Networking Viva
Networking Viva
A router is used to connect multiple networks together and forward data packets
between them based on their IP addresses.
How does a switch differ from a hub?
A switch can intelligently forward data packets to specific devices based on their MAC
addresses, whereas a hub simply broadcasts data to all connected devices.
What is the role of a gateway in networking?
A gateway acts as an entry or exit point between different networks, enabling
communication and routing of data between them.
How does a repeater function in a network?
A repeater amplifies or regenerates network signals to extend the distance over which
the signals can travel without degradation.
What are the primary functions of a network interface card (NIC)?
The primary functions of a network interface card are to connect a computer or device
to a network, transmit and receive data packets, and manage network communication.
What is the purpose of a modem in networking?
A modem is used to modulate and demodulate data signals, allowing devices to
transmit and receive data over different types of communication channels, such as
telephone lines or cable lines.
How does a wireless access point (WAP) enable wireless connectivity?
A wireless access point allows wireless devices to connect to a wired network by
transmitting and receiving wireless signals, enabling wireless connectivity and access to
the network resources.
What is the role of a bridge in connecting network segments?
A bridge connects multiple network segments or LANs and forwards network traffic
between them based on MAC addresses. It operates at the data link layer of the OSI
model.
How does a firewall enhance network security?
A firewall monitors and controls incoming and outgoing network traffic based on
predefined security rules, providing a barrier against unauthorized access, malicious
activities, and potential threats.
What is the function of a network switch in a local area network (LAN)?
A network switch forwards data packets between devices within a local area network
(LAN) based on their MAC addresses. It allows for efficient and direct communication
between devices.
How does a network hub differ from a switch?
A hub simply broadcasts data to all connected devices in a network, while a switch
intelligently forwards data packets to specific devices based on their MAC addresses,
leading to better network performance and reduced collisions.
What is the purpose of a network interface card (NIC) in a computer?
A network interface card (NIC) allows a computer to connect to a network, providing a
physical interface for transmitting and receiving data packets over the network.
How does a wireless router combine the functions of a router and a wireless
access point?
A wireless router combines the functions of a router, which forwards data between
networks, and a wireless access point, which enables wireless connectivity for devices to
connect to the network.
What is the role of a network load balancer?
A network load balancer distributes incoming network traffic across multiple servers or
network resources to optimize resource utilization, enhance performance, and ensure
high availability of services.
How does a network bridge differ from a router?
A network bridge operates at the data link layer of the OSI model and connects two or
more network segments, forwarding network traffic based on MAC addresses. A router
operates at the network layer and forwards data packets based on IP addresses between
different networks.
What is the function of a network repeater in extending network signals?
A network repeater amplifies or regenerates network signals, allowing them to travel
over longer distances without signal degradation, thereby extending the reach of the
network.
What is the purpose of a network modem in connecting to the internet?
A network modem is used to modulate and demodulate data signals to connect a
computer or network to the internet via communication channels like DSL, cable, or
fiber, translating digital data to be transmitted over the appropriate medium.
How does a network gateway facilitate communication between different
networks?
A network gateway acts as an intermediary between different networks, enabling
communication by routing data packets between them, translating protocols if
necessary, and ensuring proper delivery of data.
How does a network switch handle data traffic in a local area network (LAN)?
A network switch receives data packets from devices connected to it and forwards them
to the intended destination device based on the MAC address. It creates dedicated
communication paths, known as switch ports, for each connected device, allowing for
simultaneous and efficient data transmission.
What is the role of a wireless access point (WAP) in a wireless network?
A wireless access point enables wireless devices to connect to a wired network by
transmitting and receiving wireless signals, providing wireless connectivity and access to
network resources within the wireless network coverage area.
1. Explain the difference between TCP and UDP protocols.
2. What is the purpose of IP addressing in networking?
3. Describe the process of subnetting and its significance in network design.
4. How does NAT (Network Address Translation) work, and what is its role in network
communication?
5. What is the purpose of DNS (Domain Name System) in networking?
6. Describe the steps involved in establishing a TCP connection between two hosts.
7. What is the purpose of a default gateway in a network, and how is it determined?
8. Explain the concept of VLAN (Virtual Local Area Network) and its benefits in network
segmentation.
9. Describe the function of a firewall in network security and the different types of firewalls.
What is the purpose of ARP (Address Resolution Protocol) in network communication?
OR
1. TCP is a protocol that ensures reliable and ordered delivery of data, while UDP is a protocol that
provides faster but unreliable delivery of data.
2. IP addressing assigns unique numerical identifiers to devices in a network, allowing them to
communicate with each other.
3. Subnetting involves dividing a larger network into smaller subnetworks, which helps improve
network organization, efficiency, and security.
4. Network Address Translation (NAT) allows multiple devices in a private network to share a single
public IP address, enabling them to communicate with the internet.
5. The Domain Name System (DNS) is responsible for translating domain names (such as
www.example.com) into IP addresses, enabling devices to locate and communicate with servers
on the internet.
6. Establishing a TCP connection involves a three-step process called the three-way handshake: the
client sends a synchronization (SYN) packet, the server responds with a synchronization-
acknowledgment (SYN-ACK) packet, and the client sends an acknowledgment (ACK) packet to
confirm the connection.
7. A default gateway is the IP address of the router that serves as the entry and exit point for a
network, enabling communication between devices in different networks.
8. Virtual Local Area Networks (VLANs) logically segment a physical network into multiple virtual
networks, allowing for improved network performance, security, and flexibility.
9. Firewalls are security devices that monitor and control network traffic, protecting networks
from unauthorized access and potential threats.
10. The Address Resolution Protocol (ARP) is used to map an IP address to a corresponding Media
Access Control (MAC) address, enabling devices to communicate with each other within a local
network.
Certainly! Here are a few more questions for your networking viva:
1. The main difference between a hub and a switch is that a hub operates at the physical layer of
the OSI model, while a switch operates at the data link layer. A hub broadcasts incoming data to
all connected devices, while a switch intelligently forwards data only to the intended recipient
based on its MAC address.
2. A MAC address (Media Access Control address) is a unique identifier assigned to a network
interface card (NIC) at the data link layer of the OSI model. It is used to identify and locate
devices on a network. MAC addresses are essential for communication within a local network.
3. Port numbers in TCP (Transmission Control Protocol) and UDP (User Datagram Protocol)
communication serve as endpoints that identify specific processes or services running on a
device. Port numbers allow multiple applications to use network resources simultaneously on a
single device.
4. IP routing is the process of forwarding data packets from one network to another across a
network infrastructure. Routers determine the best path for data transmission using routing
protocols and routing tables that store information about network topology, including IP
addresses and associated network segments.
5. DHCP (Dynamic Host Configuration Protocol) is a network protocol that automates the process
of assigning IP addresses and other network configuration parameters to devices in a network.
DHCP ensures that devices can join a network seamlessly without manual IP configuration.
6. Quality of Service (QoS) is a set of techniques and mechanisms used to prioritize network traffic
and ensure reliable performance for critical applications. QoS allows network administrators to
allocate bandwidth, manage congestion, and control latency, jitter, and packet loss to meet
specific performance requirements.
7. Common types of wireless security protocols used in Wi-Fi networks include WEP (Wired
Equivalent Privacy), WPA (Wi-Fi Protected Access), and WPA2 (Wi-Fi Protected Access 2). WPA3
is the latest and more secure protocol that provides enhanced encryption and authentication
methods.
8. An SSL/TLS certificate is a digital certificate that authenticates the identity of a website and
enables secure encrypted communication over the internet. It ensures that the data transmitted
between the web server and the client browser remains private and cannot be intercepted or
tampered with.
9. A Virtual Private Network (VPN) is a secure, encrypted connection that allows remote users to
access a private network over a public network (e.g., the internet). VPNs provide confidentiality,
integrity, and authentication to protect sensitive data and enable secure remote access to a
network.
10. Network latency refers to the delay experienced when transmitting data across a network. It is
influenced by factors such as distance, congestion, and the processing time at various network
devices. High latency can lead to delays, decreased network performance, and affect real-time
applications like video conferencing or online gaming.
Certainly! Here are a few more questions for your networking viva:
1. What is the purpose of ICMP (Internet Control Message Protocol) in networking, and give an
example of its use.
2. Explain the concept of a subnet mask and how it is used in IP addressing.
3. What is the role of a proxy server in network communication and security?
4. Describe the process of NAT traversal and its importance in establishing communication
between devices on different networks.
5. What are the advantages and disadvantages of IPv6 compared to IPv4?
6. Explain the concept of port forwarding and its application in network configurations.
7. What is the purpose of VLAN trunking and how does it enable communication between multiple
VLANs?
8. Describe the difference between symmetric encryption and asymmetric encryption in network
security.
9. What are the main components of a firewall rule and how do they contribute to network
security?
10. Explain the concept of network congestion and the techniques used to alleviate it.
1. What is the purpose of ARP (Address Resolution Protocol) cache, and how does it optimize
network communication?
2. Explain the concept of port scanning and its significance in network security.
3. What are the differences between a router and a gateway in a network architecture?
4. Describe the process of DNS resolution and the various types of DNS records.
5. What is the role of a network switch in a local area network (LAN) setup?
6. Explain the concept of packet sniffing and its potential risks to network security.
7. What is the significance of the OSI (Open Systems Interconnection) model in networking, and
what are its different layers?
8. Describe the concept of network virtualization and its benefits in data center environments.
9. What are the differences between a static IP address and a dynamic IP address?
10. Explain the concept of network segmentation and its importance in network management and
security.
Certainly! Here are a few more questions for your networking viva:
1. Explain the concept of port forwarding and its application in network configurations.
2. What is the purpose of VLAN tagging and how does it facilitate virtual LAN communication?
3. Describe the process of DHCP (Dynamic Host Configuration Protocol) lease renewal and its
impact on network devices.
4. What are the differences between a stateful firewall and a stateless firewall?
5. Explain the concept of load balancing and its benefits in network performance and availability.
6. What is the role of a DNS resolver and how does it help in domain name resolution?
7. Describe the concept of network address translation (NAT) and its different modes of operation.
8. What are the advantages and disadvantages of using a wireless network compared to a wired
network?
9. Explain the concept of multicast routing and its applications in multimedia streaming.
10. What is the purpose of a VPN (Virtual Private Network) tunnel and how does it ensure secure
communication over an untrusted network?
11. What is the difference between symmetric encryption and asymmetric encryption, and when
are they typically used in network communication?
12. What is the purpose of a DNS cache, and how does it improve DNS resolution time?
13. Explain the concept of dynamic routing protocols and provide examples of commonly used
dynamic routing protocols.
14. What is the role of a proxy server in network communication, and how does it provide
additional security and privacy?
Solutions:-
1. Port Forwarding: Port forwarding allows incoming traffic to be redirected from one port to
another on a router, enabling access to a specific device or service on a private network.
2. VLAN Tagging: VLAN tagging involves adding additional information (VLAN ID) to Ethernet
frames, allowing switches to identify and separate traffic belonging to different VLANs within a
network.
3. DHCP Lease Renewal: DHCP lease renewal is the process where a DHCP client requests an
extension of its IP address lease from the DHCP server to maintain network connectivity.
4. Stateful Firewall vs. Stateless Firewall: A stateful firewall monitors the state of network
connections and inspects the contents of packets, making decisions based on the context of the
connection. In contrast, a stateless firewall filters packets based on pre-defined rules without
considering the connection's state.
5. Load Balancing: Load balancing distributes network traffic across multiple servers to optimize
resource utilization, improve performance, and ensure high availability by preventing
overloading of any individual server.
6. DNS Resolver: A DNS resolver is a component that queries DNS servers on behalf of clients,
translating domain names into IP addresses for successful communication over the internet.
7. Network Address Translation (NAT): NAT is a process where IP addresses in a packet are
modified as it passes through a router or firewall, allowing devices on a private network to
communicate with devices on public networks using a single public IP address.
8. Wireless Network vs. Wired Network: Wireless networks use radio waves to transmit data,
providing mobility and convenience but with potential limitations in terms of speed, range, and
security compared to wired networks that use physical cables for data transmission.
9. Multicast Routing: Multicast routing enables the efficient distribution of data to multiple
recipients simultaneously, commonly used for multimedia streaming and group communication.
10. VPN Tunnel: A VPN tunnel creates a secure, encrypted connection over an untrusted network,
such as the internet, allowing remote users to access a private network securely.
11. Symmetric encryption uses the same key for both encryption and decryption. It is typically faster
and more efficient than asymmetric encryption but requires secure key distribution. Symmetric
encryption is commonly used for bulk data encryption, such as securing file transfers or
encrypting data within a closed network. Asymmetric encryption, on the other hand, uses a pair
of mathematically related keys: a public key for encryption and a private key for decryption. It
provides better security but is slower than symmetric encryption. Asymmetric encryption is
often used for key exchange, digital signatures, and secure communication over open networks
like the internet.
12. A DNS cache is a temporary storage of DNS (Domain Name System) records that a device or
network maintains. It stores the results of previous DNS queries, including the resolved IP
addresses for domain names. By caching DNS records, devices can avoid repeated DNS lookups
for the same domain names, improving DNS resolution time. DNS caching reduces the need to
query authoritative DNS servers, which can reduce network latency and improve overall DNS
performance.
13. Dynamic routing protocols are network protocols that automatically update routing tables and
exchange routing information between routers in real-time. They dynamically adapt to changes
in network topology, such as link failures or newly discovered routes. Examples of commonly
used dynamic routing protocols include OSPF (Open Shortest Path First), RIP (Routing
Information Protocol), EIGRP (Enhanced Interior Gateway Routing Protocol), and BGP (Border
Gateway Protocol). These protocols allow routers to discover and select the best available paths
for data transmission in dynamic network environments.
14. A proxy server acts as an intermediary between clients and servers in network communication.
It receives requests from clients and forwards them to servers on behalf of the clients, then
relays the server's response back to the clients. Proxy servers provide additional security and
privacy by hiding the client's IP address and acting as a buffer between the client and server.
They can filter and block malicious or unauthorized content, perform content caching to
improve performance, and provide access control to restrict certain types of network traffic.
outline