Open In App

Computer Network Tutorial

Last Updated : 12 Jun, 2024
Like Article

A computer network is a collection of computers or devices connected to share resources. Any device which can share or receive the data is called a Node. Through which the information or data propagate is known as channels, It can be guided or unguided.

In this Computer network tutorial, you’ll learn basic to advanced concepts like the Basics of computer networks, data link layer, network layer, network security and cryptography, compression techniques, etc.

Recent Articles on Computer Networks

Basics :

  1. Local Area Network (LAN) Technologies.
  2. Computer Network | Bridges (local Internetworking device)
  3. Internetworking
  4. Framing In Data Link Layer
  5. Introduction of MAC Address
  6. MAC Filtering
  7. Multiple Access Protocols
  8. Ethernet Frame Format
  9. EtherChannel
  10. Difference between Byte stuffing and Bit stuffing
  11. Implementing Byte stuffing using Java
  12. Circuit Switching
  13. Packet Switching and Delays
  14. Circuit Switching VS Packet Switching
  15. Differences between Virtual Circuits & Datagram Networks
  16. Switching techniques: Message switching
  17. Types of switches
  18. Maximum data rate (channel capacity) for noiseless and noisy channels
  19. Hot Spot 2.0
  20. Collision Avoidance in wireless networks
  21. Traditional wireless mobile communication
  22. Carrier sense multiple access (CSMA)
  23. Collision Detection in CSMA/CD
  24. Efficiency of CSMA/CD
  25. Back-off Algorithm for CSMA/CD
  26. Controlled Access Protocols
  27. Virtual LAN (VLAN)
  28. Inter VLAN Routing by Layer 3 Switch
  29. Computer Network | Private VLAN
  30. Computer Network | VLAN ACL (VACL)
  31. Access and trunk ports
  32. Role-based access control
  33. Port security
  34. Inter-Switch Link (ISL) and IEEE 802.1Q
  35. Dynamic Trunking Protocol (DTP)
  36. Sliding Window Protocol | Set 1 (Sender Side)
  37. Sliding Window Protocol | Set 2 (Receiver Side)
  38. Sliding Window Protocol | Set 3 (Selective Repeat)
  39. Sliding Window protocols Summary
  40. Stop and Wait ARQ
  41. Difference between Stop and Wait, GoBackN and Selective Repeat
  42. Manchester Encoding
  43. Error Detection
  44. Hamming Code
  45. Program to remotely Power On a PC over the Internet using the Wake-on-LAN protocol.
  46. Basics of Wi-Fi
  47. IEEE 802.11 Mac Frame
  48. Efficiency Of Token Ring
  49. Token Bus (IEEE 802.4)
  50. Multiplexing (Channel Sharing)
  51. Frequency division and Time division multiplexing

>> Quiz on Data Link Layer

Network Layer :

  1. Integrated services digital network (ISDN)
  2. Introduction and IPv4 Datagram Header
  3. IP Addressing | Introduction and Classful Addressing
  4. IP Addressing | Classless Addressing
  5. IPv4 classless Subnet equation
  6. Supernetting
  7. Ipv4 Datagram Fragmentation and Delays
  8. Fragmentation at Network Layer
  9. Internet Protocol v6 | IPv6
  10. Internet Protocol version 6 (IPv6) Header
  11. Differences between IPv4 and IPv6
  12. Internet Control Message Protocol (ICMP)
  13. Longest Prefix Matching in Routers
  14. Routing v/s Routed Protocols
  15. Fixed and Flooding Routing algorithms
  16. Classes of routing protocols
  17. Types of routing
  18. Classification of Routing Algorithms
  19. Routing Protocols Set 1 (Distance Vector Routing)
  20. Route Poisoning and Count to infinity problem
  21. Redundant link problems
  22. Administrative Distance (AD) and Autonomous System (AS)
  23. Unicast Routing – Link State Routing
  24. Link state advertisement (LSA)
  25. Securing Routing Protocols
  26. Distance vector routing v/s Link state routing
  27. Routing Information Protocol (RIP)
  28. Routing Interface Protocol (RIP) V1 & V2
  29. Redistribution
  30. EIGRP fundamentals
  31. EIGRP Configuration
  32. Features of Enhanced Interior Gateway Routing Protocol (EIGRP)
  33. EIGRP cost calculation
  34. Open shortest path first (OSPF) protocol fundamentals
  35. Open shortest path first (OSPF) router roles and configuration
  36. Open shortest path first (OSPF) protocol States
  37. Open shortest path first (OSPF) – Set 2
  38. Probabilistic shortest path routing algorithm for optical networks
  39. Types of Spanning Tree Protocol (STP)
  40. Network address translation (NAT)
  41. Types of Network address translation (NAT)
  42. Static NAT (on ASA)
  43. Dynamic NAT (on ASA)
  44. VRRP(Virtual Router Redundancy Protocol) | Introduction and configuration
  45. Hot Standby Router Protocol (HSRP)
  46. Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP)
  47. Router on a stick | Introduction and Configuration
  48. Traceroute
  49. What’s difference between Ping and Traceroute?
  50. ARP, Reverse ARP(RARP), Inverse ARP(InARP), Proxy ARP and Gratuitous ARP
  51. How ARP works?
  52. Packet flow in the same network
  53. Packet flow in different network
  54. Wifi protected access (WPA)
  55. Wifi protected setup (WPS)
  56. LiFi vs. WiFi
  57. Service Set Identifier (SSID)
  58. Access-lists (ACL)
  59. Context based access control (CBAC)
  60. Standard Access-list
  61. Extended access-list
  62. Reflexive Access-list
  63. Time based access-list
  64. AAA (Authentication, Authorization and Accounting)
  65. AAA (authentication) configuration (locally)
  66. Challenge Response Authentication Mechanism (CRAM)
  67. Synchronous Optical Network (SONET)
  68. RADIUS
  69. TACACS+
  70. TACACS+ and RADIUS

>> Quiz on Network Layer>> Quiz on IP addressing

Transport Layer :

Application Layer :

Network Security and Cryptography :

  1. The CIA triad
  2. Introduction to Firewall
  3. Types of firewall and possible attacks
  4. Firewall methodologies
  5. Zone-based firewall
  6. Zone-based firewall (Configuration)
  7. How to setup firewall in Linux?
  8. Message Authentication Codes
  9. How message authentication code works?
  10. HMAC Algorithm
  11. Password authentication protocol (PAP)
  12. Basic Network Attacks
  13. Birthday attack
  14. Vishing (Voice Phishing)
  15. System security
  16. Private Browsing
  17. Threat Modelling
  18. DFD Based Threat modelling | Set 1
  19. DFD Based Threat Modelling | Set 2
  20. Types of Viruses
  21. Deniel of Service and Prevention
  22. Denial of Service DDoS attack
  23. Unicode
  24. RC4 Encryption Algorithm
  25. RSA Algorithm in Cryptography
  26. RSA Algorithm using Multiple Precision Arithmetic Library
  27. Weak RSA decryption with Chinese-remainder theorem
  28. How to solve RSA Algorithm Problems?
  29. Hash Functions in System Security
  30. DNA Cryptography
  31. RC5 Encryption Algorithm
  32. ElGamal Encryption Algorithm
  33. Caesar Cipher
  34. Cryptography Introduction
  35. Cryptography | Traditional Symmetric Ciphers
  36. Block cipher modes of operation
  37. Cryptography | Development of Cryptography
  38. Difference between AES and DES ciphers
  39. Transforming a Plain Text message to Cipher Text
  40. What is a cryptocurrency?
  41. Introduction to Crypto-terminologies
  42. Quantum Cryptography
  43. End to End Encryption (E2EE) in Computer Networks
  44. IP security (IPSec)
  45. What is Packet Sniffing ?
  46. Introduction to Sniffers
  47. Data encryption standard (DES) | Set 1
  48. End to End Encryption (E2EE) in Computer Network
  49. Types of Security attacks | Active and Passive attacks
  50. Types of Wireless and Mobile Device Attacks
  51. Types of Email Attacks
  52. Sybil Attack
  53. Malware and its types

>> Quiz on Network Security and Cryptography

Compression Techniques :

Network Experiments :

Devices :

Misc :

FAQs on Computer Networks

Q.1 What are the types of computer network?



  • PAN(Personal Area Network): It is the network connecting computer devices for personal use within a range of 10 meters.
  • LAN(Local Area Network): It is a collection of computers connected to each other in a small area for example school, office, or building.
  • WAN(Wide Area Network): A Wide Area Network is a large area than the LAN. It is spread across the states or countries.
  • MAN(Metropolitan Area Network): A Metropolitan area network is the collection of interconnected Local Area Networks.



A link is a connection between two or more computers. Link can be wired or wireless between two nodes. A node is refer to any device in a network like computers, laptops, printers, servers, modems, etc.

Q.3 What is the network topology?



Network topology is the physical design of the network, It represents the connectivity between the devices, cables, computers, etc.

Q.4 What are different types of network topology?



There are different types of topology are given below:

  • Bus Topology
  • Star Topology
  • Ring Topology
  • Mesh Topology
  • Tree Topology
  • Hybrid

Quick Links :

Similar Reads

Why Star network is More Efficient in Network Fault Tolerance in Place of Bus Network?
Answer: Star networks offer better fault tolerance than bus networks because a single point of failure in a star network (the central hub) affects only the connected device, while a fault in a bus network can disrupt communication for all devices on the bus.Advantages of Star Topology Over Bus Topology Individual Connection Points: In a star networ
2 min read
Basic Network Attacks in Computer Network
Many people rely on the Internet for many of their professional, social and personal activities. But there are also people who attempt to damage our Internet-connected computers, violate our privacy and render inoperable the Internet services. Given the frequency and variety of existing attacks as well as the threat of new and more destructive futu
7 min read
How to Find Network IP Address of Computer Using Computer Name?
Answer: By using the command "ping" followed by the computer name in the command prompt or terminal.To find the network IP address of a computer using its computer name: Open Command Prompt or Terminal Begin by opening the Command Prompt (Windows) or Terminal (macOS/Linux) on your computer. Use the Ping Command Type "ping" followed by the computer
1 min read
Difference between Storage Area Network (SAN) and Network Attached Storage (NAS)
Storage Area Network (SAN) is used for transferring the data between the servers and the storage devices' fiber channels and switches. In SAN (Storage Area Network), data is identified by disk block. Protocols that are used in SAN are SCSI (Small Computer System Interface), SATA (Serial Advanced Technology Attachment), etc. Components of Storage Ar
2 min read
Differences between Wireless Adhoc Network and Wireless Sensor Network
1. Wireless Adhoc Network: A wireless ad-hoc network is a wireless network deployed without any framework or infrastructure. This incorporates wireless mesh networks, mobile ad-hoc networks, and vehicular ad-hoc networks. Its history could be traced back to the Defense Advanced Research Project Agency (DARPA) and Packet Radio Networks (PRNET) which
3 min read
Difference between Next Generation Network and Traditional Network
1. Next Generation Network : In short Next Generation Network is termed as NGN which is packet based network used for both telephony and data. It uses multiple broadband and Quality of Services (QoS) enabled transport technologies to establish advance communication system. NGN can handle multiple type of services/traffic such as voice, audio, video
5 min read
Difference between Software Defined Network and Traditional Network
1. Software Defined Network (SDN) : SDN stands for Software Defined Network which is networking architecture approach. It enables the control and management of network using software applications. Through Software Defined Network (SDN) networking behavior of entire network and its devices are programmed in centrally controlled manner through softwa
5 min read
Difference between Network Administrator and Network Engineer
1. Network Administrator :A network administrator is a someone in an organization whose job is to manage organization's computer network. They also do jobs like on-site server organization , software networking and also placing the network in there correct position which is also called as Network Integrity. Those are the main thing in their job to
3 min read
Difference Between Network Security and Network Administration
In the world of information technology, there are two important and distinct roles that are often confused: network security and network administration. While these two jobs may be closely related, they require different sets of skills and responsibilities. It’s significant to understand the differences between network security and network administ
5 min read
Difference Between Network Management and Network Monitoring
Pre-requisites: Areas of Network Management Network management and Network monitoring are two important functions in maintaining the performance and security of a network. While they are often used interchangeably, they are distinct concepts with different goals and methods. Network management refers to the process of controlling, configuring, and
3 min read
Article Tags :