(Java Point) Networking Interview Question
(Java Point) Networking Interview Question
o A network is a set of devices that are connected with a physical media link. In a
network, two or more nodes are connected by a physical link or two or more
networks are connected by one or more nodes.
o A network is a collection of devices connected to each other to allow the sharing
of data.
o Example of a network is an internet. An internet connects the millions of people
across the world.
Bus:
o Bus topology is a network topology in which all the nodes are connected to a
single cable known as a central cable or bus.
o It acts as a shared communication medium, i.e., if any device wants to send the
data to other devices, then it will send the data over the bus which in turn sends
the data to all the attached devices.
o Bus topology is useful for a small number of devices. As if the bus is damaged
then the whole network fails.
Star:
o Star topology is a network topology in which all the nodes are connected to a
single device known as a central device.
o Star topology requires more cable compared to other topologies. Therefore, it
is more robust as a failure in one cable will only disconnect a specific computer
connected to this cable.
o If the central device is damaged, then the whole network fails.
o Star topology is very easy to install, manage and troubleshoot.
o Star topology is commonly used in office and home networks.
Ring
Mesh
o Mesh topology is a network topology in which all the nodes are individually
connected to other nodes.
o It does not need any central switch or hub to control the connectivity among
the nodes.
o Mesh topology is categorized into two parts:
o Fully connected mesh topology: In this topology, all the nodes are
connected to each other.
o Partially connected mesh topology: In this topology, all the nodes are
not connected to each other.
o It is a robust as a failure in one cable will only disconnect the specified computer
connected to this cable.
o Mesh topology is rarely used as installation and configuration are difficult when
connectivity gets more.
o Cabling cost is high as it requires bulk wiring.
Tree
o Tree topology is a combination of star and bus topology. It is also known as the
expanded star topology.
o In tree topology, all the star networks are connected to a single bus.
o Ethernet protocol is used in this topology.
o In this, the whole network is divided into segments known as star networks
which can be easily maintained. If one segment is damaged, but there is no
effect on other segments.
o Tree topology depends on the "main bus," and if it breaks, then the whole
network gets damaged.
Hybrid
o Secure
o Support Encapsulation
o Distributed database
o Faster Problem solving
o Security through redundancy
o Collaborative Processing
Network reliability plays a significant role in the network functionality. The network
monitoring systems and devices are the essential requirements for making the network
reliable.The network monitoring system identifies the problems that are occurred in
the network while the network devices ensure that data should reach the appropriate
destination.
o Unauthorized Access
o Viruses
o Frequency of failure
o Recovery time of a network after a failure
9) What is bandwidth?
Every signal has a limit of upper range frequency and lower range frequency. The range
of limit of network between its upper and lower frequency is called bandwidth.
A router sends the data between two similar networks while gateway sends the data
between two dissimilar networks.
Working of DNS:
If you want to visit the website of "javaTpoint", then the user will type
"https://www.javatpoint.com
" into the address bar of the web browser. Once the domain name is entered, then the domain
name system will translate the domain name into the IP address which can be easily
interpreted by the computer. Using the IP address, the computer can locate the web page
requested by the user.
13) What is DNS forwarder?
o A forwarder is used with DNS server when it receives DNS queries that cannot
be resolved quickly. So it forwards those requests to external DNS servers for
resolution.
o A DNS server which is configured as a forwarder will behave differently than the
DNS server which is not configured as a forwarder.
o Following are the ways that the DNS server behaves when it is configured
as a forwarder:
o When the DNS server receives the query, then it resolves the query by
using a cache.
o If the DNS server is not able to resolve the query, then it forwards the
query to another DNS server.
o If the forwarder is not available, then it will try to resolve the query by
using root hint.
o NIC stands for Network Interface Card. It is a peripheral card attached to the PC
to connect to a network. Every NIC has its own MAC address that identifies the
PC on the network.
o It provides a wireless connection to a local area network.
o NICs were mainly used in desktop computers.
o Syntax: It specifies the structure or format of the data. It also specifies the order
in which they are presented.
o Semantics: It specifies the meaning of each section of bits.
o Timing: Timing specifies two characteristics: When data should be sent and how
fast it can be sent.
The Domain Name System is the second type supporting program that is used by other
programs such as to find the IP address of an e-mail recipient.
o Network layer: Layer 1, Layer 2 and layer 3 are the network layers.
o Transport layer: Layer 4 is a transport layer.
o Application layer. Layer 5, Layer 6 and Layer 7 are the application layers.
1. Physical Layer
2. DataLink Layer
o It is used for transferring the data from one node to another node.
o It receives the data from the network layer and converts the data into data
frames and then attach the physical address to these frames which are sent to
the physical layer.
o It enables the error-free transfer of data from one node to another node.
Functions of Data-link layer:
o Frame synchronization: Data-link layer converts the data into frames, and it
ensures that the destination must recognize the starting and ending of each
frame.
o Flow control: Data-link layer controls the data flow within the network.
o Error control: It detects and corrects the error occurred during the transmission
from source to destination.
o Addressing: Data-link layer attach the physical address with the data frames so
that the individual machines can be easily identified.
o Link management: Data-link layer manages the initiation, maintenance and,
termination of the link between the source and destination for the effective
exchange of data.
3. Network Layer
o Network layer converts the logical address into the physical address.
o It provides the routing concept means it determines the best route for the
packet to travel from source to the destination.
Functions of network layer:
o Routing: The network layer determines the best route from source to
destination. This function is known as routing.
o Logical addressing: The network layer defines the addressing scheme to
identify each device uniquely.
o Packetizing: The network layer receives the data from the upper layer and
converts the data into packets. This process is known as packetizing.
o Internetworking: The network layer provides the logical connection between
the different types of networks for forming a bigger network.
o Fragmentation: It is a process of dividing the packets into the fragments.
4. Transport Layer
o It delivers the message through the network and provides error checking so
that no error occurs during the transfer of data.
o It provides two kinds of services:
o Connection-oriented transmission: In this transmission, the receiver
sends the acknowledgement to the sender after the packet has been
received.
o Connectionless transmission: In this transmission, the receiver does not
send the acknowledgement to the sender.
5. Session Layer
6. Presentation Layer
7. Application Layer
1. Application Layer
2. Transport Layer
3. Internet Layer
4. Network Layer
46) What is the difference between TCP/IP model and the OSI
model?
Following are the differences between the TCP/IP model and OSI model:
Full form of TCP is transmission control Full form of OSI is Open System Interconnection.
protocol.
TCP/IP is more reliable than the OSI OSI model is less reliable as compared to the TCP/IP
model. model.
TCP/IP model uses horizontal approach. OSI model uses vertical approach.
TCP/IP model uses both session and OSI Reference model uses separate session and
presentation layer in the application presentation layers.
layer.
TCP/IP model developed the protocols OSI model developed the model first and then
first and then model. protocols.
In Network layer, TCP/IP model supports In the Network layer, the OSI model supports both
only connectionless communication. connection-oriented and connectionless
communication.
TCP/IP model is a protocol dependent. OSI model is a protocol independent.
Workgroup Domain
Every user can manage the resources There is one administrator to administer the domain
individually on their PCs. and its resources.
All the computers must be on the same The computer can be on any network or anywhere
local area network. in the world.
Each computer must be changed Any change made to the computer will reflect the
manually. changes to all the computers.