Computer Networks
Computer Networks
1. Describe the OSI Reference Model and Describe about the 7 layers of OSI
Reference Layers
Open System Interconnections (OSI) is a network architecture model based on the ISO
standards. It is called the OSI model as it deals with connecting the systems that are open
for communication with other systems.
2. Describe the TCP/IP Reference Model and define the 4 layers of TCP/IP.
It is a compressed version of the OSI model with only 4 layers. It was developed by the US
Department of Defence (DoD) in the 1980s. The name of this model is based on 2 standard
protocols used i.e. TCP (Transmission Control Protocol) and IP (Internet Protocol).
Layer Description
Decides which links such as serial lines or classic Ethernet must be used to
Link
meet the needs of the connectionless internet layer.
The internet layer is the most important layer which holds the whole
architecture together.
Internet
It delivers the IP packets where they are supposed to be delivered.
Its functionality is almost the same as the OSI transport layer. It enables peer
Transport
entities on the network to carry on a conversation.
Application It contains all the higher-level protocols.
5. What are proxy servers, and how do they protect computer networks?
Proxy servers prevent external users from identifying the IP addresses of an internal network.
They make a network virtually invisible to external users, who cannot identify the physical
location of a network without knowledge of the correct IP address.
6. What is a switch?
A switch is a network device that connects multiple devices or networks together. It allows
you to quickly and easily connect different devices to a network, providing the ability to
share data or resources between them. It also allows for the creation of separate networks for
different users or devices.
8. In which OSI layer Header and Trailer are added? What happens in the OSI model,
as a data packet moves from the lower to upper layers? What happens in the OSI
model, as a data packet moves from the upper to lower layers?
At the Data link layer trailer is added and at the OSI model layer 6,5,4,3 added header.
In the OSI model, as a data packet moves from the lower to upper layers, headers get
removed.
In the OSI model, as a data packet moves from the upper to lower layers, headers are
added. This header contains useful information.
9. What is IP Spoofing?
IP Spoofing is essentially a technique used by hackers to gain unauthorized access to
Computers. Concepts of IP Spoofing were initially discussed in academic circles as early as
1980. IP Spoofing types of attacks had been known to Security experts on the theoretical
level. It was primarily theoretical until Robert Morris discovered a security weakness in
the TCP protocol known as sequence prediction. Occasionally IP spoofing is done to mask
the origins of a Dos attack. In fact, Dos attacks often mask the actual IP addresses from
where the attack has originated from.
10. What is TCP and UDP and also compare about TCP and UDP.
TCP or TCP/IP is the Transmission Control Protocol/Internet Protocol. It is a set of rules
that decides how a computer connects to the Internet and how to transmit the data over the
network. It creates a virtual network when more than one computer is connected to the
network and uses the three ways handshake model to establish the connection which makes
it more reliable.
UDP is the User Datagram Protocol and is based on Datagrams. Mainly, it is used for
multicasting and broadcasting. Its functionality is almost the same as TCP/IP Protocol
except for the three ways of handshaking and error checking. It uses a simple transmission
without any hand-shaking which makes it less reliable.
TCP/IP UDP
Connection-Oriented Protocol Connectionless Protocol
More Reliable Less Reliable
Slower Transmission Faster Transmission
Packets order can be preserved or can be Packets order is not fixed and packets are
rearranged independent of each other
Uses three ways handshake model for
No handshake for establishing the connection
connection
TCP packets are heavy-weight UDP packets are light-weight
Offers error checking mechanism No error checking mechanism
Protocols like DNS, RIP, SNMP, RTP,
Protocols like HTTP, FTP, Telnet, SMTP,
BOOTP, TFTP, NIP, etc. use UDP at the
HTTPS, etc. use TCP at the transport layer
transport layer
11. What is a network? What are some of its benefits?
A network consists of two or more separate devices linked together such that they can
communicate. Networks can be classified according to different criteria such as scope, type
of connection, functional relationship, topology, or function, among others.
3. Improved data security - Networks can be configured with security features such as
firewalls and access controls to protect against unauthorised access.
5. Cost savings - By sharing resources, networks can reduce hardware and software
costs.
14. What is the MAC address and how is it related to NIC? Differentiate the MAC
address with the IP address
MAC address is the Media Access Control address. It is a 48-bit or 64-bit unique identifier
of devices in the network. It is also called the physical address embedded with Network
Interface Card (NIC) used at the Data Link Layer. NIC is a hardware component in the
networking device using which a device can connect to the network.
17. Name of the software layers or User support layer in the OSI model.
Application layer
Presentation layer
Session layer
Name the hardware layers or network support layers in the OSI model.
Network layer
Datalink layer
Physical layer
Access VPN: Access VPN is used to provide connectivity to remote mobile users
and telecommuters. It serves as an alternative to dial-up connections or ISDN (Integrated
Services Digital Network) connections. It is a low-cost solution and provides a wide range
of connectivity.
Site-to-Site VPN: A Site-to-Site or Router-to-Router VPN is commonly used in
large companies having branches in different locations to connect the network of one office
to another in different locations. There are 2 sub-categories as mentioned below:
Intranet VPN: Intranet VPN is useful for connecting remote offices in different
geographical locations using shared infrastructure (internet connectivity and servers) with
the same accessibility policies as a private WAN (wide area network).
Extranet VPN: Extranet VPN uses shared infrastructure over an intranet, suppliers,
customers, partners, and other entities and connects them using dedicated connections.
24. Explain about ICMP protocol, DHCP Protocol, ARP protocol, FTP protocol
ICMP is the Internet Control Message Protocol. It is a network layer protocol used for
error handling. It is mainly used by network devices like routers for diagnosing the network
connection issues and crucial for error reporting and testing if the data is reaching the
preferred destination in time. It uses port 7 by default.
DHCP is the Dynamic Host Configuration Protocol.It is an application layer protocol used
to auto-configure devices on IP networks enabling them to use the TCP and UDP-based
protocols. The DHCP servers auto-assign the IPs and other network configurations to the
devices individually which enables them to communicate over the IP network. It helps to
get the subnet mask, IP address and helps to resolve the DNS. It uses port 67 by default.
FTP is a File Transfer Protocol. It is an application layer protocol used to transfer files and
data reliably and efficiently between hosts. It can also be used to download files from
remote servers to your computer. It uses port 27 by default.
Node: Any communicating device in a network is called a Node. Node is the point of
intersection in a network. It can send/receive data and information within a network.
Examples of the node can be computers, laptops, printers, servers, modems, etc.
Link: A link or edge refers to the connectivity between two nodes in the network. It
includes the type of connectivity (wired or wireless) between the nodes and protocols used
for one node to be able to communicate with the other.
26. What is the network topology and describe about different types of network
topology?
Network topology is a physical layout of the network, connecting the different nodes using
the links. It depicts the connectivity between the computers, devices, cables, etc.
Bus Topology:
All the nodes are connected using the central link known as the bus.
It is useful to connect a smaller number of devices.
If the main cable gets damaged, it will damage the whole network.
Star Topology:
All the nodes are connected to one single node known as the central node.
It is more robust.
If the central node fails the complete network is damaged.
Easy to troubleshoot.
Mainly used in home and office networks.
Ring Topology:
Mesh Topology:
Each node is connected to one or many nodes.
It is robust as failure in one link only disconnects that node.
It is rarely used and installation and management are difficult.
Tree Topology:
A combination of star and bus topology also known as an extended bus topology.
All the smaller star networks are connected to a single bus.
If the main bus fails, the whole network is damaged.
Hybrid:
HTTP is the HyperText Transfer Protocol which defines the set of rules and standards on
how the information can be transmitted on the World Wide Web (WWW). It helps the web
browsers and web servers for communication. It is a ‘stateless protocol’ where each
command is independent with respect to the previous command. HTTP is an application layer
protocol built upon the TCP. It uses port 80 by default.
HTTPS is the HyperText Transfer Protocol Secure or Secure HTTP. It is an advanced and
secured version of HTTP. On top of HTTP, SSL/TLS protocol is used to provide security. It
enables secure transactions by encrypting the communication and also helps identify network
servers securely. It uses port 443 by default.
28. What is the SMTP protocol?
SMTP is the Simple Mail Transfer Protocol. SMTP sets the rule for communication
between servers. This set of rules helps the software to transmit emails over the internet. It
supports both End-to-End and Store-and-Forward methods. It is in always-listening mode
on port 25.
29. What is an IPv4 address? What are the different classes of IPv4?
An IP address is a 32-bit dynamic address of a node in the network. An IPv4 address has 4
octets of 8-bit each with each number with a value up to 255.
IPv4 classes are differentiated based on the number of hosts it supports on the network.
There are five types of IPv4 classes and are based on the first octet of IP addresses which
are classified as Class A, B, C, D, or E.
30. What is the minimum size of the icmpV4 packet what is the maximum size of the
icmpv4 packet?
Minimum size ICMPv4 packet = 28 bytes
Maximum size ICMPv4 packet = 2068 bytes
38. What is the DNS? What is the protocol and port no of DNS?
DNS is the Domain Name System. It is considered as the devices/services directory of the
Internet. It is a decentralized and hierarchical naming system for devices/services connected
to the Internet. It translates the domain names to their corresponding IPs. For e.g.
interviewbit.com to 172.217.166.36. It uses port 53 by default. It uses TCP/UDP protocol.
40. What are the different types of network cables used in networking?
The different types of cables used in networks are –
Unshielded Twisted Pair (UTP) Cable
Shielded Twisted Pair (STP) Cable
Cable Installation Guides
Coaxial Cable
Fibre Optic Cable
Wireless LANs
45. Which of the multiplexing technique is used to combine analog signals also what
technique is used to combine digital signals?
To combine analog signals, commonly FDM(Frequency division multiplexing) and WDM
(Wavelength-division multiplexing) are used.
To combine digital signals, time division multiplexing techniques are used.
46. What is the use of a router and how is it different from a gateway?
The router is a networking device used for connecting two or more network segments. It
directs the traffic in the network. It transfers information and data like web pages, emails,
images, videos, etc. from source to destination in the form of packets. It operates at the
network layer. The gateways are also used to route and regulate the network traffic but, they
can also send data between two dissimilar networks while a router can only send data to
similar networks.
Hub Switch
Operates at Physical Layer Operates at Data Link Layer
Half-Duplex transmission mode Full-Duplex transmission mode
Ethernet devices can be connected send LAN devices can be connected
Less complex, less intelligent, and cheaper Intelligent and effective
No software support for the administration Administration software support is
present
Less speed up to 100 MBPS Supports high speed in GBPS
Less efficient as there is no way to avoid collisions More efficient as the collisions can be
when more than one nodes sends the packets at the avoided or reduced as compared to
same time Hub
49. What is the difference between the ipconfig and the ifconfig?
ipconfig ifconfig
Internet Protocol Configuration Interface Configuration
Command used in Microsoft operating Command used in MAC, Linux, UNIX
systems to view and configure network operating systems to view and configure
interfaces network interfaces
Used to get the TCP/IP summary and allows to changes the DHCP and DNS settings
The firewall is a network security system that is used to monitor the incoming and outgoing
traffic and blocks the same based on the firewall security policies. It acts as a wall between
the internet (public network) and the networking devices (a private network). It is either a
hardware device, software program, or a combination of both. It adds a layer of security to
the network.
This is among the popularly asked networking interview questions. The firewall ‘listens’ for
what information packets are trying to leave or enter the computer system. Blocking can be
done based on various criteria, such as the IP to which they are destined, the type of port used
to send them, or the application of origin.
One of the most complex aspects of using firewalls lies in their configuration, in deciding
what types of connections are blocked and which ones are not.
Bluetooth has no full form. While Wifi stands for Wireless Fidelity.
Unicasting: If the message is sent to a single node from the source then it is known as
unicasting. This is commonly used in networks to establish a new connection.
Any casting: If the message is sent to any of the nodes from the source then it is
known as any casting. It is mainly used to get the content from any of the servers in the
Content Delivery System.
Multicasting: If the message is sent to a subset of nodes from the source then it is
known as multicasting. Used to send the same data to multiple receivers.
Broadcasting: If the message is sent to all the nodes in a network from a source then it
is known as broadcasting. DHCP and ARP in the local network use broadcasting.
54. What happens when you enter google.com in the web browser?
Check the browser cache first if the content is fresh and present in cache display the
same.
If not, the browser checks if the IP of the URL is present in the cache (browser and
OS) if not then request the OS to do a DNS lookup using UDP to get the corresponding IP
address of the URL from the DNS server to establish a new TCP connection.
A new TCP connection is set between the browser and the server using three-way
handshaking.
An HTTP request is sent to the server using the TCP connection.
The web servers running on the Servers handle the incoming HTTP request and send
the HTTP response.
The browser process the HTTP response sent by the server and may close the TCP
connection or reuse the same for future requests.
If the response data is cacheable then browsers cache the same.
Browser decodes the response and renders the content.
55. Name two technologies by which you would connect two offices in remote
locations.
Two technologies that would connect two offices in remote locations are VPN and Cloud
computing.
The private IP address of a system is the IP address that is used to communicate within the
same network. Using private IP data, information can be sent or received within the same
network.
TCP is reliable as it guarantees the delivery The delivery of data to the destination
of data to the destination router. cannot be guaranteed in UDP.
Transmission control protocol (TCP) User datagram protocol (UDP)
TCP is used by HTTP, HTTPs, FTP, SMTP UDP is used by DNS, DHCP, TFTP, SNMP,
and Telnet. RIP, and VoIP.
7. What is TELNET?
TELNET is a client-service protocol on the internet or local area network, allowing a user to
log on to a remote device and have access to it. This is among the most commonly asked
networking interview questions. Technically, it is a bidirectional interactive text-oriented
communication facility which uses a virtual terminal connection.
8. How TCP protocol provides reliability?
TCP is reliable as it uses checksum for error detection, attempts to recover lost or corrupted
packets by re-transmission, acknowledgment policy, and timers. It uses features like byte
numbers and sequence numbers and acknowledgment numbers so as to ensure reliability.
9. Write down the name of services provided by TCP?
Process to process communication
Stream orientation
Full duplex service
Multiplexing
Reliability
10. Explain TCP protocol header format? Write the name of all TCP “Flag”?
Simple Mail
25 Transfer Protocol Used to send E-Mail over the Internet TCP
(SMTP)
Hyper Text
80 Transfer Protocol Used for browsing web-pages on a browser TCP
(HTTP)
17. What is the difference between stop-and-wait protocol & sliding window protocol?
Stop-and-Wait Protocol Sliding Window Protocol
In sliding window protocol, sender sends more
In Stop-and-Wait Protocol, sender sends than one frame to the receiver side and re-
one frame and wait for acknowledgment transmits the frame(s) which is/are damaged or
from receiver side. suspected.
Efficiency of Stop-and-Wait Protocol is
worse. Efficiency of sliding window protocol is better.
Sender window size of Stop-and-Wait Sender window size of sliding window protocol is
Protocol is 1. N.
Receiver window size of Stop-and-Wait Receiver window size of sliding window protocol
Protocol is 1. may be 1 or N.
In Stop-and-Wait Protocol, sorting is not In sliding window protocol, sorting may be or
necessary. may not be necessary.
Efficiency of Stop-and-Wait Protocol is Efficiency of sliding window protocol is
1/(1+2*a) N/(1+2*a)
24. If TCP round trip time, RTT is currently 30m sec and the following
acknowledgment comes in after 26, 32 and 24 m sec respectively what is the new RTT
estimate?
(Use α = 0.9)
The formula for estimate new RTT
New RTT = 0.9*30+ (1-0.9)*26
New RTT = 29.6
When the host has to send a packet, the This leaky bucket holds tokens generated at
packet is thrown in a bucket. regular intervals of time.
Bursty traffic is converted into uniform Bucket there is a ready packet, a token is removed
traffic by leaky buckets. from the bucket and the packet is sent.
In practice, a bucket is a finite queue If there is no token in the bucket, the packet
output at a finite rate. cannot be sent.
29. Write advantages of the token bucket over the Leaky bucket algorithm?
If a bucket is full in tokens, tokens are discarded, not packets. While in a leaky
bucket, packets are discarded.
Token Bucket can send large bursts at a faster rate, while buckets always send
packets at a constant rate.
31. What are the TCP connections phases? Write features of TCP sliding window?
In TCP, connection-oriented transmission requires three phases:
Connection establishment
Data Transfer
Connection termination
Features of the TCP sliding window:
It uses variable-size windows to provide flow control as well as reliable transfer.
TCP connections are full-duplex, two transfers proceed simultaneously over each
connection, one in each direction.
It support machine of various speed and size communicate through a network and
also routers of various speeds.
32. What is the maximum size of the TCP header? What is the minimum size of TCP
header?
Maximum size of the TCP header = 60 bytes
Minimum size of the TCP header = 20 bytes
33. Do port addresses need to be unique? Why or why not? Why are port addresses
shorter than IP addresses?
Port addressing is done by the transport layer, which is the 4th layer of the OSI (Open
System Interconnection) Model. Port addresses are short because they have to perform the
end-to-end delivery of the message and the protocols are less in number than computer
systems, therefore, port addresses are less than IP addresses. The IP address refers to the
computer/device connected to the network and the port address refers to a particular
protocol to communicate with the server as per client request.
34. Are both UDP and IP unreliable to the same degree? Why or Why not?
No, UDP is unreliable and connectionless. While IP unreliability lies in the upper layer
protocols. The IP packet becomes reliable if the upper layer protocol is TCP. In terms of
data integrity, UDP is more reliable than IP. The checksum in the IP header only applies to
the header itself, not to the whole packet. The UDP checksum applies to the whole user
segment.
35. Define the term Datagram?
It is a logical unit to transfer information over the network. This data is transmitted from
source to destination. It does not guarantee that data will be delivered or lost on the way. It
has two section headers and a data payload. It travels in-network without establishing a
prior virtual network between source and destination. i.e. Unlike, it has no prior
information about the path between source and destination. This data is frequently divided
into smaller parts and transmitted to the defined route.
36. What are the registered port and Dynamic port?
Registered port: The ports ranging from 1024 to 49151 are not assigned and controlled by
an IANA. They can only be registered with IANA to prevent duplication.
Dynamic port: This port ranging from 49152 to 65535 is neither controlled nor registered.
They can be used in any process.
43. Can the value of the header length in an IPv4 packet be less than 5?
The value of the header length field of an IP packet can never be less than 5 because every
IP datagram must have at least a base header that has a fixed size of 20 bytes.
44. A host is sending 100 datagrams to another host. If the identification number of
the first datagram is 1024, what is the identification number of the last(in IPv4)?
If a source is sending 100 datagrams and for the first datagram identification no is 1024
then for the last datagram identification number will be 1024 + 99 = 1123.
45. Explain the reason for the elimination of the checksum in the IPv6 header?
The checksum is eliminated in IPv6 because it is provided by upper-layer protocols; it is
therefore not needed at this level.
46. Write down the name of three strategies used to handle the transmission from
IPv4 to IPv6?
Dual-stack
Tunnelling
Header translation
49. Suppose the round trip propagation delay for a 10 Mbps Ethernet having a 48-bit
jamming signal is 46.4 ms. what is the minimum frame size?
Transmission Speed = 10Mbps.
Round trip propagation delay = 46.4 ms
The minimum frame size = (Round Trip Propagation Delay) * (Transmission Speed) =
10*(10^6)*46.4*(10^-3) = 464 * 10^3 = 464 Kbit
50. In the slow start phase of the TCP congestion control algorithm, what is the size of
the congestion window?
In the slow start phase of the TCP congestion control algorithm, the size of the congestion
window increases exponentially.
IP ADDRESSING
1. What is IP address?
IP address is an address having information about how to reach a specific host, especially
outside the LAN. An IP address is 32 bit unique address having an address space of 2 32.
Generally, there are two notations in which IP address is written, dotted decimal notation
and hexadecimal notation.
2. What are the different classes of IP addresses and give the range of each class?
IP address is an address having information about how to reach a specific host, especially
outside the LAN. An IP address is 32-bit unique address having an address space of 2 32.
3. What is a ‘subnet’?
A ‘subnet’ is a generic term for a section of an extensive network, usually separated by a
bridge or a router. It also works for the network’s broadcast domains, manages traffic flow,
and helps improve network performance. Uses of the subnet in networking include:
Relieving network congestion
Reallocating IP addresses
Improving network security
4. What is subnet mask?
A subnet mask is a 32-bit number that is used to identify the subnet of an IP address. The
subnet mask is a combination of 1’s and 0’s. 1’s represents network and subnet ID while
0’s represents the host ID. In this case, the subnet mask is,
So, in order to get the network to which the destination address belongs, we have to bitwise
& with a subnet mask.
Before sending the IP packet, the MAC address of the destination must be known. If not so,
then the sender broadcasts the ARP-discovery packet requesting the MAC address of the
intended destination. Since ARP-discovery is broadcast, every host inside that network will
get this message but the packet will be discarded by everyone except that intended receiver
host who’s IP is associated. Now, this receiver will send a unicast packet with its MAC
address (ARP-reply) to the sender of the ARP-discovery packet. After the original sender
receives the ARP-reply, it updates ARP-cache and starts sending a unicast message to the
destination.
14. What is MTU?
A maximum transmission unit also called MTU, is a term used in networking and operating
systems. It defines the largest size of the packet that can be transmitted as a single entit y in
a network connection. The size of the MTU dictates the amount of data that can be
transmitted in bytes over a network.
15. If a class B network on the Internet has a subnet mask of 255.255.248.0, what is the
maximum number of hosts per subnet?
The binary representation of the subnet mask is 11111111.11111111.11111000. 00000000.
There are 21 bits set in a subnet. So 11 (32-21) bits are left for host ids. The total possible
value of host ids is 2^11 = 2048. Out of these 2048 values, 2 addresses are reserved. The
address with all bits as 1 is reserved as broadcast address and the address with all host id
bits as 0 is used as a network address of the subnet.
In general, the number of addresses usable for addressing specific hosts in each network is
always 2^N – 2 where N is the number of bits for host id. So the answer is 2046.
16. What is IP multicast?
Multicasting has one/more senders and one/more recipients participate in data transfer
traffic. In multicasting, traffic reclines between the boundaries of unicast and broadcast. Its
server’s direct single copies of data streams and that are then simulated and routed to hosts
that request it. IP multicast requires the support of some other protocols such as Internet
Group Management Protocol (IGMP), Multicast routing for its work. And also, in Classful
IP, addressing Class D is reserved for multicast groups.
Public IP address–
A public IP address is an Internet Protocol address, encrypted by various servers/devices.
That’s when you connect these devices with your internet connection. This is the same IP
address we show on our homepage. So why the second page? Well, not all people speak the
IP language. We want to make it as easy as possible for everyone to get the information they
need. Some even call this their external IP address. A public Internet Protocol address is an
Internet Protocol address accessed over the Internet. Like the postal address used to deliver
mail to your home, the public Internet Protocol address is a different international Internet
Protocol address assigned to a computer device. The web server, email server, and any server
device that has direct access to the Internet are those who will enter the public Internet
Protocol address. Internet Address Protocol is unique worldwide and is only supplied with a
unique device.
Private IP address–
Everything that connects to your Internet network has a private IP address. This includes
computers, smartphones, and tablets but also any Bluetooth-enabled devices such as speakers,
printers, or smart TVs. With the growing internet of things, the number of private IP
addresses you have at home is likely to increase. Your router needs a way to identify these
things separately, and most things need a way to get to know each other. Therefore, your
router generates private IP addresses that are unique identifiers for each device that separates
the network.
18. Can you explain what subnetting?
When a bigger network is divided into smaller networks, in order to maintain security, then
that is known as Subnetting. So, maintenance is easier for smaller networks.
19. Do you know what Network Address Translation is?
To access the Internet, one public IP address is needed, but we can use a private IP address
on our private network. The idea of NAT is to allow multiple devices to access the Internet
through a single public address. To achieve this, the translation of a private IP address to a
public IP address is required. Network Address Translation (NAT) is a process in which
one or more local IP addresses is translated into one or more Global IP addresses and vice
versa in order to provide Internet access to the local hosts. Also, it does the translation of
port numbers i.e. masks the port number of the host with another port number in the packet
that will be routed to the destination. It then makes the corresponding entries of IP address
and port number in the NAT table. NAT generally operates on a router or firewall.
20. An organization requires a range of IP addresses to assign one to each of its 1500
computers. The organization has approached an Internet Service Provider (ISP) for
this task. The ISP uses CIDR and serves the requests from the available IP address
space 202.61.0.0/17. The ISP wants to assign address space to the organization which
will minimize the number of routing entries in the ISP’s router using route
aggregation. To calculate the address spaces are potential candidates from which the
ISP can allow any one of the organizations?
Subnet Mask for the given IP address:
202.61.0.0/17
⇒ 11111111 11111111 10000000 00000000
⇒ 255.255.128.0
Now, since we need 1500 hosts, so, bits for host address,
= ceiling (log2 (1500))
= ceiling (10.55)
= 11 bits for host address
So, the last 11 bits will be for host addresses:
00000000.00000000 → 00000111.11111111 (0.0 → 7.255)
The static IP address is more stable than a While dynamic ip address is less
6.
dynamic IP address. stable than static ip address.
24. Is Ipv6 Backward Compatible With Ipv4? Is It Possible To Have An Ipv4 And An
Ipv6 Addresses Simultaneously?
No, IPv6 is not backward compatible with IPv4 protocol.
Yes, it is possible to have an IPv4 and IPv6 addresses simultaneously.
25. What is TTL?
The lifespan or lifetime of data that is being sent. Once after that specified time is over or
elapsed, the data will be discarded Or it can also be stated as the number of hops that packet
is set to exist in the network, after which that packet is discarded. The purpose of the TTL
field is to avoid a situation in which an undeliverable datagram keeps circulating in the
network.
26. If the TTL field has the value of 10. How many routers (max) can process this
datagram?
TTL stands for Time to Live. This field specifies the life of the IP packet based on the
number of hops it makes (number of routers it goes through). TTL field is decremented by
one each time the datagram is processed by a router. When the value is 0, the packet is
automatically destroyed.
27. If the value in the protocol field is 17, the transport layer protocol used is which
protocol?
If the value in the protocol field is 17, the transport layer protocol uses UDP (User
Datagram Protocol).
What happens in classless addressing, if there are no classes but addresses are still
granted?
In classless addressing, there are no classes but addresses are still granted in blocks. The
total number of addresses in a block of classless IP addresses = 2(32 – CIDR_value).
28. Suppose two IPv6 nodes want to interoperate using IPv6 datagrams, but they are
connected to each other by intervening IPv4 routers. Then what is the best solution?
If two IPv6 nodes want to interoperate using IPv6 datagrams, they are connected to each
other by intervening IPv4 routers. Then tunnelling is the best solution.
29. What is IANA?
IANA, the Internet Assigned Numbers Authority, is an administrative function of the
Internet that keeps track of IP addresses, domain names, and protocol parameter identifiers
that are used by Internet standards. Some of these identifiers are parameters, such as those
used by Internet protocols (like TCP, ICMP or UDP) to specify functions and behaviour;
some of them represent Internet addresses and others represent domain names. Regardless
of the type of identifier, the IANA function (IANA for short below) ensures that values are
managed for uniqueness and made available in publicly accessible registries.
30. What is DHCP?
DHCP is an abbreviation for Dynamic Host Configuration Protocol. It is an application
layer protocol used by hosts for obtaining network setup information. The DHCP is
controlled by a DHCP server that dynamically distributes network configuration
parameters such as IP addresses, subnet mask, and gateway address.
31. How can you manage a network using a router?
Routers have built-in console that lets you configure different settings, like security and
data logging. We can assign restrictions to computers, such as what resources they are
allowed to access, or what particular time of the day they can browse the internet.We can
even put restrictions on what websites are not viewable across the entire network.
32. What is ipconfig?
IPCONFIG stands for Internet Protocol Configuration. This is a command-line
application that displays all the current TCP/IP (Transmission Control Protocol/Internet
Protocol) network configuration, refreshes the DHCP (Dynamic Host Configuration
Protocol) and DNS (Domain Name Server). It also displays an IP address, subnet mask, and
a default gateway for all adapters. It is available for Microsoft Windows, ReactOS, and
Apple macOS. ReactOS version was developed by Ged Murphy and licensed under the
General Public License.
35. When you move the NIC cards from one PC to another PC, does the MAC address
get transferred as well?
Yes, if we move the NIC cards from one PC to another PC, then the MAC address also gets
transferred, because the MAC address is hard-wired into the NIC circuit, not the personal
computer. This also means that a PC can have a different MAC address when another one
replaces the NIC card.
36. Explain clustering support? What is Brouter?
Clustering support refers to the ability of a network operating system to connect multiple
servers in a fault-tolerant group. The main purpose of this is that in the event that one
server fails, all processing will continue on with the next server in the cluster.
Brouter – It is also known as the bridging router is a device that combines features of both
bridge and router. It can work either at the data link layer or a network layer. Working as a
router, it is capable of routing packets across networks, and working as the bridge, it is
capable of filtering local area network traffic.
38. What are the important differences between MAC address and IP address?
MAC Address IP Address
MAC Address stands for Media Access IP Address stands for Internet Protocol
Control Address. Address.
MAC Address is a six byte hexadecimal IP Address is either four byte (IPv4) or
address. eight byte (IPv6) address.
A device attached with MAC Address can A device attached with IP Address can
retrieve by ARP protocol. retrieve by RARP protocol.
NIC Card’s Manufacturer provides the MAC Internet Service Provider provides IP
Address. Address.
MAC Address is used to ensure the physical IP Address is the logical address of the
address of computer. computer.
MAC Address operates in the data link layer. IP Address operates in the network layer.
MAC Address helps in simply identifying the IP Address identifies the connection of the
device. device on the network.
MAC Address of computer cannot be changed IP Address modifies with the time and
with time and environment. environment.
Has a mapping between hostnames and Has a mapping that relates IP addresses to
IP addresses hostnames
Utilizes different servers with different Resolves reverse lookup queries where a client
IP addresses requests a hostname by providing an IP address
Uses A Records (basic) to identify any Uses DNS pointer record to identify a hostname for
IP address for a particular hostname a given IP address
In firewall counter attacks are possible such as In antivirus no counter attacks are possible
IP Spoofing and routing attacks. after removing the malware.>
Firewall checks the threat from incoming Antivirus checks the threat from malicious
packets. software.
Firewall saves the system from all kinds of Antivirus saves the system only from
threats to the system. viruses.
48. Why is the MAC address called the Physical address? How is it used in
networking?
The MAC address is a physical address (also called a hardware address) because it
physically identifies an item of hardware. MAC addresses use three types of number
systems and all use the same format, only the size of the identifier differs. The addresses
can be “Universally Managed” or “Locally Managed”.
MAC addresses are used at the data link layer of the network stack. It controls access to the
network media and ensures each device has a unique address. They are used by network
devices such as switches to direct traffic to the correct destination device on the local network
segment.
MAC addresses are typically represented as a string of six pairs of hexadecimal digits, such
as 00:1B:44:11:3A:B7. They are assigned by the network interface manufacturer and stored
in the device's hardware.
53. What is the difference between a static IP address and a dynamic IP address?
The following is the difference between a static IP address and a dynamic IP address.
Static IP Address Dynamic IP Address
Assigned manually by a network Assigned automatically by a DHCP server.
administrator or ISP.
It remains constant and does not change. It can change each time a device connects to the
network.
Ideal for servers, web hosting, or devices that Ideal for home or small business networks with
require a fixed IP address. devices that don't require a fixed IP address.
They are more secure as they are not They are less secure as they can be more easily
susceptible to IP spoofing or DNS attacks. targeted by IP spoofing or DNS attacks.
They are more expensive, as they require They are more cost-effective, as they can be
more configuration and administration. easily managed and do not require manual
configuration.
Requires manual reconfiguration if network Automatically adapts to network topology
topology changes. changes.
Provides better network performance as May experience slower network performance
obtaining a new IP address upon connection due to the time needed to obtain a new IP address
is unnecessary. upon connection
54. What is Quality of Service (QoS), and how is it used to prioritise network traffic?
Quality of Service (QoS) is a networking technology that enables network administrators to
prioritise certain types of network traffic over others. QoS ensures that important or time-
sensitive data, such as voice or video traffic, is given priority over less important data, such
as email or web browsing. This helps improve network performance, reduce network
congestion, and ensure critical applications or services receive the necessary bandwidth and
resources to operate optimally.