Computer Networking Fundamentals
How does the Internet really work?
For many technical jobs it is important to understand computer networking. We just posted a massive 12-hour course that will give you a deep dive into computer networking.
Here are the sections covered in this comprehensive course:
Course Overview & Methodology
-
Fundamental Concepts and Networking Stack
-
Orientation: Curriculum and Prerequisite (DSA)
-
Introduction to the Instructor: Shrathir Sharma
-
Course Access (YouTube/Udemy) and Target Audience
-
Teaching Methodology: Raw Pen & Paper Style
-
Core Modules: IPv4, Error Control, and Flow Control
-
Core Modules: Transport, Media Access, and Routing
-
Bonus Module: Cybersecurity
Networking Basics
-
Defining a Computer Network
-
Why Networks Interact: Resource Sharing
-
5 Components of Data Communication
-
4 Metrics for Network Effectiveness
-
Transmission Modes: Simplex, Half-Duplex, Full-Duplex
-
Types of Connections: Point-to-Point vs. Multi-Point
Topology & Architecture
-
Introduction to Topology Layouts
-
Mesh Topology and Link Calculations
-
Advantages and Disadvantages of Topologies
-
Star, Bus, and Ring Topology Details
-
The OSI Model Framework
-
Layered Architecture and Peer-to-Peer Protocols
Binary & IP Addressing Foundations
-
Review of Lecture Zero
-
Binary Number Representation & Conversion
-
Binary Weights and Octet Conversions
-
Introduction to IPv4 Logical Addressing
-
Network ID vs. Host ID and IANA Authority
Classful vs. Classless Addressing
-
Telephone Network Analogy for IP Classes
-
Class A, B, and C Breakdown
-
Classful Wastage and the Need for Classless (CIDR)
-
Implementation: Fixing Bits for Classes A-E
-
IP Address Space Distribution
-
Hexadecimal and Decimal IP Representations
IPv4 Addressing Deep Dive
-
Class A Details: Reserved Addresses & 127.0.0.1 Loopback
-
Calculating Valid Hosts and Reserved All-Zeros/All-Ones
-
Loopback Testing & Troubleshooting Connectivity
-
Class B Details: Network Ranges & Host Capacity
-
Class C Details: Network/Host Ratios
-
Class D (Multicasting) and Class E (Experimental)
-
IP Conversion Practice: Hexadecimal to Decimal
-
Common Pitfalls: “Addresses” vs. “Valid Hosts”
Subnetting & VLSM
-
Introduction to Subnetting: Why We Divide Networks
-
Disadvantages of Subnetting: Wastage and Cost
-
How to Subnet: Borrowing Bits from Host ID
-
Subnet Identification: Calculating Subnet IDs and DBAs
-
Working with Weights: Identifying Specific Subnets
-
Subnet Masks vs. Network Masks
-
Designing a Subnet Mask for Specific Requirements
-
Variable Length Subnet Masking (VLSM) Strategy
-
Determining Subnet IDs using Bitwise AND Operations
-
Routing Tables: Matching Destination IPs to Interfaces
-
CIDR: Classless Inter-Domain Routing & Slash Notation
-
Rules for Valid CIDR Blocks
-
Supernetting: Merging Multiple Blocks
Error Control & Detection
-
Introduction to Error Control: Noise vs. Security
-
Single Bit Error vs. Burst Errors
-
Redundant Bits and Block Coding Logic
-
Hamming Distance: Calculating Difference Between Strings
-
Minimum Hamming Distance for Detection and Correction
-
Simple Parity: Even vs. Odd Parity Methods
-
2D Parity: Detecting and Correcting Single Bit Errors
-
Limitations of 2D Parity for Multi-Bit Errors
-
Cyclic Redundancy Check (CRC): Divisor & Remainder Logic
-
Checksum: One’s Complement Summation Method
Flow Control & Layered Architecture
-
Network Delays: Transmission vs. Propagation
-
Queuing and Processing Delays
-
Data Encapsulation: Headers and Trailers
-
The Need for Flow Control: Avoiding Receiver Overwhelm
-
Stop and Wait Protocol: Core Mechanism
-
Using Timers and Sequence Numbers
-
Calculating Efficiency and Round Trip Time (RTT)
-
Throughput: Effective Bandwidth Relationship
-
Sliding Window Concept: Improving Efficiency
-
Go-Back-N (GBN) Protocol: Sender/Receiver Windows
-
Selective Repeat (SR) Protocol: Out-of-Order Handling
-
Cumulative vs. Independent Acknowledgments
Network Layer: IP Header & Routing
-
IPv4 Header Format Overview
-
Type of Services (TOS): Priority and DTRC Bits
-
Time to Live (TTL): Preventing Infinite Loops
-
Protocol Field and Header Checksum
-
IP Options: Strict vs. Loose Source Routing
-
TCP Header Structure: Ports, Sequence, and Ack
-
Wrap Around Time and Segment Lifetime
-
Advertisement Window (Flow Control)
-
TCP Control Flags: URG, ACK, PSH, RST, SYN, FIN
-
SYN Flooding Attack (DDoS)
-
Congestion Control Policy: Slow Start & Avoidance
-
TCP Timers: Time-Wait, Keep-Alive, Persistent
-
UDP Header and Best-Effort Delivery
-
Comparison: TCP vs. UDP
Media Access & Application Support
-
Multiple Access: Random vs. Controlled Access
-
Pure Aloha vs. Slotted Aloha Throughput
-
CSMA (Carrier Sense): Persistent Methods
-
Polling, Reservation, and Token Passing
-
Routing: Flooding vs. Dynamic Routing
-
Distance Vector (Bellman-Ford) vs. Link State (Dijkstra)
-
Circuit Switching vs. Packet Switching
-
Email Protocols: SMTP, POP3, IMAP4
-
Domain Name System (DNS) Hierarchy & Queries
-
FTP (File Transfer) and HTTP (Web Services)
-
Support Protocols: ARP and ICMP Error Reporting
-
Final Summary: OSI Model Layers 1-7
Watch the full course on the freeCodeCamp.org YouTube channel (12-hour watch).
