100 Networking Interview Questions
100 Networking Interview Questions
Q #6) What are the layers in OSI Reference Models? Describe each layer briefly.
Answer: Given below are the seven layers of OSI Reference Models:
a) Physical Layer (Layer 1): It converts data bits into electrical impulses or radio
signals. Example: Ethernet.
b) Data Link Layer (Layer 2): At the Data Link layer, data packets are encoded and
decoded into bits and it provides a node to node data transfer. This layer also detects the
errors that occurred at Layer 1.
c) Network Layer (Layer 3): This layer transfers variable length data sequence from one
node to another node in the same network. This variable-length data sequence is also
known as “Datagrams”.
d) Transport Layer (Layer 4): It transfers data between nodes and also provides
acknowledgment of successful data transmission. It keeps track of transmission and sends
the segments again if the transmission fails.
e) Session Layer (Layer 5): This layer manages and controls the connections between
computers. It establishes, coordinates, exchange and terminates the connections between
local and remote applications.
f) Presentation Layer (Layer 6): It is also called as “Syntax Layer”. Layer 6 transforms the
data into the form in which the application layer accepts.
g) Application Layer (Layer 7): This is the last layer of the OSI Reference Model and is
the one that is close to the end-user. Both end-user and application layer interacts with the
software application. This layer provides services for email, file transfer, etc.
Hub is least expensive, least intelligent Switches work similarly The router is smartest and most complicated
and least complicated of the three. like Hubs but in a more out of these three. It comes in all shapes and
It broadcast all data to every port which efficient manner. sizes. Routers are similar like little
may cause serious security and reliability It creates connections computers dedicated for routing network
concern dynamically and provides traffic
information only to the
requesting port
In a Network, Hub is a common Switch is a device in a Routers are located at gateway and forwards
connection point for devices connected to network which forwards data packets
the network. Hub contains multiple ports packets in a network
and is used to connect segments of LAN
TCP UDP
TCP stands for Transmission Control Protocol UDP is stands for User Datagram Protocol or Universal
Datagram Protocol
Once the connection is setup, data can be sent bi- UDP is connectionless, simple protocol. Using UDP, messages
directional i.e. TCP is a connection oriented are sent as packets
protocol
The speed of TCP is slower than UDP UDP is faster compared to TCP
TCP is used for the application where time is not UDP is suitable for the applications which require fast
critical part of data transmission transmission of data and time is crucial in this case.
TCP transmission occurs in a sequential manner UDP transmission also occurs in a sequential manner but it does
TCP UDP
TCP tracks the data sent to ensure no data loss UDP does not ensure whether receiver receives packets are not.
during data transmission If packets are misses then they are just lost
Q #12) What is a Firewall?
Answer: Firewall is a network security system that is used to protect computer networks
from unauthorized access. It prevents malicious access from outside to the computer
network. A firewall can also be built to grant limited access to outside users.
The firewall consists of a hardware device, software program or a combined configuration of
both. All the messages that route through the firewall are examined by specific security
criteria and the messages which meet the criteria are successfully traversed through the
network or else those messages are blocked.
Firewalls can be installed just like any other computer software and later can be customized
as per the need and have some control over the access and security features. “
Windows Firewall” is an inbuilt Microsoft Windows application that comes along with the
operating system. This “Windows Firewall” also helps to prevent viruses, worms, etc.
All computers are peers and no computer has control Network admin uses one or more computer as a server and
over another computer provide all accesses, security permission to all other
computers in a network
In a Workgroup, each computer maintains their own The domain is a form of a computer network in which
database computers, printers, and user accounts are registered in a
central database.
Each computer has their own authentication rule for It has centralized authentication servers which set the rule of
every user account authentication
Each computer has set of user account. If user has If user has an account in a domain then user can login to any
account on that computer then only user able to access computer in a domain
the computer
Workgroup does not bind to any security permission or Domain user has to provide security credentials whenever
Workgroup Domain
does not require any password they are accessing the domain network
Computer settings need to change manually for each In a domain, changes made in one computer automatically
computer in a Workgroup made same changes to all other computers in a network
All computers must be on same local area network In a domain, computers can be on a different local network
In a Workgroup, there can be only 20 computers In a domain, thousands of computers can be connected
connected
Q #15) What is a Proxy Server and how do they protect the computer network?
Answer: For data transmission, IP addresses are required and even DNS uses IP
addresses to route to the correct website. It means without the knowledge of correct and
actual IP addresses it is not possible to identify the physical location of the network.
Proxy servers prevent external users who are unauthorized to access such IP addresses of
the internal network. It makes the computer network virtually invisible to external users.
Proxy Server also maintains the list of blacklisted websites so that the internal user is
automatically prevented from getting easily infected by viruses, worms, etc.
Q #16) What are IP classes and how can you identify the IP class of given an IP
address?
Answer: An IP address has 4 sets (octets) of numbers each with a value up to 255.
For Example, the range of the home or commercial connection started primarily between
190 x or 10 x. IP classes are differentiated based on the number of hosts it supports on a
single network. If IP classes support more networks then very few IP addresses are
available for each network.
There are three types of IP classes and are based on the first octet of IP addresses which
are classified as Class A, B or C. If the first octet begins with 0 bit then it is of type Class A.
Class A type has a range up to 127.x.x.x (except 127.0.0.1). If it starts with bits 10 then it
belongs to Class B. Class B having a range from 128.x to 191.x. IP class belongs to Class
C if the octet starts with bits 110. Class C has a range from 192.x to 223.x.
127.0.0.1 and localhost are the same things in most of the computer network functioning.
Q #20) What is the difference between the Internet, Intranet, and Extranet?
Answer: The terminologies Internet, Intranet, and Extranet are used to define how the
applications in the network can be accessed. They use similar TCP/IP technology but differ
in terms of access levels for each user inside the network and outside the network.
Internet: Applications are accessed by anyone from any location using the web.
Intranet: It allows limited access to users in the same organization.
Extranet: External users are allowed or provided with access to use the network
application of the organization.
DHCP environment requires DHCP servers to set-up the TCP/IP configuration. These
servers then assign, release and renew the IP addresses as there might be a chance that
network devices can leave the network and some of them can join back to the network.
SNMP is a part of the TCP/IP suite. There are 3 main versions of SNMP which include
SNMPv1, SNMPv2, and SNMPv3.
Q #25) What are the different types of a network? Explain each briefly.
Answer: There are 4 major types of networks.
Let’s take a look at each of them in detail.
1. Personal Area Network (PAN): It is the smallest and basic network type that is
often used at home. It is a connection between the computer and another device
such as phone, printer, modem tablets, etc
2. Local Area Network (LAN): LAN is used in small offices and Internet cafes to
connect a small group of computers to each other. Usually, they are used to transfer
a file or for playing the game in a network.
3. Metropolitan Area Network (MAN): It is a powerful network type than LAN. The
area covered by MAN is a small town, city, etc. A huge server is used to cover such
a large span of area for connection.
4. Wide Area Network (WAN): It is more complex than LAN and covers a large span
of the area typically a large physical distance. The Internet is the largest WAN which
is spread across the world. WAN is not owned by any single organization but it has
distributed ownership.
There are some other types of the network as well:
Storage Area Network (SAN)
System Area Network (SAN)
Enterprise Private Network (EPN)
Passive Optical Local Area Network (POLAN)
Q #26) Differentiate Communication and Transmission?
Answer: Through Transmission the data gets transferred from source to destination (only
one way). It is treated as the physical movement of data.
Communication means the process of sending and receiving data between two media (data
is transferred between source and destination in both ways).
1. Physical Layer: Deals with transmission and reception of unstructured data through
a physical medium.
2. Data Link Layer: Helps in transferring error-free data frames between nodes.
3. Network Layer: Decides the physical path that should be taken by the data as per
the network conditions.
4. Transport Layer: Ensures that the messages are delivered in sequence and without
any loss or duplication.
5. Session Layer: Helps in establishing a session between processes of different
stations.
6. Presentation Layer: Formats the data as per the need and presents the same to
the Application layer.
7. Application Layer: Serves as the mediator between Users and processes of
applications.
Q #33) Name the different types of network topologies and brief their advantages?
Answer: Network Topology is nothing but the physical or logical way in which the devices
(like nodes, links, and computers) of a network are arranged. Physical Topology means the
actual place where the elements of a network are located.
Logical Topology deals with the flow of data over the networks. A link is used to connect
more than two devices of a network. And more than two links located nearby form a
topology.
The advantage of bus topology is that it can be installed easily. And the disadvantage is that
if the backbone cable breaks then the whole network will be down.
b) Star Topology: In Star Topology, there is a central controller or hub to which every node
or device is connected through a cable. In this topology, the devices are not linked to each
other. If a device needs to communicate with the other, then it has to send the signal or data
to the central hub. And then the hub sends the same data to the destination device.
The advantage of the star topology is that if a link breaks then only that particular link is
affected. The whole network remains undisturbed. The main disadvantage of the star
topology is that all the devices of the network are dependent on a single point (hub). If the
central hub gets failed, then the whole network gets down.
c) Ring Topology: In Ring Topology, each device of the network is connected to two other
devices on either side which in turn forms a loop. Data or Signal in ring topology flow only in
a single direction from one device to another and reaches the destination node.
The advantage of ring topology is that it can be installed easily. Adding or deleting devices
to the network is also easy. The main disadvantage of ring topology is the data flows only in
one direction. And a break at a node in the network can affect the whole network.
d) Mesh Topology: In a Mesh Topology, each device of the network is connected to all
other devices of the network. Mesh Topology uses Routing and Flooding techniques for
data transmission.
The advantage of mesh topology is if one link breaks then it does not affect the whole
network. And the disadvantage is, huge cabling is required and it is expensive.
Q #36) In how many ways the data is represented and what are they?
Answer: Data transmitted through the networks’ comes in different ways like text, audio,
video, images, numbers, etc.
Audio: It is nothing but the continuous sound which is different from text and
numbers.
Video: Continuous visual images or a combination of images.
Images: Every image is divided into pixels. And the pixels are represented using
bits. Pixels may vary in size based on image resolution.
Numbers: These are converted into binary numbers and are represented using bits.
Text: Text is also represented as bits.
Q #37) What is the full form of ASCII?
Answer: ASCII stands for American Standard Code for Information Interchange.
Note: A Firewall cannot protect the system from viruses, spyware, adware, etc.
Q #44) Explain Beaconing?
Answer: If a network self-repair its problem then it is termed as Beaconing. Mainly, it is
used in the token ring and FDDI (Fiber Distributed Data Interface) networks. If a device in
the network is facing any problem, then it notifies the other devices that they are not
receiving any signal. Likewise, the problem gets repaired within the network.
Only the DHCP server will react to the message and assigns a new IP address to the newly
added device of the network. With the help of DHCP, IP management became very easy.
Q #47) How can a network be certified as an effective network? What are the factors
affecting them?
Answer: A network can be certified as an effective network based on below-
mentioned factors:
Performance: A network’s performance is based on its transmitted time and
response time. The factors affecting the performance of a network are hardware,
software, transmission medium types and the number of users using the network.
Reliability: Reliability is nothing but measuring the probability of failures occurred in
a network and the time taken by it to recover from it. The factors affecting the same
are the frequency of failure and recovery time from failure.
Security: Protecting the data from viruses and unauthorized users. The factors
affecting the security are viruses and users who do not have permission to access
the network.
Q #48) Explain DNS?
Answer: DNS stands for Domain Naming Server. DNS acts as a translator between domain
names and IP addresses. As humans remember names, the computer understands only
numbers. Generally, we assign names to websites and computers like Gmail.com, Hotmail,
etc. When we type such names the DNS translates it into numbers and executes our
requests.
Translating the names into numbers or IP address is named as a Forward lookup.