Networking Interview question and answer (1) (1)
Networking Interview question and answer (1) (1)
There are 7 OSI layers: 1) Physical Layer, 2) Data Link Layer, 3) Network Layer, 4) Transport Layer, 5) Session Layer, 6) Presentation Layer, and 7) Application Layer.
3) What is a LAN?
LAN stands for Local Area Network. It refers to the connection between computers and other network devices that are located within a small physical location.
8) What is a VPN?
VPN means Virtual Private Network, a technology that allows a secure tunnel to be created across a network such as the Internet. For example, VPNs allow you to
establish a secure dial-up connection to a remote server.
9) Briefly describe NAT
NAT is Network Address Translation. This is a protocol that provides a way for multiple computers on a common network to share a single connection to the Internet.
10) What is the job of the Network Layer under the OSI reference model?
The Network layer is responsible for data routing, packet switching, and control of network congestion. Routers operate under this layer.
15) What are proxy servers, and how do they protect computer networks?
Proxy servers primarily prevent external users who are identifying the IP addresses of an internal network. Without knowledge of the correct IP address, even the
physical location of the network cannot be identified. Proxy servers can make a network virtually invisible to external users.
21) What is OSI, and what role does it play in computer networks?
OSI (Open Systems Interconnect) serves as a reference model for data communication. It is made up of 7 layers, with each layer defining a particular aspect of how
network devices connect and communicate with one another. One layer may deal with the physical media used, while another layer dictates how data is transmitted
across the network.
22) What is the purpose of cables being shielded and having twisted pairs?
The primary purpose of this is to prevent crosstalk. Crosstalk’s are electromagnetic interferences or noise that can affect data being transmitted across cables.
TCP/IP is short for Transmission Control Protocol / Internet Protocol. This is a set of protocol layers that is designed to make data exchange possible on different types
of computer networks, also known as a heterogeneous network.
33) What protocol can be applied when you want to transfer files between different platforms, such as UNIX systems and Windows servers?
Use FTP (File Transfer Protocol) for file transfers between such different servers. This is possible because FTP is platform-independent.
Client-server problems
Application conflicts
Error in configuration
Protocol mismatch
Security issues
User policy and rights issues
Hub Switch
A hub operates on the physical layer. A switch operates on the data link layer.
Hubs perform frame flooding that can be unicast,
It performs broadcast, then the unicast and multicast as needed.
multicast, or broadcast.
Just a singular domain of collision is present in a hub. Varied ports have separate collision domains.
The transmission mode is Half-duplex The transmission mode is Full duplex
Hubs operate as a Layer 1 device per the OSI model. Network switches help you to operate at Layer 2 of the OSI model.
To connect a network of personal computers should be
Allow connecting multiple devices and ports.
joined through a central hub.
Uses electrical signal orbits Uses frame & packet
Does not offer Spanning-Tree Multiple Spanning-Tree is possible
Collisions occur mostly in setups using hubs. No collisions occur in a full-duplex switch.
Hub is a passive device A switch is an active device
Switches use CAM (Content Accessible Memory) that can be accessed by ASIC
A network hub can’t store MAC addresses.
(Application Specific Integrated Chips).
Not an intelligent device Intelligent device
Its speed is up to 10 Mbps 10/100 Mbps, 1 Gbps, 10 Gbps
Does not use software Has software for administration
41) What are the maximum networks and hosts in class A, B, and C network?
For Class A, there are 126 possible networks and 16,777,214 hosts. For Class B, there are 16,384 possible networks and 65,534 hosts. For Class C, there are 2,097,152
possible networks and 254 hosts
43) What protocols fall under the Application layer of the TCP/IP stack?
The following are the protocols under the TCP/IP Application layer: FTP, TFTP, Telnet, and SMTP.
44) You need to connect two computers for file sharing. Is it possible to do this without using a hub or a router?
Yes, you can connect two computers, using only one cable. A crossover type cable can be used in this scenario. In this setup, the data transmit pin of one cable is
connected to the data receive pin of the other cable, and vice versa.
49) When you move the NIC cards from one PC to another PC, does the MAC address gets transferred as well?
Yes, that’s because MAC addresses are hard-wired into the NIC circuitry, not the PC. This also means that a PC can have a different MAC address when another one
replaced the NIC card.
Partial Mesh Topology: In this type of topology, most of the devices are connected almost similarly as full topology. The only difference is that few devices are
connected with just two or three devices.
Full Mesh Topology: In this topology, every node or device are directly connected with each other.
TCP UDP
It is a connection-oriented protocol. It is a connectionless protocol.
TCP reads data as streams of bytes, and the message is transmitted to UDP messages contain packets that were sent one by one. It also
segment boundaries. checks for integrity at the arrival time.
TCP messages make their way across the Internet from one computer It is not connection-based, so one program can send lots of
to another. packets to another.
UDP protocol has no fixed order because all packets are
TCP rearranges data packets in the specific order.
independent of each other.
The speed for TCP is slower. UDP is faster as error recovery is not attempted.
Header size is 20 bytes The header size is 8 bytes.
TCP is heavy-weight. TCP needs three packets to set up a socket UDP is lightweight. There are no tracking connections, ordering of
connection before any user data can be sent. messages, etc.
TCP does error checking and also makes error recovery. UDP performs error checking, but it discards erroneous packets.
Acknowledgment segments No Acknowledgment segments
Using handshake protocol like SYN, SYN-ACK, ACK No handshake (so connectionless protocol)
TCP is reliable as it guarantees delivery of data to the destination The delivery of data to the destination can’t be guaranteed in
router. UDP.
TCP offers extensive error checking mechanisms because it provides UDP has just a single error checking mechanism that is used for
flow control and acknowledgment of data. checksums.
61) Why the standard OSI model is known as 802.xx?
The OSI model was started in February 1980. In 802.XX, ’80’ stands for the year 1980, and ‘2’ represents the month of February.
Universally Administered AddressUAA(Universally Administered Address) is the most used type of MAC address. It is given to the network adapter at the time of
manufacturing.
Locally Administered AddressLAA (Locally Administered Address) is an address that changes the MAC address of the adapter. You may assign this address to a
device used by network administrator.
68) What are the important differences between MAC address and IP address
Here, are some difference between MAC and IP address:
MAC IP address
The MAC address stands for Media Access Control Address. IP address stands for Internet Protocol Address.
It consists of a 48-bit address. It consists of a 32-bit address.
MAC address works at the link layer of the OSI model. IP address works at the network layer of OSI model.
It is referred to as a physical address. It is referred to as a logical address.
You can retrieve the MAC address of any device using ARP protocol. You can retrieve the MAC address of any device RARP protocol.
Classes are not used in MAC address. In IP, IPv4 uses A, B, C, D, and E classes.
69) What are the differences between analog and digital signal?
Here are the main differences between Analog and Digital Signal:
Analog Digital
An analog signal is a continuous signal that represents physical Digital signals are time separated signals which are generated using
measurements. digital modulation.
It is denoted by sine waves It is denoted by square waves.
It uses a continuous range of values that help you to represent
The Digital signal uses discrete 0 and 1 to represent information.
information.
The analog signal bandwidth is low The digital signal bandwidth is high.
Analog hardware never offers flexible implementation. Digital hardware offers flexibility in implementation.
It is suited for audio and video transmission. It is suited for Computing and digital electronics.
The Analog signal doesn’t offer any fixed range. Digital signal has a finite number, i.e., 0 and 1.
The main aim of the Modem is to produce a signal that can be transmitted easily and decoded to reproduce the digital data in its original form. Modems are also used for
transmitting analog signals, from Light Emitting Diodes (LED) to radio.
71) What are the advantages of a Modem?
Here, are pros/advantage of Modem:
NETWORK L1
Network Router protocols helps you to specify way routers communicate with each other. It allows the network to select routes between any two nodes on a computer
network.
Static
Dynamic
Routing Protocols
Advantages
Disadvantages
Advantage:
Disadvantage:
In the Distance Vector routing protocol, when a route becomes unavailable, all routing tables need to be updated with new information.
Advantages:
Disadvantages:
As the routing information are exchanged periodically, unnecessary traffic is generated, which consumes available bandwidth.
1. RIPv1
2. RIPv2
The original version or RIPv1 helps you determine network paths based on the IP destination and the hop count journey. RIPv1 also interacts with the network by
broadcasting its IP table to all routers connected with the network.
RIPv2 is a little more sophisticated as it sends its routing table on to a multicast address.
This type of routing protocol is the best for larger network size as it broadcasts after every 90 seconds, and it has a maximum hop count of 255. It helps you to sustain
larger networks compared to RIP. IGRP is also widely used as it is resistant to routing loop because it updates itself automatically when route changes occur within the
specific network. It is also given an option to load balance traffic across equal or unequal metric cost paths.
Neighbor table: This table contains information about the neighbors of the router only. For example, adjacency has been formed.
Topology table: This table stores information about the whole topology. For example, it contains both the best and backup routes to a particular advertised
network.
Routing table: This type of table contains all the best routes to the advertised network.
Advantages:
This protocol maintains separate tables for both the best route and the backup routes, so it has more knowledge of the inter-network than any other distance
vector routing protocol.
Concept of triggered updates are used, so it does not consume any unnecessary bandwidth.
Partial updates will be triggered when there is a topology change, so it does not need to update where the whole routing table is exchanged.
OSPF routing allows you to maintain databases detailing information about the surrounding topology of the network. It also uses the Dijkstra algorithm (Shortest path
algorithm) to recalculate network paths when its topology changes. This protocol is also very secure, as it can authenticate protocol changes to keep data secure.
Here are some main difference between these Distance Vector and Link State routing protocols:
Distance Vector protocol sends the entire routing table. Link State protocol sends only link-state information.
Updates are sometimes sent using broadcast. Uses only multicast method for routing updates.
Distance Vector Link State
The full form of ISIS is Intermediate System-to-Intermediate System. Under the IS-IS protocol, routers are organized into groups called areas. Multiple areas are grouped
to make form a domain.
This type of routing protocol sends updated router table data when changes are made. Therefore, there is no auto-discovery of topology changes, which means that the
user needs to configure BGP manually.
Classful routing protocols never send subnet mask detail during Classless routing protocols can send IP subnet mask information
routing updates. while doing routing updates.
RIPv1 and IGRP are classful protocols. These two are classful RIPv2, OSPF, EIGRP, and IS-IS are all types of class routing protocols
protocols as they do not include subnet mask information. which has subnet mask information within updates.
Summary:
Features RIP V1 RIP V2 IGRP OSPF EIGRP
Metric Hop Hop Composite Bandwidth, Delay. Bandwidth Composite, Bandwidth, Delay.
224.0.0.5
Advertising Address 255.255.255.255.255 223.0.0.9 255.255.255.255.255 224.0.0.10
224.0.0.6
Category Distance Vector Distance Vector Distance Vector Link State Hybrid
What is Domain?
A domain is a type of computer network in which all user computers, printers accounts, and other devices registered. It is a central database located on single or
multiple clusters of central computers, that is known as domain controllers.
This Domain contains all devices which can reach each other at the data link layer with the help of broadcast. Every port on a switch or in a hub should be in the same
broadcast domain.
However, all port on a router are in the distinct broadcast domains, and routers never broadcast from one Domain to another.
When the number of devices in a collision domain rises, and the chances of Collision will be increased. If there is more traffic in a collision domain, there are high
chances of crashes to occur. More collisions will happen with many network devices in a Collision domain.
An increased number of collisions will result in a low-quality network because hosts spend a large amount of time for packet processing and retransmission.
In other words, Collision never happens between two devices, which are connected to different ports of a Switch.
In the above-given image, you can see “Computer A” is sending a broadcast, and the switch will forward it to all the ports. Every connected switch will get a copy of the
broadcast packet. Here, all the switches will flood the broadcast packet to all types of ports.
In this domain type, the router also gets a copy of the broadcast packet. However, the route will not forward the packet to the next network segment. When the number
of broadcasts Domain increases, the number of broadcasts also increases, and the network quality comes down.
The Collision domain is a network section that allows traffic to A Broadcast domain is a type of Domain wherein traffic flows all over
flow forward and backward. the network.
The Collision domain refers to a set of devices in which packet Broadcast domain refers to a logical set of reachable computer
collision could occur. systems without using a router.
Packet collision occurs as multiple devices transmit data on a The broadcast domain mostly uses a switched environment to
single wire link. broadcast, so no collision occurs.
Switches will break in the collision domain. Switches will never break in the broadcast domain.
In, collision domain, every port on a router are in the separate All ports on a switch or a hub likely to be in the same broadcast
broadcast domains. domain.
KEY DIFFERENCES:
The Collision domain is a network section that allows traffic to flow forward and backward. In contrast, a Broadcast domain is a type of Domain wherein traffic
flows all over the network.
In the Collision domain, all the devices might include the devices of other IP subnetworks, whereas in the broadcast Domain is never limited to the specific IP
subnetwork for all types of IP broadcasts.
In collision domain, packet collision occurs as multiple devices transmit data on a single wire link. On the other hand, the broadcast domain mostly uses a
switched environment to broadcast, so no collision occurs.
NETWORK L2