The Baeldung logo
  • The Baeldung LogoCS Sublogo
  • Start Here
  • About ▼▲
    • Full Archive

      The high level overview of all the articles on the site.

    • About Baeldung

      About Baeldung.

Networking

Networking provides the building blocks for machine-to-machine communication. Learn about general networking concepts and about popular protocols such as TCP, UDP, and HTTP.

  • Routing (24)
  • TCP (21)
  • IP Address (20)
  • HTTP (12)
  • Security Attacks (9)
  • UDP (5)
  • Distributed Systems and Programming (5)
  • Virtual Private Networks (5)
  • Virtualization (5)
  • Firewalls (5)
  • Authentication (4)
  • HTTPS (4)
  • Cloud Computing (3)
  • Cryptography (3)
  • URL (2)
  • Malware (2)
  • FTP (2)

>> IP Fragmentation and Reassembly

>> Finding the Origin of Increased Latency

>> Why Does RTP Use UDP Instead of TCP?

>> What Does TCP DUP ACK Mean?

>> Different Types of DNS Records

>> What Are Impersonation Attacks?

>> Channelization Protocols Explained

>> Differences Between POP3 and IMAP Email Protocols

>> URL Matrix Parameters vs Query Parameters

>> IPv6: Stateful Vs. Stateless

>> Controlled Access Protocols: Token Passing

>> Figuring out Subnet ID and Host ID from an IP Address

>> Security: Interruption vs. Interception vs. Modification vs. Fabrication

>> Transport Layer: Multiplexing and Demultiplexing

>> Distributed Systems: Thin and Thick Clients

>> Difference Between MTU and MSS

>> The Basics of Internet Control Message Protocol

>> Switches: Managed vs. Unmanaged

>> RSTP and STP Protocols

>> Wi-Fi 6 Explained

>> Key Differences Between NetFlow and sFlow

>> Mobile Networking: Snooping TCP

>> How MAC Flooding and Cloning Attacks Work?

>> An Introduction to VRRP and HSRP Protocols

  • Virtual Private Networks

>> Multiple Access with Collision Avoidance

>> What Are Raw Sockets?

>> An Introduction to Peer-to-Peer Network Model

>> Network Flow: Edmonds-Karp Algorithm

>> What’s the Difference Between an Ethernet Cable and a UTP Cable?

>> Differences Between Control, Data, and Management Planes

>> Binary Synchronous Communications Protocol

>> Bandwidth vs. Data Rate vs. Throughput

>> CORS, CSP, and Their Differences

>> The Difference Between Connection-Oriented and Connectionless Protocols

>> Routing: IGP and EGP Protocols

>> Distributed Systems: The Byzantine Generals Problem

>> Different Types of Firewalls

>> Telnet vs. SSH

>> What Are Datagram Networks?

>> What Is Ethernet?

>> What Is VoIP?

>> SOAP vs. WSDL

>> Network Management Principles With SNMP

>> Networking: Stop-and-Wait Protocol

>> Selective Repeat Protocol

>> Mobile Networking: 1G vs. 2G vs. 3G vs. 4G vs. 5G

>> Automatic Private IP Addressing Explained

>> Wireless Disassociation Attacks

>> Switching Techniques in Computer Networks

>> Digital Data Communications Protocol

>> Point-to-Point Protocol (PPP)

>> Hit and Miss Ratio in Cache for Content Delivery Networks

>> What Is Round Trip Time?

>> What Is Dynamic DNS?

>> Random Access Protocols: Pure ALOHA

>> What Is a Peer in Computer Network?

>> Understanding MAC Addresses

>> The Sub-Layers of the Data Link Layer

>> Differences Between a Gateway and a Firewall

>> Routing: Distance Vector vs. Link State

>> What Is Fog Computing?

>> How to Overcome Root Domain CNAME Restrictions?

>> What Is the Difference Between Standard VLAN and Extended VLAN?

>> Is 0.0.0.0 a Valid IP Address?

>> Browser Cookie Domains

>> Octet String: What Is It?

>> Different Network Topologies Explained

>> What Is Quality of Service in Networking ?

>> What’s the P99 Latency?

>> What Are HTTP Flood Attacks?

>> Circuit Switching vs. Packet Switching

>> What Is the Difference Between GET and POST Methods?

>> Introduction to Web Proxies

>> What’s IP-Address Ending With Zero Used For?

>> What Is Edge Computing?

>> What Are Replay Attacks?

>> Remote Code Execution (RCE) and How to Prevent It?

>> Retransmission Rules for TCP

>> Cloud: Public vs. Private vs. Hybrid

>> How Does 1’s Complement Work in Error Detection?

>> How Does a Load Balancer Work?

>> Distributed Systems: Consensus

  • Blockchain

>> Internet vs. Intranet vs. Extranet

>> Differences Between Cloud, Grid and Cluster

>> Understanding Piggybacking in Networks

>> EIGRP vs OSPF vs BGP

>> Differences Between Network Edge and Core

>> What Are the Differences Between Static and Dynamic Routing?

>> Application Server vs. Web Server

>> Underlay Network vs. Overlay Network

>> What Are Virtual Private Networks?

  • Virtual Private Networks

>> High Availability vs. Fault Tolerance

>> What Is Software-Defined Networking?

>> Networking: Baseband vs. Broadband

>> Network Management: The FCAPS Model

>> How to Describe Network Performance?

>> Differences Between Routing and Forwarding Tables

>> What Is a Network File System?

>> Webhooks Explained

>> Traffic Engineering: Shaping Vs. Policing

>> Routing vs. Forwarding vs. Switching

>> Networking: Stateless and Stateful Protocols

  • Virtual Private Networks

>> Network Function Virtualization Explained

>> Differences Between an IDS and an IPS

>> Port Scanning Explained

>> Caching and CDNs: What Is the Difference?

>> Using HTTP Tunnel to Traceroute Through a Proxy With Firewall

>> What Is a Content Delivery Network (CDN)?

>> UDP Packet Loss

>> Firewalls: Stateless vs. Stateful

>> Security: What Is the CIA Triad?

>> What Are Zero-Day Attacks?

>> Socket vs. RPC

>> Public DMZ Network Architecture

>> How to Find the Authoritative Name Server for a Domain?

>> How to Redirect DNS to Different Ports

>> Comparing TLS and DTLS

>> Simulating Slow Internet and Network Errors

>> Man in the Middle (MITM) Attacks Explained

>> The Difference Between Pipes and Sockets

>> How Do DoS and DDoS Attacks Really Work?

>> Are We Still Traceable When Using VPN?

  • Virtual Private Networks

>> What Is a URI?

>> How Are DNS Requests Resolved When Using VPN?

  • Virtual Private Networks

>> What Sets the RST Flag?

>> HTTP: 1.0 vs. 1.1 vs 2.0 vs. 3.0

>> Proxy Server vs. Reverse Proxy Server

>> How to Bind to Any Available Port?

>> Public/Private Keys Vs. Certificates

>> How to Calculate Packet Time from Latency and Bandwidth

>> Difference Between SSL & TLS

>> Can TCP and UDP Sockets Use the Same Port?

>> Valid Characters of a Hostname

>> Network: Longest Prefix Matching

>> TCP Checksum Errors: Issues and Workarounds

>> What Is the Maximum Length of a URL in Different Browsers?

>> Maximum Packet Size for a TCP Connection

>> Determining Network and Broadcast Address Using IP Address and Subnet Mask

>> Non-routable IP Address

>> What Is the Difference Between Active and Passive FTP?

>> Active vs. Passive Connection in TCP

>> The Difference Between 127.0.0.1 and Localhost

>> The Pseudo-Header in TCP

>> Messages: Payload, Header, and Overhead

>> TCP: Differences Between FIN and RST

>> Calculating the Parity Bit of a Bit Sequence

>> HTTP: Differences Between PUT and PATCH

>> OSI Model: Packets vs. Frames

>> Flow Control vs. Congestion Control in TCP

>> The Subnets in IPv4 Networks

>> Multicast vs. Broadcast vs. Anycast vs. Unicast

>> Understanding Routing Table Entry

>> Calculate Upload/Download Speed Using Ping

>> Introduction to Serverless Architecture

>> API Gateway vs. Reverse Proxy

>> Docker and Containers vs. Virtual Machines

>> Request Timed Out vs. Destination Host Unreachable

>> IPv4 Datagram

>> Two-Way Handshake and Three-Way Handshake

>> Socket Binding

>> Algorithms to Generate K-Combinations

>> Sockets: Close vs. Shutdown

>> OSI Model: Transport Layer vs. Networking Layer

>> Why Are TCP and UDP More Popular Than SCTP?

>> Difference Between Access Point, Station, Bridge, and Router

>> Propagation Delay vs Transmission Delay

>> Routers vs. Switches vs. Access Points

>> Symmetric Cryptography vs Asymmetric Cryptography

>> Client vs. Server Terminology

>> API Authentication – Tokens vs Sessions

>> Authentication vs Authorization

>> Difference Between IP Address and Port Number

>> SSL vs. SSH

>> Brewer’s CAP Theorem

>> SYN/ACK in the TCP Protocol

>> Bit Stuffing

>> Definition of Network Units: Packet, Fragment, Frame, Datagram, and Segment

>> Networking: IPv4 vs. IPv6 Addresses

>> The Difference Between a Port and a Socket

>> Difference Between REST and HTTP

>> Fundamentals of Distributed Systems

>> Popular Network Protocols

>> OSI Model

>> Why Is an OPTIONS Request Sent?

>> Calculating the Range of IP Addresses from Subnet Mask

>> UDP vs TCP

>> HTTP Status Codes

>> What Is a Dmz in Networking?

>> Introduction to Firewalls

>> Introduction to SSH

>> Introduction to the Domain Name System (DNS)

>> Introduction to VLAN

>> Introduction to DHCP

>> Sliding Window Algorithm

>> Virtualization vs Containerization

>> Computing the Diameter of a Network

>> Go-Back-N Protocol

>> Introduction to Virtualization

  • ↑ Back to Top
The Baeldung logo

Categories

  • Algorithms
  • Artificial Intelligence
  • Core Concepts
  • Data Structures
  • Graph Theory
  • Latex
  • Networking
  • Security

Series

About

  • About Baeldung
  • The Full archive
  • Editors
  • Terms of Service
  • Privacy Policy
  • Company Info
  • Contact
The Baeldung Logo