Networking Interview Questions
Networking Interview Questions
Hub is least expensive, least intelligent Switches work similarly The router is smartest and mo
and least complicated of the three. like Hubs but in a more complicated out of these three
It broadcast all data to every port which efficient manner. all shapes and sizes. Routers
may cause serious security and It creates connections like little computers dedicated
reliability concern dynamically and provides network traffic
information only to the
requesting port
TCP stands for Transmission Control Protocol UDP is stands for User Datagram Protocol or Uni
Datagram Protocol
Once the connection is setup, data can be sent UDP is connectionless, simple protocol. Using UD
bi-directional i.e. TCP is a connection oriented messages are sent as packets
protocol
The speed of TCP is slower than UDP UDP is faster compared to TCP
TCP is used for the application where time is not UDP is suitable for the applications which require
critical part of data transmission transmission of data and time is crucial in this cas
TCP transmission occurs in a sequential manner UDP transmission also occurs in a sequential ma
does not maintain the same sequence when it rea
destination
TCP tracks the data sent to ensure no data loss UDP does not ensure whether receiver receives p
during data transmission not. If packets are misses then they are just lost
Q #12) What is a Firewall?
Ans: Firewall is a network security system that is used to protect computer networks
from unauthorized access. It prevents malicious access from outside to the computer
network. A firewall can also be built to grant limited access to the outside users.
The firewall consists of a hardware device, software program or a combined
configuration of both. All the messages that route through the Firewall are examined by
specific security criteria and the messages which meet the criteria are successfully
traversed through the network or else those messages are blocked.
Windows Firewall” is an inbuilt Microsoft Windows application which comes along with
the operating system. This “Windows Firewall” also helps to prevent viruses, worms etc.
There is a “Central Registry” where all the domain names are stored and it gets updated
on a periodic basis. All the internet service providers and different host companies
usually interact with this central registry to get the updated DNS details.
Workgroup Domain
All computers are peers and no computer has Network admin uses one or more computer as
control over another computer and provide all accesses, security permission
computers in a network
In a Workgroup, each computer maintains their own The domain is a form of a computer network in
database computers, printers, and user accounts are re
central database.
Each computer has their own authentication rule for It has centralized authentication servers which
every user account of authentication
Each computer has set of user account. If user has If user has an account in a domain then user c
account on that computer then only user able to any computer in a domain
access the computer
Workgroup does not bind to any security permission Domain user has to provide security credentia
or does not require any password they are accessing the domain network
Computer settings need to change manually for In a domain, changes made in one computer
each computer in a Workgroup automatically made same changes to all other
in a network
All computers must be on same local area network In a domain, computers can be on a different l
network
Q #16) What are IP classes and how can you identify the IP class of given a IP
address?
Ans: An IP address has 4 sets (octets) of numbers each with a value up to 255.
For Example, the range of the home or commercial connection started primarily
between 190 x or 10 x. IP classes are differentiated based on the number of hosts it
supports on a single network. If IP classes support more networks then very few IP
addresses are available for each network.
There are three types of IP classes and are based on the first octet of IP addresses
which are classified as Class A, B or C. If the first octet begins with 0 bit then it is of type
Class A.
Class A type has a range up to 127.x.x.x (except 127.0.0.1). If it starts with bits 10 then
it belongs to Class B. Class B having a range from 128.x to 191.x. IP class belongs to
Class C if octet starts with bits 110. Class C has a range from 192.x to 223.x.
127.0.0.1 and local host are the same things in most of the computer network
functioning.
Ifconfig (Interface Configuration) is a command that is used on Linux, Mac, and UNIX
operating system. It is used to configure, control the TCP/IP network interface
parameters from CLI i.e. Command Line Interface. It allows you to see the IP addresses
of these network interfaces.
Q #23) Explain DHCP briefly?
Ans: DHCP stands for Dynamic Host Configuration Protocol and it automatically
assigns IP addresses to the network devices. It completely removes the process of
manual allocation of IP addresses and reduces the errors caused due to this.
This entire process is centralized so that TCP/IP configuration can also be completed
from a central location. DHCP has “pool of IP addresses” from which it allocates the IP
address to the network devices. DHCP cannot recognize if any device is configured
manually and assigned with the same IP address from the DHCP pool.
Q #25) What are the different types of a network? Explain each briefly.
Ans: There are 4 major types of network.
Let’s take a look at each of them in detail.
Personal Area Network (PAN): It is a smallest and basic network type that is
often used at home. It is a connection between the computer and another device
such as phone, printer, modem tablets etc
Local Area Network (LAN): LAN is used in small offices and internet cafe to
connect a small group of computers to each other. Usually, they are used to
transfer a file or for playing the game in a network.
Metropolitan Area Network (MAN): It is a powerful network type than LAN. The
area covered by MAN is a small town, city etc. A huge server is used to cover
such a large span of area for connection.
Wide Area Network (WAN): It is more complex than LAN and covers a large
span of area typically a large physical distance. The Internet is the largest WAN
which is spread across the world. WAN is not owned by any single organization
but it has distributed ownership.
There are some other types of network as well:
Storage Area Network (SAN)
System Area Network (SAN)
Enterprise Private Network (EPN)
Passive Optical Local Area Network (POLAN)
********************************
The advantage of bus topology is that it can be installed easily. And the disadvantage is
that if the backbone cable breaks then the whole network will be down.
2) Star Topology: In Star Topology, there is a central controller or hub to which every
node or device is connected through a cable. In this topology, the devices are not linked
to each other. If a device needs to communicate with the other, then it has to send the
signal or data to the central hub. And then the hub sends the same data to the
destination device.
The advantage of the star topology is that if a link breaks then only that particular link is
affected. The whole network remains undisturbed. The main disadvantage of the star
topology is that all the devices of the network are dependent on a single point (hub). If
the central hub gets failed, then the whole network gets down.
3) Ring Topology: In Ring Topology, each device of the network is connected to two
other devices on either side which in turn forms a loop. Data or Signal in ring topology
flow only in a single direction from one device to another and reaches the destination
node.
The advantage of ring topology is that it can be installed easily. Adding or deleting
devices to the network is also easy. The main disadvantage of ring topology is the data
flows only in one direction. And a break at a node in the network can affect the whole
network.
4) Mesh Topology: In a Mesh Topology, each device of the network is connected to all
other devices of the network. Mesh Topology uses Routing and Flooding techniques for
data transmission.
The advantage of mesh topology is if one link breaks then it does not affect the whole
network. And the disadvantage is, huge cabling is required and it is expensive.
Note: A Firewall cannot protect the system from virus, spyware, adware etc.
Q #44) Explain Beaconing?
Ans) If a network self-repair its problem then it is termed as Beaconing. Mainly it is used
in token ring and FDDI (Fiber Distributed Data Interface) networks. If a device in the
network is facing any problem, then it notifies the other devices that they are not
receiving any signal. Likewise, the problem gets repaired within the network.
Q #45) Why the standard of an OSI model is termed as 802.xx?
Ans) OSI model was started in the month of February in 1980. So it is standardized as
802.XX. In this ‘80’ stands for the year 1980 and ‘2’ represents the month February.
Q #46) Expand DHCP and describe how it works?
Ans) DHCP stands for Dynamic Host Configuration Protocol.
DHCP is used to assign IP addresses automatically to the devices over the network.
When a new device is added to the network, it broadcasts a message stating that it is
new to the network. Then the message is transmitted to all the devices of the network.
Only the DHCP server will react to the message and assigns a new IP address to the
newly added device of the network.With the help of the DHCP, the IP management
became very easy.
With the help of the DHCP, the IP management became very easy.
Q #47) How can a network be certified as an effective network? What are the
factors affecting them?
Ans) A network can be certified as an effective network based on below-mentioned
points,
Performance: A network’s performance is based on its transmitted time and
response time. The factors affecting the performance of a network are hardware,
software, transmission medium types and the number of users using the network.
Reliability: Reliability is nothing but measuring the probability of failures
occurred in a network and the time taken by it to recover from it. The factors
affecting the same are the frequency of failure and recovery time from failure.
Security: Protecting the data from viruses and unauthorized users. The factors
affecting the security are viruses and users who do not have permission to
access the network.
Q #48) Explain DNS?
Ans) DNS stands for Domain Naming Server. DNS acts as a translator between domain
names and IP address. As humans remember names, the computer understands only
numbers. Generally, we assign names to websites and computers like gmail.com,
Hotmail etc. When we type such names the DNS translates it into numbers and execute
our requests.
Translating the names into numbers or IP address is named as a Forward lookup.
The main difference between Internet and Ethernet is security. Ethernet is safer than
the internet as Ethernet is a closed loop and has only limited access.