The Baeldung logo
  • The Baeldung LogoCS Sublogo
  • Start Here
  • Write for Baeldung
  • About ▼▲
    • Full Archive

      The high level overview of all the articles on the site.

    • About Baeldung

      About Baeldung.

Networking

Networking provides the building blocks for machine-to-machine communication. Learn about general networking concepts and about popular protocols such as TCP, UDP, and HTTP.

  • IP Address (11)
  • HTTP (8)
  • TCP (7)
  • HTTPS (2)
  • FTP (2)

>> Browser Cookie Domains

>> Octet String: What Is it?

>> Different Network Topologies Explained

>> What is Quality of Service in Networking ?

>> What’s the P99 Latency?

>> What are HTTP Flood Attacks?

>> Circuit Switching Vs. Packet Switching

>> What is the Difference Between GET and POST Methods?

>> Introduction to Web Proxies

>> What’s IP-Address Ending With Zero Used For?

>> What Is Edge Computing?

>> What Are Replay Attacks?

>> Remote Code Execution (RCE) and How to Prevent it?

>> Retransmission Rules for TCP

>> Cloud: Public Vs. Private Vs. Hybrid

>> How Does 1’s Complement Work in Error Detection?

>> How Does a Load Balancer Work?

>> Distributed Systems: Consensus

>> Internet Vs. Intranet Vs. Extranet

>> Differences Between Cloud, Grid and Cluster

>> Understanding Piggybacking in Networks

>> EIGRP vs OSPF vs BGP

>> Differences Between Network Edge and Core

>> What are the Differences Between Static and Dynamic Routing?

>> Application Server Vs. Web Server

>> Underlay Network Vs. Overlay Network

>> What Are Virtual Private Networks?

>> High Availability Vs. Fault Tolerance

>> What is Software-Defined Networking?

>> Networking: Baseband Vs. Broadband

>> Network Management: The FCAPS Model

>> How to Describe Network Performance?

>> Differences Between Routing and Forwarding Tables

>> What Is a Network File System?

>> Webhooks Explained

>> Traffic Engineering: Shaping Vs. Policing

>> Routing Vs. Forwarding Vs. Switching

>> Networking: Stateless and Stateful Protocols

>> Network Function Virtualization Explained

>> Differences Between an IDS and an IPS

>> Port Scanning Explained

>> Caching and CDNs: What Is the Difference?

>> Using HTTP Tunnel to Traceroute Through a Proxy With Firewall

>> What Is a Content Delivery Network (CDN)?

>> UDP Packet Loss

>> Firewalls: Stateless Vs. Stateful

>> Security: What is the CIA Triad?

>> What are Zero-day Attacks?

>> Socket vs. RPC

>> Public DMZ Network Architecture

>> How to Find the Authoritative Name Server for a Domain?

>> How to Redirect DNS to Different Ports

>> Comparing TLS and DTLS

>> Simulating Slow Internet and Network Errors

>> Man In The Middle (MITM) Attacks Explained

>> The Difference Between Pipes and Sockets

>> How Do DoS and DDoS Attacks Really Work?

>> Are We Still Traceable When Using VPN?

>> What Is a URI?

>> How Are DNS Requests Resolved When Using VPN?

>> What Sets the RST Flag?

>> HTTP: 1.0 vs. 1.1 vs 2.0 vs. 3.0

>> Proxy Server vs. Reverse Proxy Server

>> How to Bind to Any Available Port?

>> Public/Private Keys Vs. Certificates

>> How to Calculate Packet Time from Latency and Bandwidth

>> Difference between SSL & TLS

>> Can TCP and UDP Sockets Use the Same Port?

>> Valid Characters of a Hostname

>> Network: Longest Prefix Matching

>> TCP Checksum Errors: Issues and Workarounds

>> What Is the Maximum Length of a URL in Different Browsers?

>> Maximum Packet Size for a TCP Connection

>> Determining Network and Broadcast Address Using IP Address and Subnet Mask

>> Non-routable IP Address

>> What Is the Difference Between Active and Passive FTP?

>> Active vs. Passive Connection in TCP

>> The Difference Between 127.0.0.1 and Localhost

>> The Pseudo-Header in TCP

>> Messages: Payload, Header, and Overhead

>> TCP: Differences Between FIN and RST

>> Calculating the Parity Bit of a Bit Sequence

>> HTTP: Differences Between PUT and PATCH

>> OSI Model: Packets vs. Frames

>> Flow Control vs. Congestion Control in TCP

>> The Subnets in IPv4 Networks

>> Multicast vs. Broadcast vs. Anycast vs. Unicast

>> Understanding Routing Table Entry

>> Calculate Upload/Download Speed Using Ping

>> Introduction to Serverless Architecture

>> API Gateway vs. Reverse Proxy

>> Docker and Containers vs. Virtual Machines

>> Request Timed Out vs. Destination Host Unreachable

>> IPv4 Datagram

>> Two-Way Handshake and Three-Way Handshake

>> Socket Binding

>> Whale Optimization Algorithm

>> Algorithms to Generate k-Combinations

>> Registers and RAM

>> Sockets: Close vs. Shutdown

>> OSI Model: Transport Layer vs. Networking Layer

>> Why Are TCP and UDP More Popular Than SCTP?

>> Difference Between Access Point, Station, Bridge, and Router

>> Propagation Delay vs Transmission Delay

>> Routers vs. Switches vs. Access Points

>> Symmetric Cryptography vs Asymmetric Cryptography

>> Client vs. Server Terminology

>> API Authentication – Tokens vs Sessions

>> Authentication vs Authorization

>> Difference Between IP Address and Port Number

>> SSL vs. SSH

>> Brewer’s CAP Theorem

>> SYN/ACK in the TCP Protocol

>> Bit Stuffing

>> Definition of Network Units: Packet, Fragment, Frame, Datagram, and Segment

>> Networking: IPv4 vs. IPv6 Addresses

>> The Difference Between a Port and a Socket

>> Offline Concurrency Control

>> Cross-Origin Resource Sharing and Why We Need Preflight Requests

>> Difference Between REST and HTTP

>> Fundamentals of Distributed Systems

>> Popular Network Protocols

>> Why Is an OPTIONS Request Sent?

>> Calculating the Range of IP Addresses from Subnet Mask

>> UDP vs TCP

>> HTTP Status Codes

>> What is a DMZ in Networking?

>> Introduction to Firewalls

>> Introduction to SSH

>> Introduction to the Domain Name System (DNS)

>> Introduction to VLAN

>> Introduction to DHCP

>> Sliding Window Algorithm

>> Virtualization vs Containerization

>> Computing the Diameter of a Network

>> Go-Back-N Protocol

>> Introduction to Virtualization

  • ↑ Back to Top
The Baeldung logo

Categories

  • Algorithms
  • Artificial Intelligence
  • Core Concepts
  • Data Structures
  • Graph Theory
  • Latex
  • Networking
  • Security

Series

About

  • About Baeldung
  • The Full archive
  • Write for Baeldung
  • Editors
  • Terms of Service
  • Privacy Policy
  • Company Info
  • Contact
The Baeldung Logo