Computer Network Interview Question
Computer Network Interview Question
2. What is subnet?
A generic term for section of a large networks usually separated by a bridge or router.
5. What is SAP?
Series of interface points that allow other computers to communicate with the other
layers of network protocol stack.
Frame relay is a packet switching technology. It will operate in the data link layer.
9. What is Beaconing?
The process that allows a network to self-repair networks problems. The stations on
the network notify the other stations on the ring when they are not receiving the
transmissions. Beaconing is used in Token ring and FDDI networks.
2.
3. 10. What is redirector?
Redirector is software that intercepts file or prints I/O requests and translates them
into network requests. This comes under presentation layer.
26. What is ICMP?
ICMP is Internet Control Message Protocol, a network layer protocol of the TCP/IP suite
used by hosts and gateways to send notification of datagram problems back to the sender. It
uses the echo test / reply to test whether a destination is reachable and responding. It also
handles both control and error messages.
27. What are the data units at different layers of the TCP / IP protocol suite?
The data unit created at the application layer is called a message, at the transport layer the
data unit created is called either a segment or an user datagram, at the network layer the data
unit created is called the datagram, at the data link layer the datagram is encapsulated in to a
frame and finally transmitted as signals along the transmission media.
29. What is the minimum and maximum length of the header in the TCP segment and IP
datagram?
The header should have a minimum length of 20 bytes and can have a maximum length of 60
bytes.
31. What is the difference between TFTP and FTP application layer protocols?
The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a remote
host but does not provide reliability or security. It uses the fundamental packet delivery
services offered by UDP.
The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP for
copying a file from one host to another. It uses the services offer by TCP and so is reliable
and secure. It establishes two connections (virtual circuits) between the hosts, one for data
transfer and another for control information.
? STAR topology:
In this all computers are connected using a central hub.
Advantages:
Can be inexpensive, easy to install and reconfigure and easy to trouble shoot physical
problems.
? RING topology:
In this all computers are connected in loop.
Advantages:
All computers have equal access to network media, installation can be simple, and signal
does not degrade as much as in other topologies because each computer regenerates it.
A method for providing fault tolerance by using multiple hard disk drives.
When the computers on the network simply listen and receive the signal, they are
referred to as passive because they don’t amplify the signal in any way. Example for
passive topology - linear bus.
Hybrid devices that combine the features of both bridges and routers.
A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.
A gateway operates at the upper levels of the OSI model and translates information
between two completely different network architectures or data formats
The address for a device as it is identified at the Media Access Control (MAC) layer
in the network architecture. MAC address is usually stored in ROM on the network
adapter card and is unique.
Bit rate is the number of bits transmitted during one second whereas baud rate refers
to the number of signal units per second that are required to represent those bits.
Every line has an upper limit and a lower limit on the frequency of signals it can
carry. This limited range is called the bandwidth.
Signals are usually transmitted over some transmission media that are broadly
classified in to two categories.
b) Unguided Media:
This is the wireless media that transport electromagnetic waves without using a
physical conductor. Signals are broadcast either through air. This is done through
radio communication, satellite communication and cellular telephony.
The data unit in the LLC level is called the protocol data unit (PDU). The PDU
contains of four fields a destination service access point (DSAP), a source service
access point (SSAP), a control field and an information field. DSAP, SSAP are
addresses used by the LLC to identify the protocol stacks on the receiving and
sending machines that are generating and using the data. The control field specifies
whether the PDU frame is a information frame (I - frame) or a supervisory frame (S -
frame) or a unnumbered frame (U - frame).
Repeater:
Bridges:
These operate both in the physical and data link layers of LANs of same type. They
divide a larger network in to smaller segments. They contain logic that allow them to
keep the traffic for each segment separate and thus are repeaters that relay a frame
only the side of the segment containing the intended recipent and control congestion.
Routers:
They relay packets among multiple interconnected networks (i.e. LANs of different
type). They operate in the physical, data link and network layers. They contain
software that enable them to determine which of the several possible paths is the best
for a particular transmission.
Gateways:
They relay packets among networks that have different protocols (e.g. between a LAN
and a WAN). They accept a packet formatted for one protocol and convert it to a
packet formatted for another protocol before forwarding it. They operate in all seven
layers of the OSI model.
ICMP is Internet Control Message Protocol, a network layer protocol of the TCP/IP
suite used by hosts and gateways to send notification of datagram problems back to
the sender. It uses the echo test / reply to test whether a destination is reachable and
responding. It also handles both control and error messages.
28. What are the data units at different layers of the TCP / IP protocol suite?
The data unit created at the application layer is called a message, at the transport layer
the data unit created is called either a segment or an user datagram, at the network
layer the data unit created is called the datagram, at the data link layer the datagram is
encapsulated in to a frame and finally transmitted as signals along the transmission
media.
The address resolution protocol (ARP) is used to associate the 32 bit IP address with
the 48 bit physical address, used by a host or a router to find the physical address of
another host on its network by sending a ARP query packet that includes the IP
address of the receiver.
The reverse address resolution protocol (RARP) allows a host to discover its Internet
address when it knows only its physical address.
30. What is the minimum and maximum length of the header in the TCP
segment and IP datagram?
The header should have a minimum length of 20 bytes and can have a maximum
length of 60 bytes.
32. What is the difference between TFTP and FTP application layer protocols?
The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a
remote host but does not provide reliability or security. It uses the fundamental packet
delivery services offered by UDP.
The File Transfer Protocol (FTP) is the standard mechanism provided by TCP / IP for
copying a file from one host to another. It uses the services offer by TCP and so is
reliable and secure. It establishes two connections (virtual circuits) between the hosts,
one for data transfer and another for control information.
* Server-based network
* Peer-to-peer network
Peer-to-peer network, computers can act as both servers sharing resources and as
clients using the resources.
Hub is a layer 1 device. It will out the signal from all of its port except the one from where its
insert. It is unable to detect the collision. It works on single collision and single broadcast
domain.
Switch is layer 2 device. It maintains a CAM table that store the MAC address of devices
attached on its port. CAM table is used to make the forwarding decision. It works on per port
collision and single broadcast domain.
What is layer?
Layer is a completely logical partition of PDU (protocol data unit) process. That define how
the information is travel form one computer to other over the network.
What is TCP/IP?
It is combination of two protocols TCP and IP. It is used for reliable data transfer.
An operating system (sometimes abbreviated as "OS") is the program that, after being
initially loaded into the computer by a boot program, manages all the other programs in a
computer. It provides a platform to application software.
The collection of mostly used software released in package Form Company. For Example
Ms-Office that contain word, power point, Excel, etc.
Hub is a layer 1 device. It will out the signal from all of its port except the one from where its
insert. It is unable to detect the collision. It works on single collision and single broadcast
domain.
Switch is layer 2 device. It maintains a CAM table that store the MAC address of devices
attached on its port. CAM table is used to make the forwarding decision. It works on per port
collision and single broadcast domain.
What is layer?
Layer is a completely logical partition of PDU (protocol data unit) process. That define how
the information is travel form one computer to other over the network.
What is TCP/IP?
It is combination of two protocols TCP and IP. It is used for reliable data transfer.
The collection of mostly used software released in package Form Company. For Example
Ms-Office that contain word, power point, Excel, etc.
In a ring topology, device one connects to device two, device two connects to device three,
and so on to the last device, which connects back to device one.
STP cable is mostly used by IBM; it has an extra cover over each pair.
UTP cable is used in star topology. It has a single cover over all pair.
What is IEEE?
What is 802.3?
IEEE 802.3 is a collection of IEEE standards defining the physical layer and the media
access control (MAC) of the data link layer of wired Ethernet. Physical connections are made
between nodes and infrastructure devices hubs, switches and routers by various types of
copper or fiber cable.
64MB RAM
1.5GB free HDD space
233MHz minimum processor.
10Base2— An Ethernet term meaning a maximum transfer rate of 10 Megabits per second
that uses baseband signaling, with a contiguous cable segment length of 100 meters and a
maximum of 2 segments.
10Base5—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second
that uses baseband signaling, with 5 continuous segments not exceeding 100 meters per
segment.
10BaseT—An Ethernet term meaning a maximum transfer rate of 10 Megabits per second
that uses baseband signaling and twisted pair cabling.
An unspecified passive open has the server waiting for a connection request from a client.
A fully specified passive open has the server waiting for a connection from a specific client.
A TCB is a complex data structure that contains a considerable amount of information about
each connection.
A Management Information Base is part of every SNMP-managed device. Each SNMP agent
has the MIB database that contains information about the device's status, its performance,
connections, and configuration. The MIB is queried by SNMP.
Anonymous FTP enables users to connect to a host without using a valid login and password.
Usually, anonymous FTP uses a login called anonymous or guest, with the password usually
requesting the user's ID for tracking purposes only. Anonymous FTP is used to enable a large
number of users to access files on the host without having to go to the trouble of setting up
logins for them all. Anonymous FTP systems usually have strict controls over the areas an
anonymous user can access.
A pseudo tty or false terminal enables external machines to connect through Telnet or rlogin.
Without a pseudo tty, no connection can take place.
External Data Representation is a method of encoding data within an RPC message, used to
ensure that the data is not system-dependent.
DORA stands for discover , offer , request and acknowledgementwhen we install a dhcp server into
our network then dhcp server works on the basis of dora process first dhcp server sends a hello
message..
Subnetting divides one large network into several smaller ones. It adds an intermediate level of
hierarchy in IP addressing.
To create or to perform subnet addressing the local address should be divided into a number
identifying the physical network and a number identifying the host on the subnet. Then the senders
route m...
Default port no. For telnet ___ ? snmp ____? ftp ____?
FTP - 20/21
SNMP - 161
Telnet – 23
In a workgroup: All computers are peers; no computer has control over another computer. Each
computer has a set of user accounts. To use any computer in the workgroup, you must have an
account on th...
Domain can be accessed from anywhere in the world were internet is provided, while
workgroup is a small network which can be accessed only if we are in that network.
Along any transmission path from a given source to a given destination, a group of virtual circuits can
be grouped together into what is called path.
5-4-3 rule is a guideline for Ethernet computer networks along with the number of repeaters and
segments on shared-access. The rule says that in an network there can be no more than five network
segme...
What is multicast routing?
Sending one packet of message to several destinations is known as multicast routing and algorithm
which defines its route is known as multicast routing algorithm.
Mail gateway is a means which connect two or more electronic mail system and helps in
transfer of message between them.During complex mapping and translation there is a store
and forward scheme where ...
Within an autonomous system the interior gateway protocol (IGP) is used to exchange
routing information.
There are two types of IGP
1.Distance-vector routing protocol
2.Link-state routing protocol.
What is beaconing?
Beaconing is a process which allows the network to render their network problems by them-
selfToken ring and FDDI(Fibre Distributed Data Interface) networks make use of this process. It is
also a sign...
The internet layer packs data into data packets known as IP datagrams, which contain source and
destination address information that is used to forward the datagrams between hosts and across
networks....
What are headers and trailers? How are they added and removed?
Headers and trailers are the concepts of OSI model. Headers are information structures which
identifies the information that follows, such as a block of bytes in communication. Trailer is the
informat...
What are the thre (3) types of transmission media? List out their advantages and distadvantages
If you are given the ip address can u tell how many computers can be connected?What do
you look at?
1 ip address belong to 1 system only becz each and every system should know there own ip to
communicate and transfer the data if u give same ip to more than 1 system it will throw u error.
For Example in Class AIf IP address is 1.0.0.1 then Network bits is 8 bits and hosts bits are 24bits by
calculating by formula 2n-2 (2power)Their fore for 1.0.0.1 the no computers can be connected
1,67,77,214.
When were OSI model developed and why its standard called 802.XX and so
on?
OSI model was developed in February1980 that why these also known as 802.XX Standard
(Notice 80 means ==> 1980, 2means ==> February)
If you have not activated windows XP, you can do so at any time by clicking the windows
Activation icon in the system tray to initiate activation. Once you have activated windows
XP, this icon disappears from the system tray.
For registration
Start ==> Run ==> regwiz /r
In computer it's known as com port and could be available in 9pin or 25 pin. On router it have
60 pins.
My computer ==> right click ==> manage ==> disk management ==>
select free space ==> right click ==> New partition
What is IP?
It's a unique 32 bits software address of a node in a network.
Three ranges of IP addresses have been reserved for private address and they are not valid for
use on the Internet. If you want to access internet with these address you must have to use
proxy server or NAT server (on normal cases the role of proxy server is played by your
ISP.).If you do decide to implement a private IP address range, you can use IP addresses from
any of the following classes:
Class A 10.0.0.0 10.255.255.255
Class B 172.16.0.0 172.31.255.255
Class C 192.168.0.0 192.168.255.255
My computer ==> right click ==> manage ==> disk management ==>
select free space ==> right click ==> New partition
What is IP?
Three ranges of IP addresses have been reserved for private address and they are not valid for
use on the Internet. If you want to access internet with these address you must have to use
proxy server or NAT server (on normal cases the role of proxy server is played by your
ISP.).If you do decide to implement a private IP address range, you can use IP addresses from
any of the following classes:
Class A 10.0.0.0 10.255.255.255
Class B 172.16.0.0 172.31.255.255
Class C 192.168.0.0 192.168.255.255
A public IP address is an address leased from an ISP that allows or enables direct Internet
communication.
With static IP addressing, a computer (or other device) is configured to always use the same
IP address. With dynamic addressing, the IP address can change periodically and is managed
by a centralized network service
The address for a device as it is identified at the Media Access Control (MAC) layer in
the network architecture. MAC address is usually stored in ROM on the network
adapter card and is unique.
What is cladding?
A layer of a glass surrounding the center fiber of glass inside a fiber-optic cable.
A gateway operates at the upper levels of the OSI model and translates information
between two completely different network architectures or data formats
When the computers on the network simply listen and receive the signal, they are
referred to as passive because they don’t amplify the signal in any way. Example for
passive topology - linear bus.
What is SAP?
Series of interface points that allow other computers to communicate with the other
layers of network protocol stack.
What is subnet?
A generic term for section of a large networks usually separated by a bridge or router.
What is IP?
The “ARP” stands for Address Resolution Protocol. The ARP standard defines two
basic message types: a request and a response. a request message contains an IP address
and requests the corresponding hardware address; a replay contains both the IP
address, sent in the request, and the hardware address.
What is data link layer in the OSI reference model responsible for?
Data link layer is located above the physical layer, but below the network layer. Taking
raw data bits and packaging them into frames. The network layer will be responsible
for addressing the frames, while the physical layer is reponsible for retrieving and
sending raw data bits.
The order by which the network protocols are used for client-server communications.
The most frequently used protocols should be at the top.
How do cryptography-based keys ensure the validity of data transferred across the
network?
What is UTP?
UTP — Unshielded twisted pair 10BASE-T is the preferred Ethernet medium of the
90s. It is based on a star topology and provides a number of advantages over coaxial
media.
It uses inexpensive, readily available copper phone wire. UTP wire is much easier to
install and debug than coax. UTP uses RG-45 connectors, which are cheap and reliable.
Routers are machines that direct a packet through the maze of networks that stand
between its source and destination. Normally a router is used for internal networks
while a gateway acts a door for the packet to reach the ‘outside’ of the internal network
What is Semaphore? What is deadlock?
Deadlock is a situation when two or more processes are waiting indefinitely for an event
that can be caused by only one of the waiting processes. The implementation of a
semaphore with a waiting queue may result in this situation.
What is APIPA?
The LMHOSTS file is a static method of resolving NetBIOS names to IP addresses in the
same way that the HOSTS file is a static method of resolving domain names into IP
addresses. An LMHOSTS file is a text file that maps NetBIOS names to IP addresses; it must
be manually configured and updated.
A scope is a range, or pool, of IP addresses that can be leased to DHCP clients on a given
subnet.
What is FQDN?
An FQDN contains (fully qualified domain name) both the hostname and a domain name. It
uniquely identifies a host within a DNS hierarchy
Which command will you use to find out the name of the pc in networks?
NSLOOKUP [192.168.0.1]
[Ip of target computer]