0% found this document useful (0 votes)
39 views117 pages

Mesh Topology: The Transport Layer Heart of

Uploaded by

kayla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views117 pages

Mesh Topology: The Transport Layer Heart of

Uploaded by

kayla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 117

100+ Networking Interview Questions and Answers (2023)

Here are Networking interview questions and answers for fresher as well as
experienced candidates to get their dream job.
The transport layer is the heart of the OSI model. The data is sent
through the physical layer to the application layer (at the sender's
end).
The Presentation layer is the sixth layer of the OSI model. It mainly
performs data translation, encryption & decryption, and compression
in the network. The presentation layer deals with the syntax and
semantics of the information exchanged between two systems.
crossover cable
Answer: The type of RJ45 UTP cable used between switches is
a crossover cable.
Physical layer is Located at the lowest layer of the Open Systems
Interconnection (OSI) communications mod. The Physical layer
change bits to electromagnetic signals.
The Session Layer is responsible for a range of functions including
opening, closing, and re-establishing session activities, authentication
and authorization of communication between specific apps and
servers, identifying full-duplex or half-duplex operations, and
synchronizing data streams.
The IPX/SPX protocol is based on the Open Systems
Interconnect (OSI) Model. IPX is the Network Layer (Layer 3 and 4)
and SPX is the Transport Layer (Layer 4) of the OSI Model.
mesh topology
A common example of mesh topology is the internet backbone, where
various internet service providers are connected to each other via
dedicated channels. This topology is also used in military
communication systems and aircraft navigation systems. For more,
refer to the Advantages and Disadvantages of Mesh Topology.

Basic Networking Interview Questions and Answers for Freshers


1) What is a Link?
A link refers to the connectivity between two devices. It includes the type of cables and
protocols used for one device to be able to communicate with the other.
2) What are the layers of the OSI reference model?
There are 7 OSI layers:
1) Physical Layer,
2) Data Link Layer,
3) Network Layer,
4) Transport Layer,
5) Session Layer,
6) Presentation Layer, and
7) Application Layer.
3) What is the backbone network?
A backbone network is a centralized infrastructure that is designed to distribute different
routes and data to various networks. It also handles the management of
4) What is a LAN?
LAN network
LAN stands for Local Area Network. It refers to the connection between computers and
other network devices that are located within a small physical location.
5) What is a node?
A node refers to a point or joint where a connection takes place. It can be a computer or
device that is part of a network. Two or more nodes are needed to form a network
connection.
6) What are routers?
Router
Routers can connect two or more network segments. These are intelligent network
devices that store information in its routing tables, such as paths, hops, and bottlenecks.
With this info, they can determine the best path for data transfer. Routers operate at the
OSI Network Layer.
7) What is a point to point link?
It refers to a direct connection between two computers on a network. A point to point
connection does not need any other network devices other than connecting a cable to
the NIC cards of both computers.
8) What is anonymous FTP?
Anonymous FTP is a way of granting user access to files in public servers. Users that
are allowed access to data in these servers do not need to identify themselves, but
instead, log in as an anonymous guest.
9) What is a subnet mask?
A subnet mask is combined with an IP address to identify two parts: the extended
network address and the host address. Like an IP address, a subnet mask is made up
of 32 bits.
10) What is the maximum length allowed for a UTP cable?
A single segment of UTP cable has an allowable length of 90 to 100 meters. This
limitation can be overcome by using repeaters and switches.
11) What is data encapsulation?
Data encapsulation is the process of breaking down information into smaller,
manageable chunks before it is transmitted across the network. In this process that the
source and destination addresses are attached to the headers, along with parity checks.
12) Describe Network Topology
Network Topology refers to the layout of a computer network. It shows how devices and
cables are physically laid out, as well as how they connect.
13) What is a VPN?
VPN means Virtual Private Network, a technology that allows a secure tunnel to be
created across a network such as the Internet. For example, VPNs allow you to
establish a secure dial-up connection to a remote server.
14) Briefly describe NAT
NAT is Network Address Translation. This is a protocol that provides a way for multiple
computers on a common network to share a single connection to the Internet.
15) What is the job of the Network Layer under the OSI reference model?
The Network layer is responsible for data routing, packet switching, and control of
network congestion. Routers operate under this layer.
16) How does a network topology affect your decision to set a network?
Network topology dictates what media you must use to interconnect devices. It also
serves as a basis on what materials, connectors, and terminations that is applicable for
the setup.
17) What is RIP?
RIP, short for Routing Information Protocol is used by routers to send data from one
network to another. It efficiently manages routing data by broadcasting its routing table
to all other routers within the network. It determines the network distance in units of
hops.
18) What are the different ways of securing a computer network?
There are several ways to do this. Install a reliable and updated anti-virus program on
all computers. Make sure firewalls are setup and configured correctly. User
authentication will also help a lot. All these combined would make a highly secured
network.
19) What is NIC?
NIC is short for Network Interface Card. This is a peripheral card that is attached to a
PC in order to connect to a network. Every NIC has its own MAC address that identifies
the PC on the network.
20) What is WAN?
WAN network
WAN stands for Wide Area Network. It is an interconnection of computers and devices
that are geographically dispersed. It connects networks that are located in different
regions and countries.
Computer Network Engineer Interview Questions and Answers for Experienced
21) What is the importance of the OSI Physical Layer?
The physical layer does the conversion from data bits to the electrical signal, and vice
versa. This is where network devices and cable types are considered and setup.
22) How many layers are there under TCP/IP?
There are four layers:
1) The Network Layer,
2) Internet Layer,
3) Transport Layer, and
4) Application Layer.
TCP/IP Layers
23) What are proxy servers, and how do they protect computer networks?
Proxy servers primarily prevent external users who are identifying the IP addresses of
an internal network. Without knowledge of the correct IP address, even the physical
location of the network cannot be identified. Proxy servers can make a network virtually
invisible to external users.
24) What is the function of the OSI Session Layer?
This layer provides the protocols and means for two devices on the network to
communicate with each other by holding a session. This includes setting up the session,
managing information exchange during the session, and tear-down process upon
termination of the session.
25) What is the importance of implementing a Fault Tolerance System?
A fault tolerance system ensures continuous data availability. This is done by
eliminating a single point of failure.
26) What does 10Base-T mean?
The 10 refers to the data transfer rate. In this case, it is 10Mbps. The word Base refers
to baseband, as opposed to broadband.
27) What is a private IP address?
Private IP addresses are assigned for use on intranets. These addresses are used for
internal networks and are not routable on external public networks. These ensure that
no conflicts are present among internal networks. At the same time, the same range of
private IP addresses is reusable for multiple intranets since they do not “see” each
other.
28) What is NOS?
NOS, or Network Operating System, is specialized software. The main task of this
software is to provide network connectivity to a computer in order to communicate with
other computers and connected devices.
29) What is DoS?
DoS, or Denial-of-Service attack, is an attempt to prevent users from being able to
access the Internet or any other network services. Such attacks may come in different
forms and are done by a group of perpetrators. One common method of doing this is to
overload the system server so it cannot anymore process legitimate traffic and will be
forced to reset.
30) What is OSI, and what role does it play in computer networks?
OSI (Open Systems Interconnect) serves as a reference model for data communication.
It is made up of 7 layers, with each layer defining a particular aspect of how network
devices connect and communicate with one another. One layer may deal with the
physical media used, while another layer dictates how data is transmitted across the
network.
31) What is the purpose of cables being shielded and having twisted pairs?
The primary purpose of this is to prevent crosstalk. Crosstalk’s are electromagnetic
interferences or noise that can affect data being transmitted across cables.
32) What is the advantage of address sharing?
By using address translation instead of routing, address sharing provides an inherent
security benefit. That’s because host PCs on the Internet can only see the public IP
address of the external interface on the computer. Instead, it provides address
translation and not the private IP addresses on the internal network.
33) What are MAC addresses?
MAC, or Media Access Control, uniquely identifies a device on the network. It is also
known as a physical address or an Ethernet address. A MAC address is made up of 6-
byte parts.
34) What is the equivalent layer or layers of the TCP/IP Application layer in terms
of the OSI reference model?
The TCP/IP Application layer has three counterparts on the OSI model: 1) Session
Layer, 2) Presentation Layer, and 3) Application Layer.
35) How can you identify the IP class of a given IP address?
By looking at the first octet of any given IP address, you can identify whether it’s Class
A, B, or C. If the first octet begins with a 0 bit, that address is Class A. If it begins with
bits 10 then that address is a Class B address. If it begins with 110, then it’s a Class C
network.
36) What is the main purpose of OSPF?
OSPF, or Open Shortest Path First, is a link-state routing protocol that uses routing
tables to determine the best possible path for data exchange.
37) What are firewalls?
Firewalls serve to protect an internal network from external attacks. These external
threats can be hackers who want to steal data or computer viruses that can wipe out
data in an instant. It also prevents other users from external networks from gaining
access to the private network.
38) Describe star topology
Star topology consists of a central hub that connects to nodes. This is one of the easiest
to set up and maintain.
Star Topology
Advantages:
Here are pros/benefits of start topology:
 Easy to troubleshoot, set up, and modify.
 Only those nodes are affected, that has failed. Other nodes still work.
 Fast performance with few nodes and very low network traffic.
 In Star topology, addition, deletion, and moving of the devices are easy.
Disadvantages:
Here are cons/drawbacks of using Star:
 If the Hub or concentrator fails, attached nodes are disabled.
 The cost of installation of star topology is costly.
 Heavy network traffic can sometimes slow the bus considerably.
 Performance depends on the Hub’s capacity
 A damaged cable or lack of proper termination may bring the network down.
39) What are gateways?
Gateways provide connectivity between two or more network segments. It is usually a
computer that runs the gateway software and provides translation services. This
translation is key in allowing different systems to communicate on the network.
40) What is the disadvantage of a star topology?
One major disadvantage of star topology is that once the central Hub or switch gets
damaged, the entire network becomes unusable.
41) What is SLIP?
SLIP, or Serial Line Interface Protocol, is an old protocol developed during the early
UNIX days. This is one of the protocols that are used for remote access.
42) Give some examples of private network addresses.
10.0.0.0 with a subnet mask of 255.0.0.0 172.16.0.0 with subnet mask of 255.240.0.0
192.168.0.0 with subnet mask of 255.255.0.0
43) What is tracert?
Tracert is a Windows utility program that can use to trace the route taken by data from
the router to the destination network. It also shows the number of hops taken during the
entire transmission route.
44) What are the functions of a network administrator?
A network administrator has many responsibilities that can be summarized into 3 key
functions:
1) installation of a network,
2) a configuration of network settings, and
3) maintenance/troubleshooting of networks.
45) What is the main disadvantage of a peer to peer network?
Accessing the resources that are shared by one of the workstations on the network
takes a performance hit.
46) What is a Hybrid Network?
A hybrid network is a network setup that makes use of both client-server and peer-to-
peer architecture.
47) What is DHCP?
DHCP is short for Dynamic Host Configuration Protocol. Its main task is to assign an IP
address to devices across the network automatically. It first checks for the next
available address not yet taken by any device, then assigns this to a network device.
48) What is the main job of the ARP?
The main task of the ARP or Address Resolution Protocol is to map a known IP address
to a MAC layer address.
49) What is TCP/IP?
TCP/IP is short for Transmission Control Protocol / Internet Protocol. This is a set of
protocol layers that is designed to make data exchange possible on different types of
computer networks, also known as a heterogeneous network.
50) How can you manage a network using a router?
Routers have a built-in console that lets you configure different settings, like security
and data logging. You can assign restrictions to computers, such as what resources it is
allowed access or what particular time of the day, they can browse the Internet. You can
even put restrictions on what websites are not viewable across the entire network.
51) What protocol can be applied when you want to transfer files between
different platforms, such as UNIX systems and Windows servers?
Use FTP (File Transfer Protocol) for file transfers between such different servers. This is
possible because FTP is platform-independent.
52) What is the use of a default gateway?
Default gateways provide means for the local networks to connect to the external
network. The default gateway for connecting to the external network is usually the
address of the external router port.
53) What can be considered as good passwords?
Good passwords are made up of not just letters, but by combining letters and numbers.
A password that combines uppercase and lowercase letters is favorable than one that
uses all upper case or all lower-case letters. Passwords must be not words that can
easily be guessed by hackers, such as dates, names, favorites, etc. Longer passwords
are also better than short ones.
54) What is the proper termination rate for UTP cables?
The proper termination for unshielded twisted pair network cable is 100 ohms.

55) What is netstat?


Netstat is a command-line utility program. It provides useful information about the
current TCP/IP settings of a connection.
56) What is the number of network IDs in a Class C network?
For a Class C network, the number of usable Network ID bits is 21. The number of
possible network IDs is 2 raised to 21 or 2,097,152. The number of host IDs per network
ID is 2 raised to 8 minus 2, or 254.
57) What happens when you use cables longer than the prescribed length?
Cables that are too long would result in signal loss. It means that data transmission and
reception would be affected because the signal degrades over length.
58) What common software problems can lead to network defects?
Software related problems can be any or a combination of the following:
 Client-server problems
 Application conflicts
 Error in configuration
 Protocol mismatch
 Security issues
 User policy and rights issues
59) What is ICMP?
ICMP is an Internet Control Message Protocol. It provides messaging and
communication for protocols within the TCP/IP stack. This is also the protocol that
manages error messages that are used by network tools such as PING.
60) What is Ping?
Ping is a utility program that allows you to check connectivity between network devices
on the network. You can ping a device by using its IP address or device name, such as
a computer name.
61) What is peer to peer?
P2P Network
Peer to peer (P2P) are networks that do not rely on a server. All PCs on this network act
as individual workstations.
62) What is DNS?
DNS is the Domain Name System. The main function of this network service is to
provide host names to TCP/IP address resolution.
63) What advantages does fiber optics have over other media?
One major advantage of fiber optics is that it is less susceptible to electrical
interference. It also supports higher bandwidth, meaning more data can be transmitted
and received. Signal degrading is also very minimal over long distances.

64) What is the difference between a hub and a switch?


Here is the major difference between Hub and switch:
Hub Switch
A hub operates on the physical layer. A switch operates on the data link layer.
Hubs perform frame flooding that can It performs broadcast, then the unicast and multicast as
be unicast, multicast, or broadcast. needed.
Just a singular domain of collision is Varied ports have separate collision domains.
present in a hub.
The transmission mode is Half-duplex The transmission mode is Full duplex
Hubs operate as a Layer 1 device per the Network switches help you to operate at Layer 2 of the
OSI model. OSI model.
To connect a network of personal Allow connecting multiple devices and ports.
computers should be joined through a
central hub.
Uses electrical signal orbits Uses frame & packet
Does not offer Spanning-Tree Multiple Spanning-Tree is possible
Collisions occur mostly in setups using No collisions occur in a full-duplex switch.
hubs.
Hub is a passive device A switch is an active device
A network hub can’t store MAC Switches use CAM (Content Accessible Memory) that
addresses. can be accessed by ASIC (Application Specific
Integrated Chips).
Not an intelligent device Intelligent device
Its speed is up to 10 Mbps 10/100 Mbps, 1 Gbps, 10 Gbps
Does not use software Has software for administration
65) What are the different network protocols that are supported by Windows
RRAS services?
There are three main network protocols supported: NetBEUI, TCP/IP, and IPX.
66) What are the maximum networks and hosts in class A, B, and C network?
For Class A, there are 126 possible networks and 16,777,214 hosts. For Class B, there
are 16,384 possible networks and 65,534 hosts. For Class C, there are 2,097,152
possible networks and 254 hosts
67) What is the standard color sequence of a straight-through cable?
Orange/white, orange, green/white, blue, blue/white, green, brown/white, brown.
68) What protocols fall under the Application layer of the TCP/IP stack?
The following are the protocols under the TCP/IP Application layer: FTP, TFTP, Telnet,
and SMTP.
69) You need to connect two computers for file sharing. Is it possible to do this
without using a hub or a router?
Yes, you can connect two computers, using only one cable. A crossover type cable can
be used in this scenario. In this setup, the data transmit pin of one cable is connected to
the data receive pin of the other cable, and vice versa.
70) What is ipconfig?
Ipconfig is a utility program that is commonly used to identify the addresses information
of a computer on a network. It can show the physical address as well as the IP address.
71) What is the difference between a straight-through and crossover cable?
A straight-through cable is used to connect computers to a switch, hub, or router. A
crossover cable is used to connect two similar devices, such as a PC to PC or Hub, to
the Hub.
72) What is the client/server?
Client/server is a type of network wherein one or more computers act as servers.
Servers provide a centralized repository of resources such as printers and files. Clients
refer to a workstation that accesses the server.
73) Describe networking.
Networking refers to the interconnection between computers and peripherals for data
communication. Networking can be done using wired cabling or through a wireless link.
74) When you move the NIC cards from one PC to another PC, does the MAC
address gets transferred as well?
Yes, that’s because MAC addresses are hard-wired into the NIC circuitry, not the PC.
This also means that a PC can have a different MAC address when another one
replaced the NIC card.
75) Explain clustering support
Clustering support refers to the ability of a network operating system to connect multiple
servers in a fault-tolerant group. The main purpose of this is the if one server fails, all
processing will continue with the next server in the cluster.
76) Where is the best place to install an Anti-virus program?
An anti-virus program must be installed on all servers and workstations to ensure
protection. That’s because individual users can access any workstation and introduce a
computer virus. You can plug in their removable hard drives or flash drives.
77) Describe Ethernet
Ethernet is one of the popular networking technologies used these days. It was
developed during the early 1970s and is based on specifications, as stated in the IEEE.
Ethernet is used in local area networks.
78) What are some drawbacks of implementing a ring topology?
In case one workstation on the network suffers a malfunction, it can bring down the
entire network. Another drawback is that when there are adjustments and
reconfigurations needed to be performed on a particular network, the entire network
must be temporarily brought down.

79) What is the difference between CSMA/CD and CSMA/CA?


CSMA/CD, or Collision Detect, retransmits data frames whenever a collision occurred.
CSMA/CA, or Collision Avoidance, will first broadcast intent to send prior to data
transmission.
80) What is SMTP?
SMTP is short for Simple Mail Transfer Protocol. This protocol deals with all internal
mail and provides the necessary mail delivery services on the TCP/IP protocol stack.
81) What is multicast routing?
Multicast routing is a targeted form of broadcasting that sends a message to a selected
group of the user instead of sending it to all users on a subnet.
82) What is the importance of Encryption on a network?
Encryption is the process of translating information into a code that is unreadable by the
user. It is then translated back or decrypted back to its normal readable format using a
secret key or password. Encryption ensures that information that is intercepted halfway
would remain unreadable because the user must have the correct password or key for
it.
83) How are IP addresses arranged and displayed?
IP addresses are displayed as a series of four decimal numbers that are separated by
period or dots. Another term for this arrangement is the dotted-decimal format. An
example is 192.168.101.2
84) Explain the importance of authentication.
Authentication is the process of verifying a user’s credentials before he can log into the
network. It is normally performed using a username and password. This provides a
secure means of limiting access from unwanted intruders on the network.
85) What is meaning by tunnel mode?
This is a mode of data exchange wherein two communicating computers do not use
IPsec themselves. Instead, the gateway that is connecting their LANs to the transit
network creates a virtual tunnel. So, it uses the IPsec protocol to secure all
communication that passes through it.
86) What are the different technologies involved in establishing WAN links?
 Analog connections – using conventional telephone lines
 Digital connections – using digital-grade telephone lines
 Switched connections – using multiple sets of links between the sender and
receiver to move data.
87) Explain Mesh Topology
The mesh topology has a unique network design in which each computer on the
network connects to every other. It is developing a P2P (point-to-point) connection
between all the devices of the network. It offers a high level of redundancy, so even if
one network cable fails, data still has an alternative path to reach its destination.

Types of Mesh Topology:


Partial Mesh Topology: In this type of topology, most of the devices are connected
almost similarly as full topology. The only difference is that few devices are connected
with just two or three devices.
Partially Connected Mesh Topology
Full Mesh Topology: In this topology, every node or device are directly connected with
each other.
Fully Connected Mesh Topology
88) When troubleshooting computer network problems, what common hardware-
related problems can occur?
A large percentage of a network is made up of hardware. Problems in these areas can
range from malfunctioning hard drives, broken NICs, and even hardware startups.
Incorrect hardware configuration is also one of those culprits to look into.
89) How can you fix signal attenuation problems?
A common way of dealing with such a problem is to use repeaters and hubs because it
will help regenerate the signal and therefore prevent signal loss. Checking if cables are
properly terminated is also a must.
90) How does dynamic host configuration protocol aid in network administration?
Instead of having to visit each client computer to configure a static IP address, the
network administrator can apply dynamic host configuration protocol to create a pool of
IP addresses known as scopes that can be dynamically assigned to clients.
91) Explain profile in terms of networking concepts
Profiles are the configuration settings made for each user. A profile may be created that
puts a user in a group, for example.
92) What is sneakernet?
Sneakernet is believed to be the earliest form of networking wherein data is physically
transported using removable media, such as disk, tapes.
93) What is the role of the IEEE in computer networking?
IEEE, or the Institute of Electrical and Electronics Engineers, is an organization
composed of engineers that issues and manages standards for electrical and electronic
devices. This includes networking devices, network interfaces, cablings, and
connectors.
94) What protocols fall under the TCP/IP Internet Layer?
There are 4 protocols that are being managed by this layer. These are ICMP, IGMP, IP,
and ARP.
95) When it comes to networking, what are rights?
Rights refer to the authorized permission to perform specific actions on the network.
Each user on the network can be assigned individual rights, depending on what must be
allowed for that user.
96) What is one basic requirement for establishing VLANs?
A VLAN is required because at the switch level. There is only one broadcast domain. It
means whenever a new user is connected to switch. This information is spread
throughout the network. VLAN on switch helps to create a separate broadcast domain
at the switch level. It is used for security purposes.
97) What is IPv6?
IPv6, or Internet Protocol version 6, was developed to replace IPv4. At present, IPv4 is
being used to control internet traffic but is expected to get saturated in the near future.
IPv6 was designed to overcome this limitation.
98) What is the RSA algorithm?
RSA is short for the Rivest-Shamir-Adleman algorithm. It is the most commonly used
public-key encryption algorithm in use today.
99) What is mesh topology?
Mesh topology is a setup wherein each device is connected directly to every other
device on the network. Consequently, it requires that each device has at least two
network connections.
100) what is the maximum segment length of a 100Base-FX network?
The maximum allowable length for a network segment using 100Base-FX is 412
meters. The maximum length for the entire network is 5 kilometers.

101) What is the 5-4-3 rule, and in which architecture is it used?


The 5-4-3 rule is used in 10Base2 and 10Base5 Ethernet architectures. In this rule,
there can be a maximum of five segments in a network connected with four repeaters.
Out of these five segments, only three segments can be populated with nodes.
102) What is the difference between TCP and UDP?
Here are some major differences between TCP and UDP protocols:
TCP UDP
It is a connection-oriented protocol. It is a connectionless protocol.
TCP reads data as streams of bytes, and the message is UDP messages contain packets
transmitted to segment boundaries. that were sent one by one. It also
checks for integrity at the arrival
time.
TCP messages make their way across the Internet from one It is not connection-based, so one
computer to another. program can send lots of packets
to another.
TCP rearranges data packets in the specific order. UDP protocol has no fixed order
because all packets are
independent of each other.
The speed for TCP is slower. UDP is faster as error recovery is
not attempted.
Header size is 20 bytes The header size is 8 bytes.
TCP is heavy-weight. TCP needs three packets to set up a socket UDP is lightweight. There are no
connection before any user data can be sent. tracking connections, ordering of
messages, etc.
TCP does error checking and also makes error recovery. UDP performs error checking, but
it discards erroneous packets.
Acknowledgment segments No Acknowledgment segments
Using handshake protocol like SYN, SYN-ACK, ACK No handshake (so connectionless
protocol)
TCP is reliable as it guarantees delivery of data to the destination The delivery of data to the
router. destination can’t be guaranteed in
UDP.
TCP offers extensive error checking mechanisms because it UDP has just a single error
provides flow control and acknowledgment of data. checking mechanism that is used
for checksums.
103) What are the important elements of the protocol?
Here, are three most important elements of the protocol:
 Syntax: It is the format of the data. It is an order the data is displayed.
 Semantics: It describes the meaning of the bits in each section.
 Timing: What time the data is to be sent and how fast it is to be sent.
104) What is the maximum segment length of a 100Base-FX network?
The maximum length for a network segment using 100Base-FX is 412 meters.
105) What is a Decoder?
The decoder is a type of circuit that converts the encoded data to its original format. It
also converts the digital signal into an analog signal.
106) What is Brouter?
Brouter is also known as Bridge Router. It is a device that acts as both a bridge and a
router. As a bridge can forward data between the networks. It also routes the data to
specified systems within a network.
107) How to use VPN?
By using a Virtual Private Network (VPN), users can connect to the organization’s
network. Corporate companies, educational institutions, government offices.
108) Why the standard OSI model is known as 802.xx?
The OSI model was started in February 1980. In 802.XX, ’80’ stands for the year 1980,
and ‘2’ represents the month of February.
109) What is NVT (Network Virtual Terminal)?
NVT is a set of pre-defined rules to very simple virtual terminal interaction. This terminal
helps you to start a Telnet session.
110) What is the source route?
The source route is a sequence of IP addresses that helps you to identify the route a
datagram. You can include the source route in the IP datagram header.
111) Explain the term Pipelining
Pipelining describes the sequencing of processes. When any new task begins before an
ongoing task is finished, it is called sequencing.
112) Which measurement unit is used to measure the transmission speed of Ethernet?
The transmission speed of Ethernet is mostly measured in Mbps.
113) What is the maximum length of Thinnet cable?
The length of the Thinnet cable is 185 meters.
114) Which cable is also called as the RG8 cable?
Thicknet cable is also called as the RG8 cable.
115) Is coaxial cable still used in the computer network?
No, Nowadays, coaxial cable no longer used in a computer network.
116) Which cable uses the RJ11 connector?
Most of the telephone cable uses the RJ11 connector.
117) Explain Multi-Homed Host
It is a host that has multiple network interfaces that multiple IP addresses is called a
Multi-Homed Host.
118) Explain EGP
The full form of EGP is Exterior Gateway Protocol. It is the protocol of the routers. It is
the neighboring autonomous systems that help you to identify the set of networks that
you will able to reach within or via each independent system.
119) Explain the term Passive Topology
When a computer in the network listen and receive the signal, they are called passive
topology.
120) What is the use of a Pseudo TTY?
It is a false terminal which allows you external machines to connect through Telnet or
log in. Without this, no connection can take place.
121) Explain Redirector
Redirector is a kind of software which intercepts file or prints I/O requests and translates
them into network requests. This component comes under the presentation layer.
122) What Is TCP Three-Way Handshake?
TCP Three-Way Handshake
THREE-WAY handshake or a TCP 3-way handshake is a process that is used in a
TCP/IP network to make a connection between the server and client. It is a three-step
process that requires both the client and server to exchange synchronization and
acknowledgment packets before the real data communication process starts.
123) What is a Hamming code?
Hamming code is a liner code that is useful for error detection up to two immediate bit
errors. It is capable of single-bit errors.
In Hamming code, the source encodes the message by adding redundant bits in the
message. These redundant bits are mostly inserted and generated at certain positions
in the message to accomplish the error detection and correction process.
124) What is the Application of Hamming code?
Here are some common applications of using Hemming code:
 Satellites
 Computer Memory
 Modems
 PlasmaCAM
 Open connectors
 Shielding wire
 Embedded Processor
125) What are the benefits of the Hamming code?
Here, are important benefits of Hamming code
 The Hamming code method is effective on networks where the data streams are
given for the single-bit errors.
 Hamming code not only provides the detection of a bit error but also helps you to
indent bit containing error so that it can be corrected.
 The ease of use of hamming codes makes it suitable for use in computer
memory and single-error correction.
126) What is a MAC Address?
MAC address is a unique identifier that is assigned to a NIC (Network Interface
Controller/ Card). It consists of a 48 bit or 64-bit address, which is associated with the
network adapter. MAC address can be in hexadecimal format. The full form of MAC
address is Media Access Control address.
127) Why Use MAC Address?
Here are the important reasons for using MAC address:
 It provides a secure way to find senders or receivers in the network.
 MAC address helps you to prevent unwanted network access.
 MAC address is a unique number. Hence it can be used to track the device.
 Wi-Fi networks at the airport use the MAC address of a specific device in order to
identify it.
128) What are the types of MAC Addresses?
Here are the important types of MAC addresses:
 Universally Administered Address UAA (Universally Administered Address) is the
most used type of MAC address. It is given to the network adapter at the time of
manufacturing.
 Locally Administered Address LAA (Locally Administered Address) is an address
that changes the MAC address of the adapter. You may assign this address to a
device used by network administrator.
129) What are the important differences between MAC address and IP address
Here, are some difference between MAC and IP address:
MAC IP address
The MAC address stands for Media Access Control IP address stands for Internet Protocol
Address. Address.
It consists of a 48-bit address. It consists of a 32-bit address.
MAC address works at the link layer of the OSI model. IP address works at the network layer of
OSI model.
It is referred to as a physical address. It is referred to as a logical address.
You can retrieve the MAC address of any device using You can retrieve the MAC address of any
ARP protocol. device RARP protocol.
Classes are not used in MAC address. In IP, IPv4 uses A, B, C, D, and E classes.
130) What is an Analog Signal?
Analog signal is a continuous signal in which one time-varying quantity represents
another time-based variable. These kind of signals works with physical values and
natural phenomena such as earthquake, frequency, volcano, speed of wind, weight,
lighting, etc.
131) What is a Digital Signal?
A digital signal is a signal that is used to represent data as a sequence of separate
values at any point in time. It can only take on one of a fixed number of values. This
type of signal represents a real number within a constant range of values.
132) What are the differences between analog and digital signal?
Here are the main differences between Analog and Digital Signal:
Analog Digital
An analog signal is a continuous signal that represents Digital signals are time separated signals
physical measurements. which are generated using digital
modulation.
It is denoted by sine waves It is denoted by square waves.
It uses a continuous range of values that help you to The Digital signal uses discrete 0 and 1
represent information. to represent information.
The analog signal bandwidth is low The digital signal bandwidth is high.
Analog hardware never offers flexible implementation. Digital hardware offers flexibility in
implementation.
It is suited for audio and video transmission. It is suited for Computing and digital
electronics.
The Analog signal doesn’t offer any fixed range. Digital signal has a finite number, i.e., 0
and 1.
133) What is MAN?
A Metropolitan Area Network or MAN is consisting of a computer network across an
entire city, college campus, or a small region. This type of network is large than a LAN,
which is mostly limited to a single building or site. Depending upon the type of
configuration, this type of network allows you to cover an area from several miles to
tens of miles.
134) What is Modem?
A modem (modulator-demodulator) is a device that modulates an analog signal to digital
information. It also decodes carrier signals to demodulates the transmitted information.
The main aim of the Modem is to produce a signal that can be transmitted easily and
decoded to reproduce the digital data in its original form. Modems are also used for
transmitting analog signals, from Light Emitting Diodes (LED) to radio.
135) What are the advantages of a Modem?
Here, are pros/advantage of Modem:
 More useful in connecting LAN with the Internet
 Speed depends on the cost
 The Modem is the most widely used data communication roadway.
These interview questions will also help in your viva(orals)
Network Devices – Hub, Repeater, Bridge, Switch, Router,
Gateways
Computer Network Devices – Hub, Switch, Repeater, Bridge,
Router

Network Devices or Networking Hardware are physical devices that are required are
communication and interaction between hardware on a computer network.
Types of Computer Network Devices: –

There are common hardware devices used in networking –

• NIC • Gateway
• Repeater • Modem
• Hub • Access Point
• Bridge • Brouter
• Switch
NIC(Network Interface Card): –
NIC stands for Network Interface Card. It is also known as Network Controller or LAN
card or Ethernet Card.
Characteristics: –
• A Network Interface Card is a Hardware device that is used to connect a node to a
network.
• It works on the Physical layer of the OSI model.
• It is used the MAC address for data transfer.
• It is 2 types – Wired & Wireless.
Manufacturer Company: Intel, D-link, Link Sys, HP, Rosewill, Trendnet etc.
Repeater: –
The repeater is a network device used to Regenerate or Replicate a signal.
Characteristics: –
• It is a Physical layer device of OSI model.
• It transmits the data form of Bits or Signal.
• It is an Amplifier or Regenerates the signal.
• It is 2 types – Analog and Digital.
Manufacturing Company: Motorola, Microtel etc.
Hub: –
Hub is a centralized device that connects multiple devices in a single LAN network.
Characteristics: –
• It works on the physical layer of the OSI model.
• It has a maximum of 24 ports.
• It is a Half-duplex device.
• It transmits the data in the form of Bit or Signals.
• It is a single Broadcast Domain & single Collision Domain.
• It is not storing the MAC address.
• It acts as a Repeater.
• It can be used both Digital & Analog signals.
• It is a Broadcast device.
• There are 2 types of Hub – Active Hub and Passive Hub.
• Hub cannot filter the data, so data packets are sent to all the connected devices.
• It has no intelligence that’s why it is not to find out the best path for data packets.
Manufacturer Company: D-Link, TP-Link, Cisco etc.
Bridge: –
The Bridge is a Data Link layer device used to connect multiple LAN segments.
Characteristics: –
• It is a Data Link layer device of the OSI model.
• It is used to connect multiple LAN segments.
• It has 2 Collision Domain.
• It is transferring the Frame by used to MAC address.
Manufacturer Company: Cisco, D-Link etc.
Switch: –
The Switch is an intelligent device which used to connect multiple LAN segments.
Characteristics: –
• It is a Data Link layer device of the OSI model.
• It has maximum of 48 ports.
• It is a Full-duplex device.
• It is the first Broadcast and then Multicast or Unicast.
• It is a single Broadcast Domain & multiple Collision Domain.
• It is transmitted Frame.
• It is maintaining the MAC table.
• It is an intelligent device.
• It is used packet switching technology to receive, store and forward data packets on the
network.
Manufacturer Company: Cisco, Netgear, TP-Link, D-Link, Juniper etc.
Gateway: –
A Gateway is a network device that connects two different networks.

Characteristics: –
• It works on the Transport & Session layer of OSI model.
• It provides translation between OSI and TCP/IP.
• Example – E-mail Gateway, GSNW Gateway, PAD Gateway.
Router: –
Router is used to connect two or more different networks and the Internet Service
Provider (ISP).
Characteristics: –
• It works on the Network layer of the OSI model.
• It is an Inter-Networking device.
• It is used IP address.
• It is maintaining the Routing table.
• It is a transmitting Packet.
Manufacturer Company: TP-Link, Cisco, Netgear, Linksys, etc.
Modem: –
Modem stands for Modulator-Demodulator.

Characteristics: –
• It is a network device that help to transmits the data over the Telephone or Cable line.
• It converts the Digital signal to Analog signal and Analog signal to Digital signal.
• It is 2 types – Internal & External Modem.
Manufacturer Company: Netgear, TP-Link, Motorola.
Access Point(AP): –
An Access Point (AP) is a device that creates a wireless local area network or WLAN in
an office or large buildings.
Characteristics: –
• It works on the Data Link layer of the OSI model.
• It is connected to Wired Router, Switch or Hub via Ethernet cable.
Brouter: –
It combines features of Bridge & Router.
Characteristics: –
• It works on the Data Link layer and Network layer of the OSI model.
• Its forward data between the network and it routes the data to a specified system in a
network.
INTERVIEW QUESTIONS
Q. What is CSU/DSU?
Ans: – The Channel Service Unit/ Data Service Unit is a digital interface to connect
end-point equipment.

Example – Modem, Network Interface Card.


Q. What is Collision Domain?
Ans: – A Collision Domain is a part of a network where packet collision can occur. A
Collision occurs where two devices send a packet at the same time on the shared
network segment.
Q. What is Broadcast Domain?
Ans: – A Broadcast Domain is a division of a computer network, in which all nodes can
reach each other by broadcast at the Data Link layer of the OSI model.
Q. What is CSMA/CD?
Ans: – Short form Carrier Sense Multiple Access/ Collision Detection.
CSMA/CD is a MAC protocol. It defines how network devices respond when two device
attempts to use a data channel simultaneously.
Q. What is CSMA/CA?
Ans: – Carrier Sense Multiple Access with Collision Access (CSMA/CA) in computer
networking, is a network multiple access method in which carrier sensing in used but
not nodes attempt to avoid collision by beginning transmission only after the channel is
sensed to be idle.
Q. What is Hub?
Ans: – A Hub works on the Physical layer of the OSI model. It connects multiple
devices together in a single network segment. A Hub is also called as a Multiport
Repeater. It is a Half-duplex device.
Q. What is Switch?
Ans: – A Switch works on the Data Link layer of the OSI model. It connects multiple
devices together in a single network segment. It is called an Intelligent network device
because it creates its own MAC address table to forward the Frame to the particular
destination. It is a Full-duplex device.
Q. What is Router?
Ans: – A Router works on the Network layer of the OSI model. A Router sends or
forwards the packets to the destination network using a routing table to find the best
route.
Q. How many Collision Domains and Broadcast Domains are there in Switch?
Ans: – As many ports there in a Switch that many Collision Domains are there.
Example – Switch has 24 ports has 24 Collision Domains but only 1 Broadcast Domain
is there in Switch.
Q. What is the main difference between Bridge and Switch?
Ans: – Bridge can create Collision Domains but cannot create Broadcast Domains, but
in Switch in every node will separate Collision Domains.
Q. What is Gateway?
Ans: – A Gateway is a network node that connects two networks in different protocols
or other words, the exit point of any network is called a Gateway.
Example – A Router can act as a Gateway to reach another network.
Q. What is a Default gateway?
Ans: – A Default Gateway as an Access Point. Default mins simply, that this Gateway is
used by default. If we don’t have a Default Gateway, you cannot communicate with
another network.
Q. What is Different between Hub and Switch?
Ans: –
Hub Switch
Hub is a Physical layer device of OSI model Switch is a Data Link layer device of OSI model.
Hub transfer data in Half duplex mode. Switch transfer the data in Full duplex mode.
Hub cannot learn MAC address. Switch stores MAC address.
Hub transfer the data in Signal or Bits. Switch transfer the data in Frame (L2 Switch) &
Packet (L3 Switch).
Hub is a Broadcast device. Switch is a Unicast device.
Hub create single Collision Domain & Single Switch create multiple Collision Domain and single
Broadcast Domain. Broadcast Domain.

Q. What is Different between Switch and Router?


Ans: –

Switch Router
It is a LAN device. It is a WAN device.
It is a Networking device. It is an Inter-networking device.
It works on the Data Link layer. It works on the Network layer.
Switch has one Broadcast Domain. In router, every port has its own Broadcast Domain.
It is uses the MAC address. It uses an IP address.
It transmits Frame. It transmits Packet.
It is maintaining the CAM table It is maintaining the Routing table.
(Content Accessible memory).
Its manufacturers are Cisco, D-Link, Its manufacturers are Cisco, Netgear, Asus, D-Link, TP-Link.
Juniper.

Q. What is Different between Router and Layer-3 Switch?


Ans: –
Router Layer – 3 switch
It is used for WAN. It is used in LAN.
It is Software based forwarding decision. It is Hardware based forwarding decision.
It provides MPLs and VPN services. It does not provide MPLs and VPN services.
It supports Edge technology.Ex- NAT, Firewall. It does not support Edge technology.
Its cost is high. Its cost is Low.
Its port density is Low. Its port density is high.
It is slow. It is Faster than Router.
Q. What is Different between Layer- 2 Switch and Layer- 3 Switch?
Ans: –
L-2 Switch L-3 Switch
It works on the Data Link layer of ISO/OSI It works on both the Network & Data Link layer of
model. ISO/OSI model.
It does switching only. It does both switching & routing.
It is used the MAC address. It is used IP & MAC addresses.
It is maintaining the MAC table. It is maintaining MAC & routing table.
Example – 2900 series switches. Example – 3500, 4500, 6500, series switch.
Computer Network Transmission Mode
Duplex or Transmission Mode:
Transmission Mode or Duplex means transferring of data between two devices. It is also
known as Communication Mode.
The Transmission Mode is divided into 3 categories –
• Simplex Mode
• Half-duplex Mode
• Full-duplex Mode
Simplex Mode: –
• It is a Unidirectional Communication; the data transmits in one direction only from
one device to another device.
• The sender device that sends data can only but cannot received the data. Other hand
the receiver device that receive only the data but cannot send the data.
• Example: – T.V. and Keyboard.
Advantages of Simplex Mode: –
• The main advantages of Simplex mode are that the full capacity of the transmission
medium is utilized during the transmission, there are no any traffic issues.
Disadvantages of Simplex Mode:
• There are no possibilities of Bio-directional communication. Here two devices cannot
communicate with each other.
Half-duplex Mode:
• It is a Bio-directional transmission but one at a time.
• When the sender in sending the data receiver can only receive, they cannot send at the
same time and vice versa.
• Example: – Walkie-talkie.
Advantages of Half-duplex Mode:
• The main advantages of the Half-duplex mode are that they can utilize the entire
bandwidth during the transmission.
Disadvantages of Half-duplex Mode:
• In Half-duplex mode, when one device sending the data, then another device receiving
the data, then another device waits, they can be some delay at the time.
Full-duplex Mode: –
• It is a Bio-directional communication.
• Both devices sending and receiving data at the same time.
• Example: – Telephone network.
Advantages of Full-duplex mode: –
• No delay in communications both devices can send and receive data at the same time.
Disadvantages of Full-duplex mode: –
• The full capacity is divided by into both directions.
Comparison of Simple, Half-duplex and Full-duplex mode:
Simple Half-duplex Full-duplex
It is a Unidirectional It is a Bi-directional communication It is Bio-directional
communication. but one at a time. communication both at a time.
The sender can only send The sender can only send and receive The sender can send and
the data. data, but one at a time. receive data both at a time.
It is the worst performing It is better than Simplex. It is the best performing mode
mode in transmission mode. of transmission mode.
Its example of Keyboard & Its an example of a Walkie-talkie. Its example of Telephone.
Monitor.
OSI Model
Definition of OSI Model:
The Open System Interconnection model (OSI Model) is a conceptual model which
describes how data flow from one system to another system of hardware and software
configuration.
Characteristics:
• OSI stands for Open System Interconnection.
• OSI model developed by ISO (International Organization for Standardization) in 1984,
that’s why it is also called ISO/OSI reference model.
• It also defines the inter-operability between the vendor.
• The ISO/ OSI reference model consists of 7 layers –
The OSI layer is divided into 2 groups –
a. Upper Layer/ Software Layer: – It defines how applications communicate
with each other.
b. Lower Layer/ Hardware Layer: – It defines how the data transmission
between end-to-end devices.
Advantages of the OSI model:
• It provides a common language or reference point in computer networking.
• It helps in troubleshooting.
• It provides standards interoperability between network and devices.
• It supports connectionless and connection-oriented services.
Disadvantages of OSI model:
• It is a theoretical concept; it is not implemented in real function.
• You can only use it as a reference model.
• It has does not define any specific protocol.
The function of OSI Layers:
There are 7 layers –
Physical Layer:
Characteristics: –
• The lowest layer of the OSI reference model is the Physical Layer.
• It is responsible for the actual physical communication between the device.
• Here data unit is Bits or Signal.
• Hub or Repeater works on Physical Layer.
• Data travel in Physical layer transmission medium like as Copper, Optical Fiber
cable or Radio Frequency.
Function: –
• It defines the mode of transmission between the two devices in the network whether it
is Simplex, Half-duplex or Full-duplex mode.
• It defines how are the devices are connected with each other in a network, ex- Bus,
Star, Mesh Topology.
• It is also defining the rate of transmission.
Data Link Layer:
Characteristics: –
• The Data Link Layer receives data from the Network layer.
• It adds the Header and Trailer to the data.
• Data unit is called as Frame.
• Bridges or Switches are works on Data link Layer.
• It works on Physical address or MAC address.
• It is divided in 2 sub layers –
a. LLC (Logical Link Control):
• LLC is the sublayer of Data Link Layer.
• LLC is the upper layer of Data Link Layer provide interface to the Network layer.
• It is responsible for handling multiple layer-3 protocols.
• It provides link services like Flow Control and Error notification.
b. MAC (Media Access Control)
• MAC is a sublayer of Data Link Layer.
• It is responsible for Framing of data and Media Access Control.
Function: –
• Framing is a function of Data Link Layer.
• The Data Link Layer adds the Physical address of the sender and receiver.
• The main function of data Link Layer is Flow Control.
• The Data Link Layer provides error controls in which it detects damage or lost frames.
Network Layer:
Characteristics: –
• The Network Layer adds a Header that includes the Logical address (IP address) of the
source and destination.
• The data unit at this layer is Packet.
• Routers are work on Network Layer.
• It is responsible for end-to-end delivery of Packets.
• Here working protocols are IP and IPv6.
• It is responsible for routing and forwarding the packets.
Function: –
• The main function of the Network Layer as an Internetworking.
• It provides Logical Addressing which means it add the source and destination address
to the Header of the Frame.
• It provides the Routing which helps the best path from source to destination.
• It provides packeting of data.
Transport Layer:
Characteristics: –
• Transport Layer is used for delivering the data from source to destination.
• The data unit at this layer is known as a Segment.
• The main protocols are used in Transport layer are TCP & UDP, and other is SPX.
• It provides acknowledgement of the successful data transmission and re-transmits the
data if any error.
• It provides error control the data.
• It works connection orientation & connection less transmission.
• Transport layer is called as Heart of OSI model.
Function: –
• It provides service-point-addressing.
• It provides Segmentation and Reassemble.
• It provides Flow Control.
• It is also responsible for error control.
Session Layer:
Characteristics: –
• The Session Layer is responsible for establishment of connection and maintained of
session between communication device.
• Session Layer is also responsible for session check pointing and recovery.
• It provides Simplex, Half-duplex and Full-duplex services.
• This layer also responsible for all the importance log-on or password validation.
Function: –
• It establishes, maintains and ends a session between the connection device.
• Its synchronization of the data.
• Its control the dialog, when two system to start communication with each other in
Half-duplex, Full-duplex or Simplex mode.
Presentation Layer:
Characteristics: –
• The Presentation Layer is responsible for syntax and semantics of dT exchanged
between two devices.
• It is responsible for translation and encoding.
• It is also responsible for data compression, encryption and decryption.
• This layer transform data into the form which is accepted by the Application layer.
• It is also called as the Syntax Layer.
• Here used protocol is SSL (Secure Socket Layer).
Function: –
• Its main function is Data translation, Ex – ASCII to EBCDIC format.
• Its Encryption or Decryption the data.
• It’s another function is data compression.
Application Layer:
Characteristics: –
• The highest layer of the OSI reference model is the Application Layer.
• Application Layer provides the interface between user and the internet server.
• The Application Layer supplies network services to end-user application.
• In Application Layer, user access to different services different protocol there.
• Here use protocols are – HTTP, FTP, POP, SMTP, DNS etc.
Function: –
• In Application Layer provides user file transfer, access host computer or
remotely computer.
• It provides mail-services.
INTERVIEW QUESTIONS
Extended Binary Coded Decimal
Interchange Code (EBCDIC)
Q. What is Synchronization?
 Headers are information structures which identifies the information that
follows, such as a block of bytes in communication.
 Trailer is the information which occupies several bytes at the end of the
block of the data being transmitted.
What is header and trailer in OSI model?
Data added to the front is called a header, while data added to the end is called a trailer. When
information is received by a host, the process is reversed. Headers and trailers are removed as
the data moves back up the layers until eventually the original information is left for the
application to use.

Ans: – In Session Layer, sender to receiver a common point to check how


much data has been delivered successfully and how much read to transmits
which save the times and improve the performance of the network, this
process is called as Synchronization.

Q. What is Port Address?
Ans: – A computer can run multiple processes at a time and every process is identify by
a unique number is called as Port Address.
Q. In which layer Header is not added and why?
Ans: – in Physical Layer Header is not added because devices are connected with each
other directly to the Physical Layer.
Q. In which layer trailer is added?
Ans: – In Data Link Layer Trailer is added for error deduction and correction.
Q. What is PDU (Protocol Data Unit)?
Ans: – Data format in every layer is called as PDU.
Q. What is Encapsulation?
Ans: – In OSI model, data flow an upper layer to a lower layer result in conversion of
data to a lower layer format with the addition of the lower header, this process is called
Encapsulation.
Q. What is Decapsulation?
Abs: – In OSI model, when data flow from a lower layer to an upper layer, data is
converted to the upper layer data format and the lower layer header is discarded, this
process is called as Decapsulation.
Q. What is MTU?
Ans: – The biggest bundle that can be sent through an information connection layer is
as the Maximum Transmission Unit (MTU).
Q. What is Flow Control?
Ans: – TCP has a mechanism of managing and tracking the amount of data transferred.
This is called as Flow Control. It is function of the Transport Layer of OSI model.
Q. What is Windowing?
Ans: – Windowing is the size or group of data segment which acknowledges the size of
data that can be received by the receiver in its buffer memory.
Q. What is XDR?
Ans: – XDR (External Data Representation) is a standard for data encoding and
description. It allows data transfer between kinds of computer architecture and
operating systems.
Q. What is the different between Half-duplex & Full-duplex mode?
Ans: – In Half-duplex mode data can be transmits in both direction but not
simultaneously. At a time, data can be flow only one direction. Ex – Hub.
But, in Full-duplex data can transmits in both direction at the time simultaneously. Ex –
Switch.
Q. What is frame?
Ans: – The Data Link Layer formats the message into divided peace, each peace is
called a Data Frame.
Q. What are the different between the MAC sublayer and LLC sublayer?
Ans: – MAC stands for Media Access Control. MAC address works on Data Link Layer.
This layer controls the permission of data to transmit it.
LLC stand for Logical Link Control. This layer controls Frame Synchronization, Flow
Control and Error Control.
Q. What are the function of Data Link Layer?
Ans: – Framing, Error Checking, CRC, Physical Addressing.
Q. What are the function of Network Layer?
Ans: – Routing, IP Addressing, Path Determination.
Q. What are the function of Transport Layer?
Ans: – Segmentation, Re-assembly, Flow Control, Error Checking etc.
Q. Which layer is responsible for process to process delivery?
Ans: – Transport Layer.
The transport layer is responsible for process-to- process delivery—the delivery of a
packet, part of a message, from one process to another.
Q. Which address identify a process on a host?
Ans: – Port Address.
Q. Which layer provides the services to user?
Ans: – Application Layer.
Q. Which layer decided by transmission data rates?
Ans: – Physical Layer.
Q. CRC stands for?
Ans: – Cyclic Redundancy Check.
Q. Which layer is example of virtual terminal?
Ans: – Application Layer.
Q. Which of the OSI layer works Routers?
Ans: – Network Layer.
Q. Switches work at which OSI layer?
Ans: – Data Link Layer and some Switches works on Network layer.
Q. What is the name of PDU in Data Link Layer?
Ans: – Frame.
Q. What is the name of PDU in Network Layer?
Ans: – Packet.
Q. in which layer Segment is used?
Ans: – Transport Layer.
Q. What are the uses protocols are in Application Layer?
Ans: – HTTP, HTTPS, SSH, FTP, TFTP, DHCP etc.
Q. What is CRC?
Ans: – Cyclic Redundancy Check is used to checking errors in network. It is work at
Data Link layer sublayer of LLC.
Q. Which layer is used to segment and resembles the data?
Ans: – Transport Layer.
Q. Which layer is responsible for creating and terminating sessions
between applications?
Ans: – Session layer.
Q. What is the difference between Flow Control & Error Control?
Ans: – Flow Control controls the rate of transmission while Error Control checks and
corrects errors in the data bits and packets.
Q. What is Segmentation?
Ans: – The process of breaking the data stream into smaller pieces is called
Segmentation.
Q. OSI Model layer, Function and Protocols: –
Layer Name Function Protocols
Physical Layer To transmits over a medium like Copper, Optical 10 Base TX, ISDN,
Fiber Cable, Radio Waves. RS232.
Data Link Layer It handles data transfer between the Network and PPP, Frame Relay.
Physical layer.
Network Layer It provides IP address of the source and destination. IPv4, IPv6, MPLS.
Transport Layer The Transport layer is to be delivered the entire TCP, UDP, SPX.
message from source to destination.
Session Layer To establish, manage and terminate the session. Net-BIOS.
Presentation To translate, encrypt and compress the data. SSL, YLS.
Layer
Application It supplies network services to the end-user SMTP, HTTP. FTP.
Layer applications. POP3, SNTP etc.
Q. Details of OSI Model?
cisco router, ports, function
CCNA Routing – Types of Ports in Router

Routing:
The process of transferring the data packet from a source to the destination is called as
Routing.
Router:
Router is used to connect two or more different networks and different geographical
location.
Characteristics: –
• It is a Network layer device of ISO/OSI model.
• It is an inter-networking device.
• It is used IP address.
• It is maintained Routing table.
• It transmits Packets.
• Router forward the data packet from one host to another host by using IP address.
• It has different components for using proper function of the device.
Router Ports and their function:
1. Power Port: –
It is provided Electricity.
2. Console Port: –
It provides to use to configure the router. It is known as Local Administrative Port.
3. Ethernet Port: –
It is used to connect different network segment or LAN.
It is 4 types –
• 10 Mbps (Ethernet Port).
• 100 Mbps (Fast Ethernet Port).
• 1 Gbps (Gigabit Ethernet Port).
• 10 Gbps (10 Gigabit Ethernet Port).
4. Serial Port: –
It is used to connect another Router.
It is 2 type –
• Serial Interface: – It has 60 pins to connect in fixed Router. Its speed is low.
• Smart Serial Interface: – It has 26 pins to connect in modular Router. Its speed is
Higher.
5. Auxiliary Port: –
It is used to connect to analog Modem and it also can be used remotely configure the
Router. It is also known as Remote Administrative Port.
6. USB: –
It is used to connect any USB devices.
7. BRI Port: –
It is used to connect ISDN devices.
Types of Router Memory:
There are 4 types of memory on a Cisco router –
1. ROM: –
• It is available on a Routers processor board.
• The bootstrap software is stored in the ROM and it is the initial software that runs on a
Cisco Router.
2. Flash: –
• Flash memory available on a Router processor board.
• It is stored one or more Cisco IOS software images.
• It is also stored a copy of configuration files or system information.
3. RAM: –
• It is used to store routing table, ARP Cache and buffer.
• It is very fast memory which loses its information when the system is restarted.
4. NVRAM: –
• It is an extremely fast memory.
• It is used to store the startup configuration.
Routers Manufacturing Company –Cisco, Linksys, Juniper, Scyclodosh, D-Link,
Threecon, Nortail
Router Working Modes:
1. User Mode: –
This mode is used to Login to be router.
Prompt: – Router>
2. Privilege Mode: –
This mode is used to see all router configuration.
Prompt: – Router#
3. Global Configuration Mode: –
This mode is used to configure the Router.
Prompt: – Router (Config)#
20 Importance Router Commands
1. To go from user mode to Privilege Mode: –
Router> Enable
Router #
2. To go from user mode to Privilege Mode: –
To go Privilege mode to Global Configuration mode: –
Router# Configure Terminal
Router (Config)#
3. To go Global Config mode to Privilege mode: –
Router (Config) #End or Exit or Ctrl + Z or Ctrl + C
4. To go Privilege mode to user mode: –
Router# Disable
5. To set Router Hostname: –
Router (Config)# Hostname R1
6. TO set Log on Banner: –
R1 (Config)# Banner Motd # Network Help#
R1 (Config) #End
R1#Logout
Press Enter
Network Help
R1>
7. To Set Privilege Mode Password: –
R1 (Config)# Enable Password Cisco
To check the Password: –
R1 (Config)# End
R1 (Config) Disable
R1> Enable
Password
R1#
8. To Encrypt Clear Text Password manually: –
R1 (Config)# Service Password-encryption
9. To Enable Encrypted Password: –
R1 (Config)# Enable Secret “CCNA”
10. To see the running Configuration: –
R1# Show Running-config
11. To See the Saved configuration in NVRAM: –
R1# Show Startup-config
12. To save configuration: –
R1# write memory /copy running config startup config
destination file name (startup config)? Press enter
R1# copy run start
Destination file name (startup-config)? Press enter
R1# write
13. To set Clock: –
R1# clock set 9:15:30 1 June 2021
14. To see Clock: –
R1# Show Clock
15. To change time: –
R1 (Config)# Clock Time Zone India 5:30
16. To see the available Interface in the Router: –
R1# Show IP Interface Brief
17. To set IP address in the Fast Ethernet Interface
R1 (Config)# Interface Fast Ethernet 0/0
R1 (Config-if)# No Shutdown
Ri (Config-if)# IP add 192.168.10.1 255.255.255.0
R1 (Config-if)# Exit
18. To check IP address: –
R1# Show Interface Brief
19. To Flash IP address from any Interface/ Delete IP: –
R1 (Config)# Interface Fast Ethernet 0/0
R1 (Config-if)# No IP Address
20. To Set IP address in the Client: –
Click on the machine => Desktop => IP configuration => Static => give IP address.
WHAT IS Media? Types of Transmission Media?
Transmission Media UTP: –
Classification of Transmission Media: UTP categories: –
Wired Transmission Media: STP: –
Co-axial Cable: Fiber Optic Cable: –
Types of Coaxial Cable: – Types of Fiber Optic Cable: –
• Baseband Transmission: – 1) Single-Mode Fiber Optic cable: –
• Broadband Transmission: – 2) Multi-mode Fiber Optic Cable: –
Co-axial Cable Standards: – Wireless Transmission Media: –
RG – 8: – Radio Waves: –
RG – 58: – Microwaves: –
RG – 59: – Infrared: –
RG – 6: – Transmission Media Interview
Twisted Pair Cable: – Questions
Types of Twisted-pair Cable: –
Transmission Media
Definition: – Transmission Media is a communication channel that carries the
information from the sender to the receiver.
Classification of Transmission Media:

There are 2 types of Transmission Media in Networking –


Wired Transmission Media:
It is also known as Bounded or Guided Transmission media, here signals are
transmitted through a physical medium.
There are 2 types of Wired transmission media –
Co-axial Cable:
Definition: – A Co-axial cable or coax is a cable, which is used in the transmission of
audio, video and communications.
Characteristics: –
• The name of the cable is Co-axial as it contains conductors parallel to each other.
• It has a higher frequency as compared to Twisted pair cable.
• The inner conductor of the Coaxial cable is made up of copper mesh. The middle core
is made up of a non-conductive cover that separates the inner and outer conductor.
• Mainly Co-axial cables are used as Network and Broadcast cables. Example – Cable
T.V. wire.
Advantages of Co-axial Cable: –
• Its data transmission rate is high.
• Its Bandwidth is higher compare to other cables.
• Its installation process is easy.
• It is less expensive.
Disadvantages of Co-axial Cables: –
• If any fault in the Co-axial cable cause then the entire network is failure.
Types of Coaxial Cable: –
There are 2 types of Co-axial Cables –
• Baseband Transmission: –
It is defined as the process of transmitting a single signal at high speed. It is used for
digital transmission.
Example – LANs cabling.
• Broadband Transmission: –
It is defined as the process of transmitting multiple signal simultaneously. It is used for
analog transmission.
Example – Television Cabling.
Co-axial Cable Standards: –
The Co-axial cables are categorized by their Radio Government (RG) rating.
RG – 8: –
• It is also known as Thick Ethernet or 10 Base 5.
• It is used AUI connectors.
• Here maximum connected nods 100.
• Here 10 Base 5 means –
10 – 10 Mbps speed or Bandwidth
Base – Baseband Signals
5 – 500 Meter Segment Length

RG – 58: –
• It is also known as Thin Ethernet or 10 Base 2.
• It is uses BNC connectors.
• Here maximum connected nodes 30.
• Here 10 Base 2 means –
10 – 10 Mbps speed or Bandwidth
Base – Baseband Signals
2 – 200 Meter Segment Length (actual usage is 185 m.)
RG – 59: –
• It is used for Cable T.V.

RG – 6: –
• It is used for CCTV.
Twisted Pair Cable: –
Definition: –
Twisted Pair Cabling is a type of wiring in which two wire are twisted each other to
prevent the data loss.
Characteristics: –
• Here two wire are twisted each other.
• It is Cheap as compare to other cables.
• Its installation process is easy.
• It is used for phone communication and cable Ethernet network.
Types of Twisted-pair Cable: –
There are 2 types of Twisted pair cable –
UTP: –
Definition: –
UTP means Unshielded Twisted Pair Cable, which is copper media and wires are twisted
together to reduced noise and crosstalk.

Characteristics: –
• Here no additional shielding or meshes or aluminum foil are used.
• It is widely in Telecommunication.
Advantages of UTP: –
• It is Cheaper.
• Its installation process is easy.
• It can be used for high-speed LAN.
Disadvantages of UTP: –
• Its main disadvantages of the bandwidth. We cannot achieve high bandwidth with UTP
cables.
• This cable can only be used in shorter distance.
UTP categories: –
UTP Data Rate/ Maximum Frequency Application
Category Transmission Speed
CAT – 1 Up to 1 Mbps 0.4 MHz Old Television Cable
CAT – 2 Up to 4 Mbps 4 MHz Token Ring Network
CAT – 3 Up to 10 Mbps 16 MHz Token Ring and 10 Base T
Ethernet
CAT – 4 Up to 16 Mbps 20 MHz Token Ring Network
CAT – 5 Up to 100 Mbps 100 MHz Ethernet, Fast Ethernet, Token
Ring
CAT – 5e Up to 1 Gbps 100 MHz Ethernet, Fast Ethernet, Gigabit
Ethernet
CAT – 6 Up to 10 Gbps 250 MHz Gigabit Ethernet, 10 G Ethernet
CAT – 6a Up to 10 Gbps 500 MHz Gigabit Ethernet, 10 G Ethernet
CAT – 7 Up to 10 Gbps 600 MHz Gigabit Ethernet, 10 G Ethernet
CAT – 8 Up to 10 Gbps 2000 MHz 40 G Ethernet
STP: –
Definition: –
STP means Shielded Twisted Pair Cable, which is the copper media and this cable is
shielded or mesh surrounding the wire that guards the cable against electromagnetic
interference.
Advantages of STP: –
• Its data transmission rate is high.
• It is uses shielded or mesh that removes the crosstalk.
Disadvantages of STP: –
• It is more expensive than UTP cable.
• Its attenuation rate is high.

Fiber Optic Cable: –


Definition: – Fiber Optic consists of glass or plastic fiber that carries data in the form
of light signals.
Difference between UTP and STP
Before going through the difference between UTP and STP cable, we need to learn the
term twisted pair cable. A twisted pair cable is a widely used cable for transmitting data
and information over certain distances. A twisted pair cable consists of two separate
insulated copper wires that are twisted together within a wrapping shield and run parallel
with each other. Furthermore, it helps to reduce the crosstalk or electromagnetic
induction between the pair of wires. A twisted pair cable is divided into two parts
as STP and UTP.
UTP (Unshielded Twisted Pair)
UTP is an unshielded twisted pair cable used in computer and telecommunications
mediums. Its frequency range is suitable for transmitting both data and voice via a UTP
cable. Therefore, it is widely used in the telephone, computers, etc. It is a pair of insulated
copper wires twisted together to reduce noise generated by external interference. It is a
wire with no additional shielding, like aluminum foil, to protect its data from the exterior.
Advantages of the UTP:
1. It is a less costly and less expensive unshielded wire from another network medium.
2. It is designed to reduce crosstalk, RFI, and EMI.
3. Its size is small, and hence the installation of the UTP is easier.
4. It is mostly useful for short-distance network connections like home and small
organizations.
5. It is the most commonly used networking cable in the market. It is considered as faster
copper-based data transmission cable.
6. It is suitable for transmitting both data and voice via UTP cable.
Disadvantage of the UTP:
1. It can only be used in length segment up to 100 meters.
2. It has limited bandwidth for transmitting the data.
3. It does not provide a secure connection for data transmitting over the network.
STP (Shielded twisted pair):
A shielded twisted pair is a type of twisted pair cable that contains an extra wrapping foil
or copper braid jacket to protect the cable from defects like cuts, losing bandwidth, noise,
and signal to the interference. It is a cable that is usually used underground, and therefore
it is costly than UTP. It supports the higher data transmission rates across the long
distance. We can also say it is a cable with metal sheath or coating that surround each
pair of the insulated conductor to protect the wire from external users and prevent
electromagnetic noise from penetrating.
Features of Shielded twisted pair cable:
1. Frequency: It has higher frequency data transmission as compared to the UTP.
2. Thickness: It is a thick shielded twisted pair cable as it contains the wrapping of plastic
material to the copper conductor.
3. Grounding practices: The uses of shielded twisted pair cable are underground for a
longer distance.
4. Installation of the shielded wire is more difficult than the UTP (Unshielded twisted pair)
cable.
Advantages of the STP cable
1. It has lower noise and attenuation than UTP.
2. It is shielded with a plastic cover that protects the STP cable from a harsh environment
and increases the data transmission rate.
3. It reduces the chances of crosstalk and protects from external interference.
4. A modular connection helps to terminate the connection of the STP cable.
Disadvantages of the STP cable
1. It is the most expensive wire from UTP cables.
2. It requires more maintenance to reduce the loss of data signals.
3. There is no segment improvement in length despite its thick and heavier connection.
4. It is used only as a grounded wire.
Difference between UTP and STP
Following are the differences of the UTP and STP, as follows:
UTP STP
It is an unshielded twisted pair. It is a shielded twisted pair.
UTP cable is a twisted pair cable with wires that are twisted It is enclosed within a foil or mesh shield.
together.
The price of UTP is lower as compared to the STP. The price of STP is much costlier than UTP.
It does not require a grounding cable. It requires a grounding cable.
In UTP, the electromagnetic interference is more than the It reduces electromagnetic interference
STP while transferring the signal to the transmission media. while transferring the signal to the
transmission media.
UTP has high crosstalk. STP has low crosstalk.
Transferring speed of the data signal is slow as compared Transferring speed of the data signal is
to the STP. high as compared to the UTP.
Installation of UTP cables is easy as they are lighter, small Installation of STP cable is quite difficult as
in size, and flexible. compared to the UTP. Its size is heavy,
bigger, and stiffer.
It does not require much maintenance. It requires more maintenance.
UTP cables are noisier. STP cables are less noisy.
However, the UTP cable is used to establish the connection Generally, it is used to establish the
within a short distance, like a home or small industry. connection for enterprises over a long
distance.
Characteristics: –
• Fiber Optic cables communication signals using light signals or Light Emitting Diodes
(LEDs).
• The light reflected through the core of the cable.
• The core of the cable is enclosed with less thick plastic or glass and it is known as
Cladding.
• The Fiber Optic Cables provide faster data transmission than another copper cable.
Advantages of Fiber Optic Cables: –
• The Fiber Optic Cable provides more bandwidth and capacity as compared to copper
cables.
• It is lightweight.
• It carries the data at a longer distance.
• Its data transmission rate is high.
• Its signal attenuation rate is high.
Disadvantages of Fiber Optic Cables: –
• It is difficult to install and maintain.
• Its installation cost is high.
Basic Components of Fiber Optic Cable: –
• Core: – The Fiber Optic Cable consists as thin plastic or glass known as Core. Here
the light transmits one place to another place.
• Cladding: – The Optic Fiber Cable consists as a thick plastic layer of glass knows as
Cladding. It is providing the light reflective at the core part.
• Jacket: – The Fiber Optic Cable consists a Jacket. It is protecting the core part outer
of the damages.
Types of Fiber Optic Cable: –

There are 2 types of Fiber Optic Cable –


1) Single-Mode Fiber Optic cable: –
It is defined as the process of transfer data at a Single-mode at a time.
2) Multi-mode Fiber Optic Cable: –
It is defined as the process of transfer data at a multi-mode at a time.
Wireless Transmission Media: –
It is also known as Unbounded or Unguided Transmission media. Here signals are
transmitted through wireless without any physical medium.
Wireless transmission media classified into 3 categories –
Radio Waves: –
• Radio waves are electromagnetic waves that are transmitted in all free space.
• The frequency range of Radiowaves is 3 Khz – 1 Ghz.
• Here sender and receiver use an antenna to data transfer.
• It is mainly used for multicasting when there in one sender and multiple receivers.
• Example – FM radio, Cordless phone.
Microwaves: –
• Microwaves are electromagnetic waves.
• Its frequency range is 1 Ghz – 300 Ghz.
• Here sender and receiver antennas need to be properly aligned with each other.
• It is 2 types – Terrestrial Microwaves & Satellite Microwaves.
Infrared: –
• Infrared waves are used for very short distance communication, as they cannot go
through obstacles.
• Its frequency range is 300 Ghz – 400 Thz.
• Example – TV remotes, Keyboard, Wireless Mouse & printer etc.

Transmission Media Interview Questions


Q. What is Bandwidth?
Ans: – The amount of data that can be transferred through a communication medium in
a unit of time is called as Bandwidth.
The Bandwidth of digital signals is measured in Cycles per Second (bps) or Bytes per
Second (Bps).
The Bandwidth of analog signal is measured in Cycles per Second or Hertz.
Q. What is Frequency?
Ans: – the rate at which something changes or repeated over a particular period of time
is called Frequency.
It is measured in Hartz.
Q. What is Throughput?
Ans: – Throughput refers to how much data can be transferred from sender to receiver
in a digital amount of time. Example – It is measured the performance of hard drives
and RAM as well as Internet and Network connection.
Q. What is the difference between Bandwidth, Throughput and Speed?
Ans: – Bandwidth refers to the maximum amount of data transfer per
second.
Throughput is the actual amount of data passing through media or a connection.
Speed is referred to how much data can be downloaded or uploaded per second.
Q. What is Attenuation?
Ans: – Attenuation refers to the energy loss when a signal travels through a medium.
Q. What is Distortion in Network?
Ans: – When the signal trouble through some medium from one point to another, it
may change the form or save of the signal is called Distortion.
Q. What is Crosstalk?
Ans: – It is interference
Q. What is Segment Length?
Ans: – The maximum length of a cable that can carry the signal with strength without
any amplifying the device is called Segment Length.
Q. What is the difference between Communication and Transmission?
Ans: – A process of sending and receiving data between source and destination, in only
one way. It is the physical movement of data, called as Transmission.
A process of sending and receiving data between source and destination in both ways is
called as Communication.
Q. What is Baseband Signal?
Ans: – Only one signal transfer at a time in a link called as Baseband Signal.
Example – LAN.
Q. What is Broadband Signal?
Ans: – Multiple Signal transfer at a time in a link called as Broadband Signal.
Q. What is Transmission Media?
Ans: – Transmission media is a path that transfers the data from a sender to the
receiver.
Q. What are the types of Transmission Media?
Ans: – There are 2 types of Transmission Media – Guided Media and Unguided Media.
Q. Why is wired media called as Guided Media?
Ans: – Because of wired media, we can guide the data signals using wires from one
location to another. So that’s why it can also be called as Guided media.
Q. What do you mean wireless communication?
Ans: – Unguided media transport electromagnetic waves without using a physical
medium. This type of communication is referred to as wireless communication.
Q. What are the types of Wired Transmission media?
Ans: – There are 3 types of Wired Transmission media –
1) Co- axial Cable
2) Twisted-Pair Cable
3) Fiber Optic Cable
Q. What is Co-axial Cable?
Ans: – A Co-axial Cable or Coax is a cable, is used in the transmission of audio, video
and communication. Mainly it is used as network and broadband cable.
Q. What is Twisted-Pair Cable?
Ans: – Twisted-Pair Cable is a type of wiring in which two wires are twisted each other
to reduce the data loss.
Q. Why Twisted-Pair cables twisted with each other?
Ans: – Twisted-Pair cables are twisted because this twist between the wires is helpful to
reduce the electromagnetic interference, which helps to reduce the noise.
Q. What are the types of Twisted-Pair cable?
Ans: – There are 2 types of Twisted-Pair cable –
1) UTP
2) STP
Q. What is mean by 10 Base 5?
Ans: – It is also known as Thick Ethernet or RG – 8. It is a Co-axial standardized cable.
Here, 10 Base 5 means –
10 – 10 Mbps speed or Bandwidth
Base – Baseband Signals
5 – 500 m. Segment Length
Q. What is mean by 10 Base 2?
Ans: – It is also known as Thin Ethernet or RG – 58. It is a Co-axial standardized cable.
Here, 10 Base 2 means –
10 – 10 Mbps speed or Bandwidth
Base – Baseband Signals
2 – 200 m. Segment Length (actual usage 185 m.)
Q. What is STP?
Ans: – STP means Shielded Twisted-Pair Cable, which is the copper media and this
cable is shielded or mesh surrounding the wire that guards the cable against
electromagnetic interference.
Q. What is UTP?
Ans: – UTP means Unshielded Twisted-Pair cable, which is copper media and wires are
twisted together to reduced noise and crosstalk.

Q. Compare the following cable and use their connection?


Ans: –
Cable Type Types of Connector
UTP RJ – 45
STP RJ – 45
Co-axial RG – 58 BNC
Co – axial RG – 8 AUI
Fiber Optic Cable ST, SC, SMA, MIC
Q. What is the difference between CAT – 5 and CAT – 6 cables?
Ans: –

CAT – 5 CAT – 6
It supports data transfer up to 100 Mbps is an It can go up to 10 Gbps in data transfer
External Network. speed in on Ethernet Network.
Its frequency is 100 Mhz. Its frequency is 250 Mhz.
It is not able to tackle crosstalk due to its limitations.
It significantly reduces crosstalk issues due
to protective shielding.
Q. What is the difference between UTP & STP?
Ans: – UTP is a cable with wires that are twisted together to reduce noise and crosstalk.
STP is a twisted pair cable that is connected in foil or mesh shielded that guards the
cable against electromagnetic interference.
Q. Which types of cable are mostly used in telephone networks?
Ans: – Twisted-pair cable.
Q Which cable type is using the highest data transmission?
Ans: – Fiber Optic Cable.
Q. What is the difference between Single mode and Multi-mode Fiber Optic
Cable?
Ans: –
Single-Mode Fiber Optic Cable Multi-Mode Fiber Optic Cable

Its bandwidth is Low. Its bandwidth is High.

It is used for Long-distance (60 k.m.) It is used for a Short distance (up to 2 k.m.)

Its installation cost is Higher. Its installation cost is Lower.

It is used in WAN, MAN. It is used in LAN, SAN.


Q. What is Infrared Transmission?
Ans: – Infrared (IR) is a wireless transmission medium that sends signals using
infrared light waves.
Example – Wireless Mouse & Printer, Smart Phone etc.
Q. What is Microwaves Transmission?
Ans: – Microwaves are radio waves that provide a high-speed signal transmission.
Q. What is Radio waves?
Ans: – Radio waves are electromagnetic waves that are transmitted in all free space. It
is mainly used in FM radio.
Q. What is EMI/RFI?
Ans: – EMI stands for Electromagnetic Interference, it is also known as RFI (Radio
Frequency Interference). EMI is the frequency of electromagnetic noise and RFI is a
subset of electrical noise o the EMI spectrum.
Network Topology

Computer Network Topology and its Types


Types of Topologies:
Bus Topology:
Ring Topology:
Star Topology:
Mesh topology:
• Full Mesh Topology:
• Partial Mesh Topology:
Tree Topology:
Hybrid Topology:
INTERVIEW QUESTIONS
Computer Network Topology and its Types
Definition:
The layout or the structure of any network is called as Topology.
Topologies are divided into 2 types –
1. Physical Topology
2. Logical Topology
• Physical Topology: –
The way devices are connected with each other in a network is called as Physical
Topology.
• Logical Topology: –
The way devices are communicating with each other in a network is called as Logical
Topology.
Types of Topologies:
There are 6 different types of Physical Topology –
• Bus Topology
• Ring Topology
• Star Topology
• Mesh Topology
• Tree Topology
• Hybrid Topology
Bus Topology:
Characteristics: –
• Bus Topology is a network where all the node is connected with each other with a
simple common cable.
• Bus Topology, where all nodes are connected with a simple common cable, known as
backbone cable.
• There is ‘T’ connecter are used to connect the branch cable with the backbone cable.
• It is mainly used in 802.3 (Ethernet) and 802.4 (standard network).
• The most common access method of this topology is Carrier Sense Multiple Access).
• Here data is transmitting in single direction. No bi-directional feature is in Bus
Topology.
Advantages of Bus Topology: –
• It is easy to install.
• Its installation cost is low.
• It is required less cable compare to other network topology.
• It is used in small network.
Disadvantages of Bus Topology: –
• If the backbone cable fails, then the whole network shuts down.
• It has a limited length.
• It is difficult to troubleshooting.
Ring Topology:
Characteristics: –
• In this topology each device is connected in the form of a ring.
• It is physically like a bus topology but with connected ends.
• Data transmits in one direction (Uni-direction).
• The most common access method of this topology is token passing.

Advantages of Ring Topology: –


• In this network each & every node has equal access to resources.
• The installation cost is low.
• It is easy to install.
• It is a more reliable network because the communication system is not depending on a
single computer.
• It is easy to manage to add or remove devices.
Disadvantages of Ring Topology: –
• In this network if any node breaks down then the entire network system stops working.
• Troubleshooting in difficult in this topology.
• The data transfer rate is slower than any other network.
Star Topology:
Characteristics: –
• In a Star Topology network, the system is connected to a central node called a Hub or
Switch.
• Here the central node acts as a Server and the other connected node acts as Clients.
• Co-axial cable or Rj-45 cable are used to connect the computer.

Advantages of Star Topology: –


• In this type of network, it is very easy to add or remove a node to the network system.
• It is easy to install.
• Here less amount of cable is required because every device is connected to the hub.
• It is easy to troubleshoot.
• One faulty node does not affect the rest of the network.
Disadvantages of Star Topology: –
• If the central node fails, then the entire network becomes get down.
• The central hub is expensive which makes the network more expensive.
Mesh topology:
Characteristics: –
• In this network each & every node is interconnected with each other through a
dedicated Point-to-Point link.
• The internet is an example of the Mesh Topology.
• It is mainly used in WAN wireless networks.

Types of Mesh Topology: –


There are 2 types of Mesh Topology –
• Full Mesh Topology:
In a Full Mesh Topology, each computer is connected to all the available computers in
the network.
• Partial Mesh Topology:
In a Partial Mesh Topology, not all but certain computers are connected in the network.
Advantages of Mesh Topology: –
• Here data transfer rate is very fast than any other topology.
• Adding and removing nodes in this network could be easily.
• Here no data traffic issue because there is a dedicated link between two devices.
• It provides more security and privacy.
Disadvantages of Mesh Topology: –
• It is very expensive to install compared to other topologies.
• It is very difficult to maintain and configure.
• The cost of cable is high.
Tree Topology:
Characteristics: –
• Tree Topology combines the characteristics of Bus and Star Topology.
• A Tree Topology is a structure in which all the computer is connected with hierarchical
form.
• It consists of a parent-child hierarchy.

Advantages of Tree Topology: –


• We can easily expandable in this network.
• It is mainly used in Broadband Transmission.
• It is easily managed and maintained.
• Fault finding is very easy.
Disadvantages of Tree Topology: –
• Its installation cost is very high.
• The dependency of the whole network is on a central hub.
• A new device can add, then it becomes difficult to reconfigure.
Hybrid Topology:
Characteristics: –
• It is the combination of two or more topologies.
• This network is a mixture of Peer-to-Peer and Client-Server networks.

Advantages of Hybrid Topology: –


• We can easily expandable in this network.
• Fault finding and troubleshooting is very easy.
Disadvantages of Hybrid Topology: –
• Its installation process is very costly.
• It is designed to be very complex.
INTERVIEW QUESTIONS
Q. What is Node & Links?
Ans: – Any device in a network is called a Node.
A Link is a physical and logical connection between two nodes in a network.
Q. What is MAU?
Ans: – MAU (Multi-station Access Unit) is a topological Hub. But it is only used in
Token Ring.
Q. What is Topology?
Ans: – The layout or the structure of any network is called as Topology.
Q. What are the types of Topology?
Ans: – Topologies are divided into 2 types – Physical Topology and Logical Topology.
Q. What is Physical Topology?
Ans: – The way devices are connected with each other in a network is called as Physical
topology.
Q. What is Logical Topology?
Ans: – The way devices are communicating with each other in a network is called as
Logical Topology.
Q. What are types of Physical Topology?
Ans: – There are 6 types of Physical Topologies –
• Bus Topology
• Ring Topology
• Star Topology
• Mesh Topology
• Tree Topology
• Hybrid Topology
Q. What is Bus Topology?
Ans: – Bus Topology is a network where all the nodes are connected with each other in
a single common cable, also known as Backbone cable.
Q. What is ate main disadvantage of Bus Topology?
Ans: – If the backbone cable fails, then the entire network fails.
Q. What is Ring Topology?
Ans: – In this network where all nodes are connected with each other in the form of
ring.
Q. What is main advantage and disadvantage of Ring Topology?
Ans: – The main advantage of Ring Topology is that each & every node has equal access
to resources.
The main disadvantage of Ring Topology is that if any nodes break down then the entire
network get down.
Q. What is Star Topology?
Ans: – In a Star Topology all nodes are connected with each other in a central node,
called as Hub or Switch.
Q. What is main advantage & disadvantage of Star Topology?
Ans: – The main advantage of Star Topology is that one faulty node does not affect the
rest of the network.
The main disadvantage of Star Topology is that if the central node fails, then the whole
network becomes get down.
Q. What is Mesh Topology?
Ans: – In the Mesh Topology network each & every node is interconnected with each
other in a dedicated Point-to-Point link.
Q. What is the main advantage & disadvantage of Mesh Topology?
Ans: – The main advantage of Mesh Topology is that it provides more security and
privacy.
The main disadvantage of Mesh Topology is that, it is very expensive to install.
Q. What is Tree Topology?
Ans: – Tree Topology combines characteristics of Bus & Star topology.
Q. What is Hybrid Topology?
Ans: – Hybrid Topology is a combination of two or more topologies.
Q. What is Dual Ring Topology?
Ans: – A network topology in which two concentric rings connect each other, Primary
ring and Secondary rings. It is a Full-duplex topology, which means one ring operates in
one direction and the other ring in opposite direction.
Q. What is Token Ring technology?
Ans: – Token Ring is a computer networking technology, it was introduced by IBM in
1984 but standardized in 1989 as IEEE 802.5.
It is used in Local Area Network (LAN) in which all computers are connected in a ring or
star topology and pass one or more tokens from one node to another node.
BIOS
BIOS (Basic Input-Output System) • BIOS Drivers: –
Definition of BIOS: – • BIOS Setup: –
History of BIOS: – Types of BIOS: –
Why do used for BIOS: – 1) Legacy BIOS: –
Popular BIOS manufacturing Company: 2) UEFI BIOS: –
– Benefits of configuring BIOS: –
Main function of BIOS: – BIOS Interview Questions
• POST: – Related Post
• Bootstrap Loader: –
BIOS (Basic Input-Output System)
Definition of BIOS: –
BIOS stands for Basic Input-Output System. It is firmware. It is the interface between
Hardware and computer Operating systems.
History of BIOS: –
The name BIOS originally comes in 1975 created by Gary Kidall but it was first originally
proprietary IBM for use in their personal computer in 1981.
Why do used for BIOS: –
The main use of BIOS is to act as a middleman between the computer Operating System
and Hardware. It instructs the computer on how to perform basic functions like as
during booting and control the keyboard. It is also used to identify and configure the
hardware in a computer system like hard disk drive (HDD), optical disk drive (ODD),
floppy disk drive (FDD), CPU, memory etc.
Popular BIOS manufacturing Company: –
• Phonex Technology
• IBM
• American Megatrends (AMI)
• Dell
• ASUS
• Foxconn
Main function of BIOS: –
There are 4 main functions of BIOS –
• POST: –
It stands for Power-On Self-Test. It is checking all hardware components are working
properly or not before loading the Operating System.
• Bootstrap Loader: –
It is located in the Operating System and it loads the Operating System into the RAM of
the computer.
• BIOS Drivers: –
BIOS drivers are a collection of programs that are stored in EEPROM or EPROM
memory chips which are Non-volatile memory. It supplies basic information of
computer hardware.
• BIOS Setup: –
It is used to configure the hardware setting including device setting, computer
password, date & time. It is store in CMOS that’s why it is also called as a CMOS Setup.
Types of BIOS: –
There are 2 different types of BIOS –
1) Legacy BIOS: –
The Legacy BIOS or Basic Input-Output System is used in the older motherboard. This
BIOS cannot recognize larger than 2.1 TB storage drives.
2) UEFI BIOS: –
The UEFI (Unified Extensible Firmware Interface) BIOS has used any modern pc. It can
recognize or handle 2.2 TB or larger than storage drives. It is used to GUID partition
table (GPT) technology. Earlier, Intel pcs used Legacy BIOS but now they are moving
UEFI BIOS.
Benefits of configuring BIOS: –
• Enforcing Security.
• Hardware Monitoring.
• Hardware Troubleshooting.
• Hardware Testing.
• Operating System Booting.
BIOS Interview Questions
Q. What is Firmware?
Ans: – Firmware is the collection of Microprograms.
Q. What is Microprograms?
Ans: – Microprograms is the Hardware level program.
Q. What are the types of firmware graduation?
Ans: – There are 2 ways –
1) Using Windows Executable.
2) Using bootable USB stick.
Q. What is Dual BIOS?
Ans: – Duel BIOS means two Physical BIOS ROM chips on the motherboard. One chip
acts as your ‘Main’ BIOS or the second chip acts as a ‘Backup’ BIOS.
Q. Why does Motherboard need Duel BIOS technology?
Ans: –
• Virus attacks.
• BIOS upgrade failures.
• Incorrect BIOS version.
• Updating of peripherals.
Q. What is the main function of BIOS?
Ans: –
• Power-On Self-Test (POST).
• Bootstrap Loader.
• BIOS Drivers.
• BIOS Setup utility programs.
Q. What is POST?
Ans: – POST stands for Power-On Self-Test. It is a self-diagnostic program.
As soon as we switch on the computer system POST checks all hardware components
whether working properly or not.
If all hardware is working properly then POST is successful and the computer will boot.
If one of the hardware is not working properly then POST is unsuccessful and the
computer will not boot.
Q. What is BIOS Drivers?
Ans: – BIOS Drivers is the collection of programs stores in the RAM chip.
Q. How to open and Exit the BIOS?
Ans: –
• Open BIOS: – Restart the computer + F1 + F2 + Del – Go to BIOS.
• Exit the BIOS: – F10 – save and exit to the BIOS.
Q. How to reset BIOS setting?
Ans: – BIOS setting can be reset by removing the CMOS battery and by shorting the
RTC jumper from the motherboard.
Q. How to find your system Board ID in BIOS?
Ans: – Turn on your computer system and press f10 to enter the BIOS setting menu.
On the main tab under system information page.
Now you can see the system board ID.
Q. Why BIOS password is most important in every system?
Ans: – Protect your computer system with BIOS passwords.
BIOS password is extremely strong as it completely locks up other than the password.
Anyone can use it anyway as the Operating System will not load unless you type in the
right password.
Q. What is UEFI?
Ans: – UEFI stands for Unified Extensible Firmware Interface. It is the advanced
interface standard firmware for computers. It is the concept the Intel company.
Q. Why we are upgrade the Firmware?
Ans: –
• To fixed the bugs.
• To improve the performance of the system.
• To upgrade the hardware performance.
• To change the Operating System performance.
Q. What is different between MBR & GPT?
Ans: –
MBR (Master Boot Record) GPT (Guid Partition Table)
MBR used legacy OS standard BIOS partition GPT creates multiple partition & 128
table. primary partitions.
MBR supports up to 2 TB Hard Disk. GPT also supports more than 2 TB Hard
Disk.
In MBR disk the boot data is store in one place, GPT is more secure because primary GPT
so sometimes data is corrupted, it is difficult to stores data at the beginning and secondary
recover. GPT stores data at the ending.
Q. What is different between UEFI & Legacy Boot?
Ans: –
UEFI Legacy Boot
It is uses a GUID partition table (GPT). It is uses MBR (Master Boot Record)
table.
It is more user-friendly. It is less user-friendly.
It has additional security features and is more efficient. Not as efficient as UEFI.
UEFI boot is the boot process used by UEFI firmware. Legacy Boot is the boot process used by
BIOS firmware.
Motherboard Definition Types Components Ports

Motherboard Definition, Types, Components:


• Definition:
A motherboard is a PCB (Printed Circuit Board) in which all components are connected
it directly or indirectly. It is also called Mainboard, Main Circuit Board, System Board,
Logic Board and Mobo.
• Motherboard manufacturer company:
• Gigabyte
• Asus
• Intel
• MSI
• Zebronics
• Toshiba
• Types of Motherboard:
Basically, the motherboard is classified 2 types based on the available device –
1. Non-Integrated Motherboard:
A Non-Integrated Motherboard don’t have ports to connect necessary equipment.
It is uses normally PCI expansion slots.
2. Integrated Motherboard:
An Integrated Motherboard have separate ports to connect different types of
components.
The motherboard is classified on the based-on usage are 3 types –
1. Desktop Motherboard:
The Desktop Motherboard is used basically home and office purpose only like
word, excel, playing games, watching movies etc.
2. Laptop Motherboard:
The Laptop Motherboard are used to Laptop system. Basically, it is advanced
Integrated motherboard.
3. Server Motherboard:
The Server Motherboard are used to server machine. It is used to 24×7
environments. It is uses highly configuration machine. It is more advanced as
compare to Desktop or Laptop motherboard.
• Motherboard Form factor:
The physical shape and size of any device is called a Form factor. There is some
motherboard importance form factor –
• AT:
It’s full of Advanced Technology. It is also known as Full AT. It is created by IBM for
IBM PCs and Intel 80186 series PC uses.
• Baby AT:
It is a smaller version of AT motherboard.
• ATX:
It’s full of Advanced Technology Extended. It is created by Intel. It is widely used for
desktop motherboards.
• Micro-ATX:
Micro ATX is the smaller version of the ATX motherboard. It is commonly used on
small-form-factor desktop computers.
• Mini-ATX:
Mini ATX is the smaller version of Micro ATX. It is basically designed with MoDT
(Mobile on Desktop Technology) devices.
• BTX:
It’s full from Balanced Technology Extended. It is the successor of the ATX
motherboard. The BTX features is a low profile and better cooling performance.
• DTX:
It’s full from Discontinuous Transmission. It is developed by AMD and it is designed for
the smaller computer systems.
• LPX:
It’s full from New Low Profile Extended. It is developed by Intel.
• Motherboard Components:
Here all are the motherboard components discuss below. We are all motherboard
components divided into extra 2 parts-Motherboard connectors and Motherboard ports.

• Expansion Slots:
It is also called as Bus Slot or PCI Slot. It is used to install peripheral components like
graphics card, sound card, LAN card etc.
• Memory Slot:
A Memory Slot or RAM Slot or DIMM Slot where inserted RAM or Primary storage
device.

• BIOS:
It’s full from the Basic Input/output System. It is a Read-Only Memory (ROM). It
controls the basic input/output function.

• CMOS Battery:
It’s full from a Complementary Metal-Oxide Semi-Conductor. It is also called as
NVRAM (Non-volatile RAM) or Motherboard battery. It is backup power and it is stored
BIOS setting, date & time.

• CPU Fan & Heat Sink:


Its main function absorbs the heat when the system is running and cools down the CPU.

• CPU Socket:
A CPU socket or Processor socket is a socket where a computer processor inserted it.

• North Bridge:
It is used to communicate between RAM and Processor. It is also called as Memory
Controller Hub.
• South Bridge:
It is used to control the Input and Output function. It is also called as Input/Output
Controller Hub.

• Jumper:
The jumper is an electronic circuit that is used to configure printed circuit boards. It acts
also on/off switch on a motherboard.

• Power & Reset Button:


In the front panel have a turn on/off button and a reboot button to reset the computer.
• Motherboard Connector:
• ATX Power Connector:
It has 20/24 pin and connects to the ATX power cable of a power supply unit which
supplies power to the motherboard.

• ATX 12V Power Connector:


It is a 12V or 4 pin power cable of a power supply unit that supplies power to the CPU.

• SATA Connector:
It is full from Serial Advanced Technology Attachment. It is a 7 pin cable and connects
to the SATA devices like Hard Disk Drive (HDD), CD/DVD Drive etc.
• PATA Connector:
It’s full from Parallel Advanced Technology Attachment. It is also called as IDE
(Integrated Device Electronics) connector. It is 40 pin cable and connect to IDE devices
like Hard Disk Drive (HDD), CD/DVD Drive etc.

• FDD Connector:
It’s full from Floppy Disk Drive. It is 34 pin cable model and connects to Floppy Disk
Drive (FDD) with a motherboard.

• Motherboard Port:
• LAN Port:
It is also called an RJ-45 port (Registered Jack) or Ethernet port. It has 8 pins and is
used to connect the PC with the network using an RJ-45 cable.

• VGA Port:
It’s full from Video Graphics Array. It is 15 pin hole female port and it is used to connect
a monitor.

• DVI Port:
It’s full from Digital Visual Interface. It is used to connect a flat panel LCD monitors or
video graphics cards.
• HDMI Port:
It’s full from High Definition Multimedia Interface. It is an audio & video transmission
interface. It is used to connect Cable boxes, Projector, a Video games systems etc.

• Parallel Port:
It is also known as LPT port or DB 25 port (DB – D Base). It is a 25 pin model female
port and it is used to connect DMP (Dot Metrix Printer), Scanner with the motherboard.

• Serial Port:
It is also known as DB-9 port/ Com port/ Rs – 232C port. It is a 9 or 25 pin model male
port and is used to connect networking devices like routers, Switch, Modems etc.

• PS/2 Port (Purple):


It is a 6 pin model port and is used to connect PS/2 Keyboard.
• PS/2 Port (Green):
It is a 6 pin model and used to connect PS/2 Mouse.

• Audio Port:
This port connects a tape, CD, DVD player or another audio connector.

• USB Port:
It’s full form Universal Serial Bus. It is used to connect external USB devices like Pen
drive, external hard Disk, Printer, Scanner, Mouse, Keyboard etc.
TCP-IP-model

TCP/ IP Model: Layer, Protocol & Function –


What is TCP/ IP Reference Model?
Transmission Control Protocol (TCP) and Internet Protocol (IP) are two separate computer
network protocol that define a set of rules which is helps all the connected devices are
communicated with each other in a network.
Characteristics: –
i) TCP/ IP stands for Transmission Control Protocol and Internet Protocol.
ii) It was developed by Department of Defense in 1970.
iii) It is a suite of communication protocol.
iv) It was developed prior to the OSI model.
v) It is not to the same as the OSI model.
vi) It is also called as Internet Model or DoD Model or DARPA Model.
vii) TCP/ IP model maintained by the IETF.
viii) The TCP/ IP model consists of 4 layers –
1) Network Interface Layer
2) Internet Layer
3) Transport Layer
4) Application Layer
Function of TCP/ IP Model: –
1) Network Interface Layer: –
Characteristics: –
i) The Network Interface layer is the lowest layer of the TCP/ IP model.
ii) It is combination function of the Physical Layer and Data Link Layer as well as OSI Model.
iii) It is defined of how data is physically sent through the network.
iv) It is responsible for transmission of the data between the connected devices in a network.
v) Here uses network medium are the Co-axial Cable, Optic Fiber Cable, Twisted-pair Cable.
vi) Here uses network protocol are Ethernet, Token Ring, FDDI, X.25, Frame Relay etc.
2) Internet Layer: –
Characteristics: –
i) An Internet Layer is a second layer of TCP/ IP model.
ii) It is responsible for accepting, routing and delivering the data packets.
iii) This layer is same as well as Network Layer of the OSI model.
iv) Here uses protocol are IP, ARP, ICMP, IGMP.
v) It is also known as Network Layer.
3) Transport Layer: –
Characteristics: –
i) Transport Layer is the third layer of TCP/ IP model.
ii) Transport Layer is responsible for end-to-end communication and error free data delivery.
iii) The Transport Layer is responsible for Flow Control, Error Control and Segmentation or De-
segmentation of the data.
iv) It is also responsible for acknowledgement of the successfully data transmission and re-
transmitting the data.
v) The Transport Layer adds header to the data.
vi) Here uses protocol are TCP and UDP.
vii) It is also called as Host-to-Host layer.
4) Application Layer: –
Characteristics: –
i) Application Layer is the topmost layer of the TCP/ IP model.
ii) Its function same as well as Application, Presentation and Session Layer of the OSI model.
iii) Here users are interacted with the applications.
iv) It is responsible for high-level protocols.
v) It is provided e-mail services.
vi) Here use protocols are HTTP, HTTPS, FTP, SMTP, RIP, TELNET, SSH etc.
Importance Protocols of TCP/ IP Model
1. TCP: –
i) It stands for Transmission Control Protocol.
ii) Its port no. 6.
iii) It is a connection-oriented protocol.
iv) It provides Acknowledgement while data is transmitting.
v) It is a reliable protocol.
vi) Its guarantees of delivery of packets.
vii) It is very slow.
2. UDP: –
i) It stands for User Datagram Protocol.
ii) Its port no. 17.
iii) It is a connection less protocol.
iv) Its never provides Acknowledgement while data is transmitting.
v) It is very fast.
vi) It is an unreliable protocol.
vii) It’s never guarantees delivery of packets.
3. TELNET: –
i) It stands for Teletype Network.
ii) It is a terminal emulation protocol of TCP/ IP model.
iii) It is an Application Layer protocol.
iv) It is uses port no. 23.
v) It is a secure service because it needs administrator login and password.
vi) You can configure remote device such as Router, Switches.
4. SSH: –
i) Its stands for Secure Shell.
ii) Its port no. 22.
iii) It is a TCP base service protocol.
iv) It provides remote login and secure file access.
5. FTP: –
i) It stands for File Transfer Protocol.
ii) Its port no. 20 for Data and 21 for Control.
iii) It is a TCP base service protocol.
iv) It is used for File Upload and Download services.
v) It is responsible for process to process data delivery.
6. TFTP: –
i) It stands for Trivial File Transfer Protocol.
ii) Its port no. 69.
iii) It is an Application Layer protocol.
iv) It is a TCP base service protocol.
v) It is used for Web Services.
7. HTTP: –
i) It stands for Hyper Text Transfer Protocol.
ii) Its port no. 80.
iii) It is an Application Layer protocol.
iv) It is a TCP base service protocol.
v) It is used for Web Service.
8. HTTPS: –
i) It stands for Hyper Text Transfer Protocol Secure.
ii) Its port no. 443.
iii) It is a TCP base service protocol.
iv) It is used for Web Service in Secure way.
9. SMTP: –
i) It stands for Simple Mail Transfer Protocol.
ii) Its port no. 25.
iii) It is a TCP base service protocol.
iv) It is used for Sending Mail.
10. POP3: –
i) Its stand for Post Office Protocol version 3.
ii) Its port no. 110.
iii) It is a TCP base service protocol.
iv) It is used for Receiving Mail.
11. IMAP: –
i) Its stands for Internet Mailing Application Protocol.
ii) Its port no. 143
iii) It is a TCP base service protocol.
iv) It is used for Receiving Mail.
12. DNS: –
i) It stands for Domain Name Service.
ii) Its port no. 53.
iii) It is a TCP/ UDP both service protocol.
iv) It is used for name resolution service.
13. DHCP: –
i) Its stand for Dynamic Host Configuration Protocol.
ii) Its port no 67 for Server and 68 for Client.
iii) It is a UDP base service protocol.
iv) It helps automatically assign an IP address to a computer.
14. NNTP: –
i) It stands for Network News Transmission Protocol.
ii) Its port no. 119.
iii) It is a TCP base service protocol.
iv) It is used for news group service.
15. SNMP: –
i) Its stand for Secure Network Management Protocol.
ii) Its port no. 161.
iii) It is an UDP base service protocol.
iv) It is used for network management.
16. NTP: –
i) Its stand for Network Time Protocol.
ii) Its port no. 123.
iii) It is an UDP base service protocol.
iv) It is used for clock synchronization between computer system and packet switched.
Protocol Name – their Services & Port No.

TCP/ IP INTERVIEW QUESTIONS


Q. What is TCP/IP Model?
Ans: – Transmission Control Protocol and Internet Protocol are two separate protocol which
define a set of rules which is help in communicated to connected devices in a network. It was
developed by DoD (department of Defense) in 1970.
Q. Who are maintained of TCP/ IP Model?
Ans: – IETF.
Q. What is IETF?
Ans: – It stands for Internet Engineering Task Force. It is an open standard
organization which is develop, designer, operators, vendors and researchers concerned.
Q. What is DARPA?
Ans: – It stands for Defense Advanced Research Project Agency. It is a research and
development agency of the United States Department of Defense responsible for the
development of emerging technologies for use by the military.
Q. What are the layers of TCP/ IP Model?
Ans: – TCP/ IP models consist of 4 layers –
1. Network Interface Layer
2. Internet Layer
3. Transport Layer
4. Application Layer
Q. Different between TCP & UDP?
Ans: –
Q. What is Protocol?
Ans: – A Protocol is a special set of rules which followed by the computer to communicated
with each other on a network.
Q. What is RFC?
Ans: – RFC stands for Request for Comments. It is a standard publication of IETF
where standard and technical development of protocol are defined.

Q. What is ARP?
Ans: – Address Resolution Protocol (ARP) is resolved MAC address to a known IP
address.
Q. What is RARP?
Ans: – Reverse Address Resolution Protocol (RARP) is resolved MAC address to a
known IP address.
Q. What is TCP?
Ans: – Transmission Control Protocol is a reliable Transport Layer protocol which is used for re-
transmission, sequencing and fragmentation of the data.
Q. What is UDP?
Ans: – User Datagram Protocol is a fast but unreliable protocol which is used for small
data packets transfer.

Q. What is RIP?
Ans: – Routing Information Protocol is a distance vector protocol in network.
Q. What is SLIP?
Ans: – Serial Line Internet Protocol is the protocol for the carrying IP information over
serial links.
Q. What is ICMP?
Ans: – It stands for Internet Control Message Protocol. It is defining by IETF RFC 792.
It is a Network Layer protocol of the TCP/ IP suite used by hosts and gateways to sent
notification of datagram problem back to the sender.
Q. What is different between HTTP & HTTPS?
Ans: –
Q. What is different between POP3 & IMAP?
Ans: –
COMMUNICATION

You might also like