0% found this document useful (0 votes)
2 views

Networking Interview question and answer (1) (1)

The document outlines key concepts in computer networking, including the OSI reference model with its seven layers, the definition of LANs, backbone networks, and various network protocols. It also discusses network security, types of cables, and the differences between networking devices like hubs and switches. Additionally, it covers protocols such as TCP/IP, DHCP, and ICMP, as well as network topologies and the role of organizations like IEEE in standardizing networking practices.

Uploaded by

Nayyarlucky
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Networking Interview question and answer (1) (1)

The document outlines key concepts in computer networking, including the OSI reference model with its seven layers, the definition of LANs, backbone networks, and various network protocols. It also discusses network security, types of cables, and the differences between networking devices like hubs and switches. Additionally, it covers protocols such as TCP/IP, DHCP, and ICMP, as well as network topologies and the role of organizations like IEEE in standardizing networking practices.

Uploaded by

Nayyarlucky
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 23

1) What are the layers of the OSI reference model?

There are 7 OSI layers: 1) Physical Layer, 2) Data Link Layer, 3) Network Layer, 4) Transport Layer, 5) Session Layer, 6) Presentation Layer, and 7) Application Layer.

2) What is the backbone network?


A backbone network is a centralized infrastructure that is designed to distribute different routes and data to various networks. It also handles the management of
bandwidth and multiple channels.

3) What is a LAN?
LAN stands for Local Area Network. It refers to the connection between computers and other network devices that are located within a small physical location.

4) What is a point to point link?


It refers to a direct connection between two computers on a network. A point to point connection does not need any other network devices other than connecting a
cable to the NIC cards of both computers.

5) What is a subnet mask?


A subnet mask is combined with an IP address to identify two parts: the extended network address and the host address. Like an IP address, a subnet mask is made up
of 32 bits.

6) What is the maximum length allowed for a UTP cable?


A single segment of UTP cable has an allowable length of 90 to 100 meters. This limitation can be overcome by using repeaters and switches.

7) What is data encapsulation?


Data encapsulation is the process of breaking down information into smaller, manageable chunks before it is transmitted across the network. In this process that the
source and destination addresses are attached to the headers, along with parity checks.

8) What is a VPN?
VPN means Virtual Private Network, a technology that allows a secure tunnel to be created across a network such as the Internet. For example, VPNs allow you to
establish a secure dial-up connection to a remote server.
9) Briefly describe NAT
NAT is Network Address Translation. This is a protocol that provides a way for multiple computers on a common network to share a single connection to the Internet.

10) What is the job of the Network Layer under the OSI reference model?
The Network layer is responsible for data routing, packet switching, and control of network congestion. Routers operate under this layer.

11) What is RIP?


RIP, short for Routing Information Protocol is used by routers to send data from one network to another. It efficiently manages routing data by broadcasting its routing
table to all other routers within the network. It determines the network distance in units of hops.

12) What are the different ways of securing a computer network?


There are several ways to do this. Install a reliable and updated anti-virus program on all computers. Make sure firewalls are setup and configured correctly. User
authentication will also help a lot. All these combined would make a highly secured network.

13) What is the importance of the OSI Physical Layer?


The physical layer does the conversion from data bits to the electrical signal, and vice versa. This is where network devices and cable types are considered and setup.

14) How many layers are there under TCP/IP?


There are four layers: 1) The Network Layer, 2) Internet Layer, 3) Transport Layer, and 4) Application Layer.

15) What are proxy servers, and how do they protect computer networks?
Proxy servers primarily prevent external users who are identifying the IP addresses of an internal network. Without knowledge of the correct IP address, even the
physical location of the network cannot be identified. Proxy servers can make a network virtually invisible to external users.

16) What is the function of the OSI Session Layer?


This layer provides the protocols and means for two devices on the network to communicate with each other by holding a session. This includes setting up the session,
managing information exchange during the session, and tear-down process upon termination of the session.

17) What does 10Base-T mean?


The 10 refers to the data transfer rate. In this case, it is 10Mbps. The word Base refers to baseband, as opposed to broadband.

18) What is a private IP address?


Private IP addresses are assigned for use on intranets. These addresses are used for internal networks and are not routable on external public networks. These ensure
that no conflicts are present among internal networks. At the same time, the same range of private IP addresses is reusable for multiple intranets since they do not “see”
each other.

19) What is NOS?


NOS, or Network Operating System, is specialized software. The main task of this software is to provide network connectivity to a computer in order to communicate
with other computers and connected devices.

20) What is DoS?


DoS, or Denial-of-Service attack, is an attempt to prevent users from being able to access the Internet or any other network services. Such attacks may come in different
forms and are done by a group of perpetrators. One common method of doing this is to overload the system server so it cannot anymore process legitimate traffic and
will be forced to reset.

21) What is OSI, and what role does it play in computer networks?
OSI (Open Systems Interconnect) serves as a reference model for data communication. It is made up of 7 layers, with each layer defining a particular aspect of how
network devices connect and communicate with one another. One layer may deal with the physical media used, while another layer dictates how data is transmitted
across the network.

22) What is the purpose of cables being shielded and having twisted pairs?
The primary purpose of this is to prevent crosstalk. Crosstalk’s are electromagnetic interferences or noise that can affect data being transmitted across cables.

23) What is the main purpose of OSPF?


OSPF, or Open Shortest Path First, is a link-state routing protocol that uses routing tables to determine the best possible path for data exchange.
24) What are firewalls?
Firewalls serve to protect an internal network from external attacks. These external threats can be hackers who want to steal data or computer viruses that can wipe out
data in an instant. It also prevents other users from external networks from gaining access to the private network.

25) What are gateways?


Gateways provide connectivity between two or more network segments. It is usually a computer that runs the gateway software and provides translation services. This
translation is key in allowing different systems to communicate on the network.

26) Give some examples of private network addresses.


10.0.0.0 with a subnet mask of 255.0.0.0172.16.0.0 with subnet mask of 255.240.0.0192.168.0.0 with subnet mask of 255.255.0.0

27) What is tracert?


Tracert is a Windows utility program that can use to trace the route taken by data from the router to the destination network. It also shows the number of hops taken
during the entire transmission route.

28) What is the main disadvantage of a peer to peer network?


Accessing the resources that are shared by one of the workstations on the network takes a performance hit.

29) What is a Hybrid Network?


A hybrid network is a network setup that makes use of both client-server and peer-to-peer architecture

30) What is DHCP?


DHCP is short for Dynamic Host Configuration Protocol. Its main task is to assign an IP address to devices across the network automatically. It first checks for the next
available address not yet taken by any device, then assigns this to a network device.

31) What is the main job of the ARP?


The main task of the ARP or Address Resolution Protocol is to map a known IP address to a MAC layer address.
32) What is TCP/IP?

TCP/IP is short for Transmission Control Protocol / Internet Protocol. This is a set of protocol layers that is designed to make data exchange possible on different types
of computer networks, also known as a heterogeneous network.

33) What protocol can be applied when you want to transfer files between different platforms, such as UNIX systems and Windows servers?
Use FTP (File Transfer Protocol) for file transfers between such different servers. This is possible because FTP is platform-independent.

34) What is the use of a default gateway?


Default gateways provide means for the local networks to connect to the external network. The default gateway for connecting to the external network is usually the
address of the external router port.

35) What is netstat?


Netstat is a command-line utility program. It provides useful information about the current TCP/IP settings of a connection.

36) What common software problems can lead to network defects?


Software related problems can be any or a combination of the following:

 Client-server problems
 Application conflicts
 Error in configuration
 Protocol mismatch
 Security issues
 User policy and rights issues

37) What is ICMP?


ICMP is an Internet Control Message Protocol. It provides messaging and communication for protocols within the TCP/IP stack. This is also the protocol that manages
error messages that are used by network tools such as PING.
38) What is Ping?
Ping is a utility program that allows you to check connectivity between network devices on the network. You can ping a device by using its IP address or device name,
such as a computer name.

39) What is DNS?


DNS is the Domain Name System. The main function of this network service is to provide host names to TCP/IP address resolution.

40) What is the difference between a hub and a switch?


Here is the major difference between Hub and switch:

Hub Switch
A hub operates on the physical layer. A switch operates on the data link layer.
Hubs perform frame flooding that can be unicast,
It performs broadcast, then the unicast and multicast as needed.
multicast, or broadcast.
Just a singular domain of collision is present in a hub. Varied ports have separate collision domains.
The transmission mode is Half-duplex The transmission mode is Full duplex
Hubs operate as a Layer 1 device per the OSI model. Network switches help you to operate at Layer 2 of the OSI model.
To connect a network of personal computers should be
Allow connecting multiple devices and ports.
joined through a central hub.
Uses electrical signal orbits Uses frame & packet
Does not offer Spanning-Tree Multiple Spanning-Tree is possible
Collisions occur mostly in setups using hubs. No collisions occur in a full-duplex switch.
Hub is a passive device A switch is an active device
Switches use CAM (Content Accessible Memory) that can be accessed by ASIC
A network hub can’t store MAC addresses.
(Application Specific Integrated Chips).
Not an intelligent device Intelligent device
Its speed is up to 10 Mbps 10/100 Mbps, 1 Gbps, 10 Gbps
Does not use software Has software for administration
41) What are the maximum networks and hosts in class A, B, and C network?
For Class A, there are 126 possible networks and 16,777,214 hosts. For Class B, there are 16,384 possible networks and 65,534 hosts. For Class C, there are 2,097,152
possible networks and 254 hosts

42) What is the standard color sequence of a straight-through cable?


Orange/white, orange, green/white, blue, blue/white, green, brown/white, brown.

43) What protocols fall under the Application layer of the TCP/IP stack?
The following are the protocols under the TCP/IP Application layer: FTP, TFTP, Telnet, and SMTP.

44) You need to connect two computers for file sharing. Is it possible to do this without using a hub or a router?
Yes, you can connect two computers, using only one cable. A crossover type cable can be used in this scenario. In this setup, the data transmit pin of one cable is
connected to the data receive pin of the other cable, and vice versa.

45) What is ipconfig?


Ipconfig is a utility program that is commonly used to identify the addresses information of a computer on a network. It can show the physical address as well as the IP
address.

46) What is the difference between a straight-through and crossover cable?


A straight-through cable is used to connect computers to a switch, hub, or router. A crossover cable is used to connect two similar devices, such as a PC to PC or Hub, to
the Hub.

47) What is the client/server?


Client/server is a type of network wherein one or more computers act as servers. Servers provide a centralized repository of resources such as printers and files. Clients
refer to a workstation that accesses the server.
48) Describe networking.
Networking refers to the interconnection between computers and peripherals for data communication. Networking can be done using wired cabling or through a
wireless link.

49) When you move the NIC cards from one PC to another PC, does the MAC address gets transferred as well?
Yes, that’s because MAC addresses are hard-wired into the NIC circuitry, not the PC. This also means that a PC can have a different MAC address when another one
replaced the NIC card.

50) What are some drawbacks of implementing a ring topology?


In case one workstation on the network suffers a malfunction, it can bring down the entire network. Another drawback is that when there are adjustments and
reconfigurations needed to be performed on a particular network, the entire network must be temporarily brought down.

51) What is the difference between CSMA/CD and CSMA/CA?


CSMA/CD, or Collision Detect, retransmits data frames whenever a collision occurred. CSMA/CA, or Collision Avoidance, will first broadcast intent to send prior to data
transmission.

52) What is SMTP?


SMTP is short for Simple Mail Transfer Protocol. This protocol deals with all internal mail and provides the necessary mail delivery services on the TCP/IP protocol stack.

53) What is multicast routing?


Multicast routing is a targeted form of broadcasting that sends a message to a selected group of the user instead of sending it to all users on a subnet.

54) Explain Mesh Topology


The mesh topology has a unique network design in which each computer on the network connects to every other. It is developing a P2P (point-to-point) connection
between all the devices of the network. It offers a high level of redundancy, so even if one network cable fails, data still has an alternative path to reach its destination.

Types of Mesh Topology:

Partial Mesh Topology: In this type of topology, most of the devices are connected almost similarly as full topology. The only difference is that few devices are
connected with just two or three devices.
Full Mesh Topology: In this topology, every node or device are directly connected with each other.

55) What is the role of the IEEE in computer networking?


IEEE, or the Institute of Electrical and Electronics Engineers, is an organization composed of engineers that issues and manages standards for electrical and electronic
devices. This includes networking devices, network interfaces, cablings, and connectors.

56) What protocols fall under the TCP/IP Internet Layer?


There are 4 protocols that are being managed by this layer. These are ICMP, IGMP, IP, and ARP.

57) What is one basic requirement for establishing VLANs?


A VLAN is required because at the switch level. There is only one broadcast domain. It means whenever a new user is connected to switch. This information is spread
throughout the network. VLAN on switch helps to create a separate broadcast domain at the switch level. It is used for security purposes.

58) What is IPv6?


IPv6, or Internet Protocol version 6, was developed to replace IPv4. At present, IPv4 is being used to control internet traffic but is expected to get saturated in the near
future. IPv6 was designed to overcome this limitation.

59) what is the maximum segment length of a 100Base-FX network?


The maximum allowable length for a network segment using 100Base-FX is 412 meters. The maximum length for the entire network is 5 kilometers.

60) What is the difference between TCP and UDP?


Here are some major differences between TCP and UDP protocols:

TCP UDP
It is a connection-oriented protocol. It is a connectionless protocol.
TCP reads data as streams of bytes, and the message is transmitted to UDP messages contain packets that were sent one by one. It also
segment boundaries. checks for integrity at the arrival time.
TCP messages make their way across the Internet from one computer It is not connection-based, so one program can send lots of
to another. packets to another.
UDP protocol has no fixed order because all packets are
TCP rearranges data packets in the specific order.
independent of each other.
The speed for TCP is slower. UDP is faster as error recovery is not attempted.
Header size is 20 bytes The header size is 8 bytes.
TCP is heavy-weight. TCP needs three packets to set up a socket UDP is lightweight. There are no tracking connections, ordering of
connection before any user data can be sent. messages, etc.
TCP does error checking and also makes error recovery. UDP performs error checking, but it discards erroneous packets.
Acknowledgment segments No Acknowledgment segments
Using handshake protocol like SYN, SYN-ACK, ACK No handshake (so connectionless protocol)
TCP is reliable as it guarantees delivery of data to the destination The delivery of data to the destination can’t be guaranteed in
router. UDP.
TCP offers extensive error checking mechanisms because it provides UDP has just a single error checking mechanism that is used for
flow control and acknowledgment of data. checksums.
61) Why the standard OSI model is known as 802.xx?
The OSI model was started in February 1980. In 802.XX, ’80’ stands for the year 1980, and ‘2’ represents the month of February.

62) What is the maximum length of Thinnet cable?


The length of the Thinnet cable is 185 meters.

63) Which cable is also called as the RG8 cable?


Thicknet cable is also called as the RG8 cable.

64) What Is TCP Three-Way Handshake?


TCP Three-Way Handshake
THREE-WAY handshake or a TCP 3-way handshake is a process that is used in a TCP/IP network to make a connection between the server and client. It is a three-step
process that requires both the client and server to exchange synchronization and acknowledgment packets before the real data communication process starts.

65) What is a MAC Address?


MAC address is a unique identifier that is assigned to a NIC (Network Interface Controller/ Card). It consists of a 48 bit or 64-bit address, which is associated with the
network adapter. MAC address can be in hexadecimal format. The full form of MAC address is Media Access Control address.

66) Why Use MAC Address?


Here are the important reasons for using MAC address:

 It provides a secure way to find senders or receivers in the network.


 MAC address helps you to prevent unwanted network access.
 MAC address is a unique number. Hence it can be used to track the device.
 Wi-Fi networks at the airport use the MAC address of a specific device in order to identify it.

67) What are the types of MAC Addresses?


Here are the important types of MAC addresses:

 Universally Administered AddressUAA(Universally Administered Address) is the most used type of MAC address. It is given to the network adapter at the time of
manufacturing.
 Locally Administered AddressLAA (Locally Administered Address) is an address that changes the MAC address of the adapter. You may assign this address to a
device used by network administrator.
68) What are the important differences between MAC address and IP address
 Here, are some difference between MAC and IP address:

MAC IP address
The MAC address stands for Media Access Control Address. IP address stands for Internet Protocol Address.
It consists of a 48-bit address. It consists of a 32-bit address.
MAC address works at the link layer of the OSI model. IP address works at the network layer of OSI model.
It is referred to as a physical address. It is referred to as a logical address.
You can retrieve the MAC address of any device using ARP protocol. You can retrieve the MAC address of any device RARP protocol.
Classes are not used in MAC address. In IP, IPv4 uses A, B, C, D, and E classes.

69) What are the differences between analog and digital signal?
Here are the main differences between Analog and Digital Signal:

Analog Digital
An analog signal is a continuous signal that represents physical Digital signals are time separated signals which are generated using
measurements. digital modulation.
It is denoted by sine waves It is denoted by square waves.
It uses a continuous range of values that help you to represent
The Digital signal uses discrete 0 and 1 to represent information.
information.
The analog signal bandwidth is low The digital signal bandwidth is high.
Analog hardware never offers flexible implementation. Digital hardware offers flexibility in implementation.
It is suited for audio and video transmission. It is suited for Computing and digital electronics.
The Analog signal doesn’t offer any fixed range. Digital signal has a finite number, i.e., 0 and 1.

70) What is Modem?


A modem (modulator-demodulator) is a device that modulates an analog signal to digital information. It also decodes carrier signals to demodulates the transmitted
information.

The main aim of the Modem is to produce a signal that can be transmitted easily and decoded to reproduce the digital data in its original form. Modems are also used for
transmitting analog signals, from Light Emitting Diodes (LED) to radio.
71) What are the advantages of a Modem?
Here, are pros/advantage of Modem:

 More useful in connecting LAN with the Internet


 Speed depends on the cost
 The Modem is the most widely used data communication roadway.

NETWORK L1

72) What is Routing Protocols?


Routing Protocols are the set of defined rules used by the routers to communicate between source & destination. They do not move the information to the source to a
destination, but only update the routing table that contains the information.

Network Router protocols helps you to specify way routers communicate with each other. It allows the network to select routes between any two nodes on a computer
network.

73) Types of Routing Protocols


There are mainly two types of Network Routing Protocols

 Static
 Dynamic
Routing Protocols

Static Routing Protocols


Static routing protocols are used when an administrator manually assigns the path from source to the destination network. It offers more security to the network.

Advantages

 No overhead on router CPU.


 No unused bandwidth between links.
 Only the administrator is able to add routes

Disadvantages

 The administrator must know how each router is connected.


 Not an ideal option for large networks as it is time intensive.
 Whenever link fails all the network goes down which is not feasible in small networks.
Dynamic Routing Protocols
Dynamic routing protocols are another important type of routing protocol. It helps routers to add information to their routing tables from connected routers
automatically. These types of protocols also send out topology updates whenever the network changes’ topological structure.

Advantage:

 Easier to configure even on larger networks.


 It will be dynamically able to choose a different route in case if a link goes down.
 It helps you to do load balancing between multiple links.

Disadvantage:

 Updates are shared between routers, so it consumes bandwidth.


 Routing protocols put an additional load on router CPU or RAM.

74) Distance Vector Routing Protocol (DVR)


Distance Vector Protocols advertise their routing table to every directly connected neighbor at specific time intervals using lots of bandwidths and slow converge.

In the Distance Vector routing protocol, when a route becomes unavailable, all routing tables need to be updated with new information.

Advantages:

 Updates of the network are exchanged periodically, and it is always broadcast.


 This protocol always trusts route on routing information received from neighbor routers.

Disadvantages:

 As the routing information are exchanged periodically, unnecessary traffic is generated, which consumes available bandwidth.

Internet Routing Protocols:


The following are types of protocols which help data packets find their way across the Internet:
Routing Information Protocol (RIP)
RIP is used in both LAN and WAN Networks. It also runs on the Application layer of the OSI model. The full form of RIP is the Routing Information Protocol. Two versions
of RIP are

1. RIPv1
2. RIPv2

The original version or RIPv1 helps you determine network paths based on the IP destination and the hop count journey. RIPv1 also interacts with the network by
broadcasting its IP table to all routers connected with the network.

RIPv2 is a little more sophisticated as it sends its routing table on to a multicast address.

Interior Gateway Protocol (IGP)


IGRP is a subtype of the distance-vector interior gateway protocol developed by CISCO. It is introduced to overcome RIP limitations. The metrics used are load,
bandwidth, delay, MTU, and reliability. It is widely used by routers to exchange routing data within an autonomous system.

This type of routing protocol is the best for larger network size as it broadcasts after every 90 seconds, and it has a maximum hop count of 255. It helps you to sustain
larger networks compared to RIP. IGRP is also widely used as it is resistant to routing loop because it updates itself automatically when route changes occur within the
specific network. It is also given an option to load balance traffic across equal or unequal metric cost paths.

Link State Routing Protocol


Link State Protocols take a unique approach to search the best routing path. In this protocol, the route is calculated based on the speed of the path to the destination
and the cost of resources.

Routing protocol tables:


Link state routing protocol maintains below given three tables:

 Neighbor table: This table contains information about the neighbors of the router only. For example, adjacency has been formed.
 Topology table: This table stores information about the whole topology. For example, it contains both the best and backup routes to a particular advertised
network.
 Routing table: This type of table contains all the best routes to the advertised network.
Advantages:

 This protocol maintains separate tables for both the best route and the backup routes, so it has more knowledge of the inter-network than any other distance
vector routing protocol.
 Concept of triggered updates are used, so it does not consume any unnecessary bandwidth.
 Partial updates will be triggered when there is a topology change, so it does not need to update where the whole routing table is exchanged.

Exterior Gateway Protocol (EGP)


EGP is a protocol used to exchange data between gateway hosts that are neighbors with each other within autonomous systems. This routing protocol offers a forum for
routers to share information across different domains. The full form for EGP is the Exterior Gateway Protocol. EGP protocol includes known routers, network addresses,
route costs, or neighboring devices.

Enhanced Interior Gateway Routing Protocol (EIGRP)


EIGRP is a hybrid routing protocol that provides routing protocols, distance vector, and link-state routing protocols. The full form routing protocol EIGRP is Enhanced
Interior Gateway Routing Protocol. It will route the same protocols that IGRP routes using the same composite metrics as IGRP, which helps the network select the best
path destination.

Open Shortest Path First (OSPF)


Open Shortest Path First (OSPF) protocol is a link-state IGP tailor-made for IP networks using the Shortest Path First (SPF) method.

OSPF routing allows you to maintain databases detailing information about the surrounding topology of the network. It also uses the Dijkstra algorithm (Shortest path
algorithm) to recalculate network paths when its topology changes. This protocol is also very secure, as it can authenticate protocol changes to keep data secure.

Here are some main difference between these Distance Vector and Link State routing protocols:

Distance Vector Link State

Distance Vector protocol sends the entire routing table. Link State protocol sends only link-state information.

It is susceptible to routing loops. It is less susceptible to routing loops.

Updates are sometimes sent using broadcast. Uses only multicast method for routing updates.
Distance Vector Link State

It is simple to configure. It is hard to configure this routing protocol.

Does not know network topology. Know the entire topology.

Example RIP, IGRP. Examples: OSPF IS-IS.

Intermediate System-to-Intermediate System (IS-IS)


ISIS CISCO routing protocol is used on the Internet to send IP routing information. It consists of a range of components, including end systems, intermediate systems,
areas, and domains.

The full form of ISIS is Intermediate System-to-Intermediate System. Under the IS-IS protocol, routers are organized into groups called areas. Multiple areas are grouped
to make form a domain.

Border Gateway Protocol (BGP)


BGP is the last routing protocol of the Internet, which is classified as a DPVP (distance path vector protocol). The full form of BGP is the Border Gateway Protocol.

This type of routing protocol sends updated router table data when changes are made. Therefore, there is no auto-discovery of topology changes, which means that the
user needs to configure BGP manually.

What is the purpose of Routing Protocols?


Routing protocols are required for the following reasons:

 Allows optimal path selection


 Offers loop-free routing
 Fast convergence
 Minimize update traffic
 Easy to configure
 Adapts to changes
 Scales to a large size
 Compatible with existing hosts and routers
 Supports variable length
Classful Vs. Classless Routing Protocols
Here are some main difference between these routing protocols:

Classful Routing Protocols Classless Routing Protocols

Classful routing protocols never send subnet mask detail during Classless routing protocols can send IP subnet mask information
routing updates. while doing routing updates.

RIPv1 and IGRP are classful protocols. These two are classful RIPv2, OSPF, EIGRP, and IS-IS are all types of class routing protocols
protocols as they do not include subnet mask information. which has subnet mask information within updates.

Summary:
Features RIP V1 RIP V2 IGRP OSPF EIGRP

Classful/Classless Classful Classless Classful Classless Classless

Metric Hop Hop Composite Bandwidth, Delay. Bandwidth Composite, Bandwidth, Delay.

Periodic 30 seconds 30 seconds 90 seconds None 30 seconds

224.0.0.5
Advertising Address 255.255.255.255.255 223.0.0.9 255.255.255.255.255 224.0.0.10
224.0.0.6

Category Distance Vector Distance Vector Distance Vector Link State Hybrid

Default Distance 120 120 200 110 170

What is Domain?
A domain is a type of computer network in which all user computers, printers accounts, and other devices registered. It is a central database located on single or
multiple clusters of central computers, that is known as domain controllers.

What is Collision Domain?


The collision domain defines the set of devices on which their frames could collide. It is a network segment connected by a shared medium or using repeaters where
real-time data transmissions collide.
The collision domain applies to wireless networks. However, it also affects earlier versions of Ethernet. A collision happens when two separate devices simultaneously
send a packet on the commonly shared network segment. The packets collide, and both devices require sending the packets again. That helps you to reduce network
efficiency.

What is Broadcast Domain?


A broadcast domain is a logical division of a computer network. In this type of Domain, nodes can reach each other using broadcast at the data link layer. A broadcast
domain either in the same LAN segment or which can bridge to other LAN networks.

This Domain contains all devices which can reach each other at the data link layer with the help of broadcast. Every port on a switch or in a hub should be in the same
broadcast domain.
However, all port on a router are in the distinct broadcast domains, and routers never broadcast from one Domain to another.

Example of Collison Domain.


In the above example, you can see “Computer A” send a data signal to “Computer C.” In the same way, “Computer B” sends a data signal to “Computer D” where a
Collision will happen.

When the number of devices in a collision domain rises, and the chances of Collision will be increased. If there is more traffic in a collision domain, there are high
chances of crashes to occur. More collisions will happen with many network devices in a Collision domain.

An increased number of collisions will result in a low-quality network because hosts spend a large amount of time for packet processing and retransmission.

In other words, Collision never happens between two devices, which are connected to different ports of a Switch.

Example of Broadcast domains

In the above-given image, you can see “Computer A” is sending a broadcast, and the switch will forward it to all the ports. Every connected switch will get a copy of the
broadcast packet. Here, all the switches will flood the broadcast packet to all types of ports.
In this domain type, the router also gets a copy of the broadcast packet. However, the route will not forward the packet to the next network segment. When the number
of broadcasts Domain increases, the number of broadcasts also increases, and the network quality comes down.

Difference Between Collision and Broadcast Domain


Here are some important differences between Collision and Broadcast Domain:

Collision Domain Broadcast Domain

The Collision domain is a network section that allows traffic to A Broadcast domain is a type of Domain wherein traffic flows all over
flow forward and backward. the network.

The Collision domain refers to a set of devices in which packet Broadcast domain refers to a logical set of reachable computer
collision could occur. systems without using a router.

Broadcast Domain is never limited to the specific IP subnetwork for all


The devices might include the devices of other IP subnetworks.
types of IP broadcasts.

Packet collision occurs as multiple devices transmit data on a The broadcast domain mostly uses a switched environment to
single wire link. broadcast, so no collision occurs.

Switches will break in the collision domain. Switches will never break in the broadcast domain.

In, collision domain, every port on a router are in the separate All ports on a switch or a hub likely to be in the same broadcast
broadcast domains. domain.

KEY DIFFERENCES:

 The Collision domain is a network section that allows traffic to flow forward and backward. In contrast, a Broadcast domain is a type of Domain wherein traffic
flows all over the network.
 In the Collision domain, all the devices might include the devices of other IP subnetworks, whereas in the broadcast Domain is never limited to the specific IP
subnetwork for all types of IP broadcasts.
 In collision domain, packet collision occurs as multiple devices transmit data on a single wire link. On the other hand, the broadcast domain mostly uses a
switched environment to broadcast, so no collision occurs.
NETWORK L2

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy