)
- Public Switched Telephone Network
- Analog Telephone Adapter (ATA)
- Host Bus Adapter (HBA)
- iSCSI Initiator
- Simplest Protocol
- Telecommunication Networks
- What is WPS in Wi-Fi?
- Most Important Email Security Protocols
- Data Governance
- Carrier Network
- Most Secure Network Protocol
- Network SMB
- BGP vs. EIGRP
- Wireless Security (WEP, WPA, WPA2, WPA3)
- Cloud Radio Access Network
- Bits Per Second (bps)
- Blade Server
- Command and Control Server
MCQ's
- Computer Networking MCQ
- Computer Networking MCQ Part 2
Interview Questions
- Networking Interview Questions