Fundamentals 66 min read

66 Essential Computer Network Concepts Every Developer Should Know

This comprehensive guide covers 66 key computer networking topics, from the evolution of HTTP protocols and request methods to TCP/IP fundamentals, TLS/HTTPS security, web performance optimization, caching strategies, cookies, tokens, and common interview questions, providing clear explanations, diagrams, and practical examples for developers.

Liangxu Linux
Liangxu Linux
Liangxu Linux
66 Essential Computer Network Concepts Every Developer Should Know

Overview of Computer Network Knowledge

Computer networking fundamentals are frequently tested in interviews and are essential in daily development work. This article compiles 66 important concepts, ranging from HTTP protocol versions and request methods to TCP/IP mechanics, TLS/HTTPS security, performance optimization, caching, cookies, tokens, and security threats.

1. Comparing HTTP 0.9 and HTTP 1.0

HTTP 0.9 is a minimal protocol with only a GET method, no headers, and a single request‑response round‑trip. HTTP 1.0 adds headers, status codes, redirects, errors, conditional requests, and content encoding, requiring two round‑trips.

Client builds request → DNS lookup → TCP three‑way handshake → request → server response → TCP four‑way termination (single round‑trip for HTTP 0.9, two for HTTP 1.0).

2. HTTP 1.1 and HTTP 2

HTTP 1.1 introduces persistent connections, caching header extensions, OPTIONS, Upgrade, Range requests, compression, and pipelining, but still suffers from head‑of‑line (HOL) blocking. HTTP 2 solves HOL blocking with binary framing, multiplexing, header compression, stream prioritization, server push, flow control, and reset messages.

Using HTTP 2 reduces perceived latency and improves TCP connection utilization.

3. Common HTTP Request Methods

GET

– retrieve resources. POST – submit data to a resource. PUT – update or replace a resource (specifies the target location). HEAD – fetch only headers. DELETE – remove a resource. OPTIONS – list supported methods (e.g., GET,POST). TRACE – echo the received request for debugging. CONNECT – convert the request connection to a tunnel (used by proxies).

4. From URL Input to Page Rendering

The browser resolves the domain via DNS, establishes a TCP connection, performs TLS handshake if needed, sends the HTTP request, receives the response, parses HTML, builds the DOM, discovers resources, queues them, and finally renders the page. Rendering involves a rendering engine (layout, paint) and a JavaScript engine (execution).

5. Web Performance Optimization

Key performance factors include data packets, latency, bandwidth, connection‑establishment time, and TCP three‑way handshake. Optimizations cover DNS query caching, client‑side caching, TCP connection reuse, avoiding redirects, edge caching, conditional caching, compression, code minification, and image optimization.

Metrics such as TTFB (time to first byte), content download time, start‑render time, and document load completion are used to evaluate performance.

6. HTTP 2 Technical Details

HTTP 2 uses a binary framing layer where each frame has a 9‑byte header (length, type, flags, reserved bit, stream identifier) followed by a variable‑length payload. Frames are interleaved across streams, allowing out‑of‑order delivery and reassembly based on stream IDs.

Multiplexing eliminates the need for multiple TCP connections, reducing HOL blocking.

7. HTTPS and TLS

HTTPS adds SSL/TLS encryption to HTTP, providing confidentiality, integrity, and authentication. The handshake involves the client sending supported cipher suites and a random value, the server responding with a certificate and its random value, the client verifying the certificate, generating a pre‑master secret encrypted with the server’s public key, and both sides deriving symmetric keys for bulk encryption.

Certificates are issued by Certificate Authorities (CAs) after verification, and the signature is created by hashing the certificate data and encrypting the hash with the CA’s private key.

8. Cookies, Sessions, and Tokens

Cookies store small key‑value pairs on the client to maintain state across HTTP’s stateless requests. Attributes include domain, path, expiration, HttpOnly, Secure, and SameSite (Strict, Lax, None). Sessions store state on the server, identified by a session ID usually stored in a cookie. Tokens (e.g., JWT) provide stateless authentication, reducing server load.

9. Security Threats: CSRF and XSS

CSRF exploits a logged‑in user's credentials to perform unwanted actions; defenses include SameSite cookies and anti‑CSRF tokens. XSS injects malicious scripts into pages; mitigation involves output encoding, Content‑Security‑Policy, and HttpOnly cookies.

10. Caching Strategies

Strong (browser) caching uses Expires and Cache‑Control headers (e.g., max‑age, public, private, no‑cache, no‑store). Conditional caching uses ETag and Last‑Modified headers, allowing the server to respond with 304 Not Modified when resources are unchanged.

11. TCP/IP Basics

TCP is a connection‑oriented, reliable, byte‑stream protocol with flow control, congestion control (slow start, congestion avoidance, fast retransmit, fast recovery), and sequence/acknowledgment numbers. UDP is connection‑less, unordered, and faster but unreliable.

TCP three‑way handshake establishes a connection (SYN, SYN‑ACK, ACK). Four‑way termination gracefully closes it (FIN, ACK, FIN, ACK).

12. DNS Resolution Process

Clients query recursive resolvers, which traverse the DNS hierarchy: root → TLD → authoritative name servers, ultimately returning the IP address for the requested domain.

13. HTTP Headers Overview

Key request headers: Accept, Accept‑Encoding, Accept‑Language, Accept‑Charset, Cookie, Range. Key response headers: Content‑Type, Content‑Encoding, Content‑Length, Content‑Range, Set‑Cookie, Cache‑Control, Expires, ETag, Last‑Modified, Transfer‑Encoding, Connection, Location, Allow.

14. HTTP Status Codes

Informational (1xx), Success (2xx), Redirection (3xx), Client Error (4xx), Server Error (5xx). Examples: 100 Continue, 200 OK, 201 Created, 301 Moved Permanently, 302 Found, 304 Not Modified, 401 Unauthorized, 403 Forbidden, 404 Not Found, 500 Internal Server Error, 503 Service Unavailable.

15. HTTP/3 and QUIC

HTTP/3 runs over QUIC, a UDP‑based transport that provides multiplexed streams, reduced connection latency (0‑RTT), and built‑in encryption. QUIC eliminates TCP’s HOL blocking and improves loss recovery by allowing independent stream retransmission.

16. Practical Interview Questions

Explain the differences between HTTP 1.0, 1.1, 2, and 3.

Describe the TCP three‑way handshake and four‑way termination.

List common HTTP methods and when to use them.

What are cookies, sessions, and tokens? How do they differ?

How do CSRF and XSS attacks work and how can they be mitigated?

Explain caching mechanisms (strong vs. conditional).

What is the purpose of the Accept header?

Describe the role of TLS in HTTPS.

Images

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

cachingWeb PerformanceProtocolsSecurityHTTPTCP/IPnetwork fundamentals
Liangxu Linux
Written by

Liangxu Linux

Liangxu, a self‑taught IT professional now working as a Linux development engineer at a Fortune 500 multinational, shares extensive Linux knowledge—fundamentals, applications, tools, plus Git, databases, Raspberry Pi, etc. (Reply “Linux” to receive essential resources.)

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.