0% found this document useful (0 votes)
4 views11 pages

Title: Networking Fundamentals - Key Concepts: Understanding Basic Networking Questions

The document provides an overview of key networking concepts, including MAC addresses, TCP vs. UDP, subnetting, default gateways, NAT, PoE, SNMP, ring topology, broadcast and collision domains, and troubleshooting network outages. Each section outlines fundamental definitions, functions, and characteristics essential for understanding networking fundamentals. It serves as a comprehensive guide for both beginners and professionals in the field of networking.

Uploaded by

masskingaravinth
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODP, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views11 pages

Title: Networking Fundamentals - Key Concepts: Understanding Basic Networking Questions

The document provides an overview of key networking concepts, including MAC addresses, TCP vs. UDP, subnetting, default gateways, NAT, PoE, SNMP, ring topology, broadcast and collision domains, and troubleshooting network outages. Each section outlines fundamental definitions, functions, and characteristics essential for understanding networking fundamentals. It serves as a comprehensive guide for both beginners and professionals in the field of networking.

Uploaded by

masskingaravinth
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODP, PDF, TXT or read online on Scribd
You are on page 1/ 11

Title: Networking Fundamentals - Key Concepts : Understanding

Basic Networking Questions


What is the function of a MAC Address?

1. MAC (Media Access Control) Address is a unique identifier assigned to network interfaces.

2. Operates at the Data Link Layer (Layer 2) of the OSI model.

3. Helps in device identification and communication within a local network.

4. Used for addressing within Ethernet networks.

5. Ensures data is delivered to the correct device.

6. Cannot be changed as it is hardcoded in hardware.

7. Essential for LAN communication.

8. Works in combination with IP addressing.

9. Helps prevent unauthorized network access.

10.Used in filtering and access control.

11.Required for Ethernet switching.

12.Supports network security policies.

13.Differentiates devices in the same network.


What are the differences between TCP and UDP?

1. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol)


are transport layer protocols.

2. TCP: Connection-oriented, ensures data reliability.

3. UDP: Connectionless, prioritizes speed over reliability.

4. TCP: Uses acknowledgments and error correction.

5. UDP: No error correction, faster transmission.

6. TCP: Suitable for web browsing, email, and file transfer.

7. UDP: Used for real-time applications like VoIP and gaming.

8. TCP: Ensures ordered and complete data delivery.

9. UDP: Data may arrive out of order or be lost.

10.TCP: Requires more resources and bandwidth.

11.UDP: Uses fewer resources, more efficient.

12.TCP: Uses congestion control mechanisms.

13.UDP: No congestion control, suited for streaming.


What is Subnetting?
1. Subnetting divides a large network into smaller, manageable
subnets.
2. Helps in efficient IP address allocation.
3. Enhances network security and organization.
4. Reduces broadcast traffic in the network.
5. Improves network performance by limiting congestion.
6. Supports hierarchical addressing in large networks.
7. Helps in defining separate logical networks.
8. Essential for large-scale corporate networks.
9. Requires subnet masks to differentiate networks.
10.Uses CIDR (Classless Inter-Domain Routing) for flexibility.
11.Reduces IP wastage in large networks.
12.Simplifies network troubleshooting.
13.Helps in managing local and wide area networks.
What is a Default Gateway?
1. A default gateway routes traffic from a local network to external
networks.
2. Typically a router or firewall in a network.
3. Acts as a bridge between different subnets.
4. Essential for internet access.
5. Provides a path for packets leaving the local network.
6. Defined by an IP address, usually the router’s address.
7. Used when the destination IP is outside the local subnet.
8. Helps in packet forwarding decisions.
9. Can be configured manually or dynamically.
10.Works with ARP (Address Resolution Protocol).
11.Required for remote access.
12.Improves connectivity between network segments.
13.Ensures proper routing in enterprise networks.
What is the purpose of NAT (Network Address Translation)?

1. NAT translates private IP addresses to public ones.

2. Enables multiple devices to share a single public IP.

3. Helps conserve IPv4 addresses.

4. Improves security by hiding internal IPs.

5. Used in home and enterprise networks.

6. Facilitates internet access for private networks.

7. Provides firewall functionality by masking devices.

8. Works with routers and firewalls.

9. Essential for IPv4 address management.

10.Supports static, dynamic, and PAT (Port Address Translation).

11.Reduces the need for unique public IPs per device.

12.Prevents direct exposure to the internet.

13.Commonly used in office networks.


What is PoE (Power Over Ethernet)?
1. PoE delivers power and data over a single Ethernet cable.
2. Eliminates the need for separate power sources.
3. Used for IP cameras, VoIP phones, and wireless APs.
4. Reduces installation complexity and costs.
5. Supports remote device powering.
6. Works with PoE-enabled switches and injectors.
7. Common in smart building infrastructure.
8. Provides centralized power management.
9. Enhances network reliability.
10.Used in industrial automation.
11.Supports IEEE 802.3af, 802.3at, 802.3bt standards.
12.Allows deployment in locations without power outlets.
13.Reduces cable clutter and enhances flexibility.
What is SNMP (Simple Network Management Protocol)?
1. SNMP is a protocol for monitoring and managing network devices.
2. Works on UDP port 161.
3. Used in routers, switches, and servers.
4. Helps in network performance monitoring.
5. Provides real-time alerts on network issues.
6. Uses MIB (Management Information Base) for data retrieval.
7. Supports different SNMP versions (v1, v2c, v3).
8. Allows centralized network management.
9. Used in enterprise IT infrastructures.
10.Supports network automation and monitoring tools.
11.Provides security and access control.
12.Works with network management systems (NMS).
13.Essential for maintaining stable networks.
How does Ring Topology work and what are its limitations?
1. Devices are connected in a circular fashion.
2. Data flows in one or both directions.
3. Each device acts as a repeater.
4. Ensures minimal data collision.
5. Requires token passing for data transfer.
6. Easy to install but difficult to troubleshoot.
7. Failure in one device can affect the entire network.
8. More expensive than bus topology.
9. Difficult to reconfigure without disruption.
10.Slower than star topology.
11.Used in industrial networks.
12.Requires specialized hardware for redundancy.
13.Less scalable than other topologies.
What is a Broadcast Domain and Collision Domain?
1. Broadcast Domain: A network segment where broadcasts reach all devices.
2. Collision Domain: A segment where data collisions can occur.
3. Switches reduce collision domains.
4. Routers separate broadcast domains.
5. More collision domains improve network efficiency.
6. Reduces unnecessary network traffic.
7. Important for designing efficient networks.
8. Helps in troubleshooting network congestion.
9. Used in VLAN configurations.
10.Essential for scalable network design.
11.Prevents excessive packet broadcasting.
12.Enhances network performance.
13.Required in high-density networks.
How to Identify the Root Cause of Frequent Network Outages?
1. Check physical connections and cables.
2. Monitor network traffic for congestion.
3. Use diagnostic tools like ping and traceroute.
4. Check router and switch logs.
5. Analyze firewall settings and policies.
6. Inspect network configurations.
7. Update firmware and software.
8. Test for IP conflicts.
9. Monitor bandwidth usage.
10.Identify hardware failures.
11.Use SNMP for network alerts.
12.Perform periodic maintenance.
13.Document troubleshooting steps.

You might also like