Computer Network Interview Question
Computer Network Interview Question
Answer: Two or more computers are connected directly by an optical fiber or any other cable. A
node is a point where a connection is established. It is a network component that is used to send,
receive and forward the electronic information.
A device connected to a network is also termed as Node. Let’s consider that in a network there
are 2 computers, 2 printers, and a server are connected, then we can say that there are five nodes
on the network.
Answer: Network topology is a physical layout of the computer network and it defines how the
computers, devices, cables, etc are connected to each other.
Q #6) What are the layers in OSI Reference Models? Describe each layer briefly.
Answer:
Hub Switch Router
Hub is least expensive, least intelligent Switches work similarly The router is smartest and most complicated
and least complicated of the three. like Hubs but in a more out of these three. It comes in all shapes and
It broadcast all data to every port which efficient manner. sizes. Routers are similar like little
may cause serious security and reliability It creates connections computers dedicated for routing network
concern dynamically and provides traffic
information only to the
requesting port
In a Network, Hub is a common Switch is a device in a Routers are located at gateway and forwards
connection point for devices connected to network which forwards data packets
the network. Hub contains multiple ports packets in a network
and is used to connect segments of LAN
Q #8) Explain TCP/IP Model
Answer: The most widely used and available protocol is TCP/IP i.e. Transmission Control
Protocol and Internet Protocol. TCP/IP specifies how data should be packaged, transmitted
and routed in their end to end data communication.
Answer: HTTP is HyperText Transfer Protocol and it is responsible for web content. Many web
pages are using HTTP to transmit the web content and allow the display and navigation of
HyperText. It is the primary protocol and port used here is TCP port 80.
TCP UDP
TCP stands for Transmission Control Protocol UDP is stands for User Datagram Protocol or Universal
Datagram Protocol
Once the connection is setup, data can be sent bi- UDP is connectionless, simple protocol. Using UDP, messages
directional i.e. TCP is a connection oriented are sent as packets
protocol
The speed of TCP is slower than UDP UDP is faster compared to TCP
TCP is used for the application where time is not UDP is suitable for the applications which require fast
critical part of data transmission transmission of data and time is crucial in this case.
TCP transmission occurs in a sequential manner UDP transmission also occurs in a sequential manner but it does
not maintain the same sequence when it reaches the destination
TCP tracks the data sent to ensure no data loss UDP does not ensure whether receiver receives packets are not.
during data transmission If packets are misses then they are just lost
Answer: Firewall is a network security system that is used to protect computer networks from
unauthorized access. It prevents malicious access from outside to the computer network. A
firewall can also be built to grant limited access to outside users.
The firewall consists of a hardware device, software program or a combined configuration of
both. All the messages that route through the firewall are examined by specific security criteria
and the messages which meet the criteria are successfully traversed through the network or else
those messages are blocked.
There is a “Central Registry” where all the domain names are stored and it gets updated on a
periodic basis. All Internet service providers and different host companies usually interact with
this central registry to get the updated DNS details.
Answer: In a computer network, different computers are organized in different methods and
these methods are – Domains and Workgroups. Usually, computers which run on the home
network belong to a Workgroup.
However, computers that are running on an office network or any workplace network belong to
the Domain.
All computers are peers and no computer has control Network admin uses one or more computer as a server and
over another computer provide all accesses, security permission to all other
computers in a network
In a Workgroup, each computer maintains their own The domain is a form of a computer network in which
database computers, printers, and user accounts are registered in a
central database.
Each computer has their own authentication rule for It has centralized authentication servers which set the rule of
every user account authentication
Each computer has set of user account. If user has If user has an account in a domain then user can login to any
account on that computer then only user able to access computer in a domain
the computer
Workgroup does not bind to any security permission or Domain user has to provide security credentials whenever
does not require any password they are accessing the domain network
Computer settings need to change manually for each In a domain, changes made in one computer automatically
computer in a Workgroup made same changes to all other computers in a network
All computers must be on same local area network In a domain, computers can be on a different local network
Workgroup Domain
In a Workgroup, there can be only 20 computers conne In a domain, thousands of computers can be connected
Q #15) What is a Proxy Server and how do they protect the computer network?
Answer: For data transmission, IP addresses are required and even DNS uses IP addresses to
route to the correct website. It means without the knowledge of correct and actual IP addresses it
is not possible to identify the physical location of the network.
Proxy servers prevent external users who are unauthorized to access such IP addresses of the
internal network. It makes the computer network virtually invisible to external users.
Proxy Server also maintains the list of blacklisted websites so that the internal user is
automatically prevented from getting easily infected by viruses, worms, etc.
Q #16) What are IP classes and how can you identify the IP class of given an IP
address?
Answer: An IP address has 4 sets (octets) of numbers each with a value up to 255.
For Example, the range of the home or commercial connection started primarily between 190 x
or 10 x. IP classes are differentiated based on the number of hosts it supports on a single
network. If IP classes support more networks then very few IP addresses are available for each
network.
There are three types of IP classes and are based on the first octet of IP addresses which are
classified as Class A, B or C. If the first octet begins with 0 bit then it is of type Class A.
Class A type has a range up to 127.x.x.x (except 127.0.0.1). If it starts with bits 10 then it
belongs to Class B. Class B having a range from 128.x to 191.x. IP class belongs to Class C if
the octet starts with bits 110. Class C has a range from 192.x to 223.x.
Answer: IP address 127.0.0.1, is reserved for loopback or local host connections. These
networks are usually reserved for the biggest customers or some of the original members of the
Internet. To identify any connection issue, the initial step is to ping the server and check if it is
responding.
If there is no response from the server then there are various causes like the network is down or
the cable needs to be replaced or the network card is not in good condition. 127.0.0.1 is a
loopback connection on the Network Interface Card (NIC) and if you are able to ping this server
successfully, then it means that the hardware is in a good shape and condition.
127.0.0.1 and local host are the same things in most of the computer network functioning.
Answer: NIC stands for Network Interface Card. It is also known as Network Adapter or
Ethernet Card. It is in the form of an add-in card and is installed on a computer so that the
computer can be connected to a network.
Each NIC has a MAC address which helps in identifying the computer on a network.
Answer: In a computer network, to enable data transmission from one computer to another, the
network devices send messages in the form of packets. These packets are then added with the IP
header by the OSI reference model layer.
The Data Link Layer encapsulates each packet in a frame that contains the hardware address of
the source and the destination computer. If a destination computer is on the remote network then
the frames are routed through a gateway or router to the destination computer.
Q #20) What is the difference between the Internet, Intranet, and Extranet?
Answer: The terminologies Internet, Intranet, and Extranet are used to define how the
applications in the network can be accessed. They use similar TCP/IP technology but differ in
terms of access levels for each user inside the network and outside the network.
Internet: Applications are accessed by anyone from any location using the web.
Extranet: External users are allowed or provided with access to use the network application of
the organization.
Answer: VPN is the Virtual Private Network and is built on the Internet as a private wide area
network. Internet-based VPNs are less expensive and can be connected from anywhere in the
world.
VPNs are used to connect offices remotely and are less expensive when compared to WAN
connections. VPNs are used for secure transactions and confidential data can be transferred
between multiple offices. VPN keeps company information secure against any potential
intrusion.
Answer: DHCP stands for Dynamic Host Configuration Protocol and it automatically assigns IP
addresses to the network devices. It completely removes the process of manual allocation of IP
addresses and reduces the errors caused due to this.
This entire process is centralized so that the TCP/IP configuration can also be completed from a
central location. DHCP has a “pool of IP addresses” from which it allocates the IP address to the
network devices. DHCP cannot recognize if any device is configured manually and assigned
with the same IP address from the DHCP pool.
Answer: SNMP stands for Simple Network Management Protocol. It is a network protocol used
for collecting organizing and exchanging information between network devices. SNMP is widely
used in network management for configuring network devices like switches, hubs, routers,
printers, servers.
SNMP consists of the below components:
SNMP Manager
Managed device
SNMP Agent
Management Information Base (MIB)
SNMP is a part of the TCP/IP suite. There are 3 main versions of SNMP which include
SNMPv1, SNMPv2, and SNMPv3.
Q #25) What are the different types of a network? Explain each briefly.
Answer: OSI model stands for Open System Interconnection It is a framework that guides
the applications on how they can communicate in a network.
Q #32) How many types of modes are used in data transferring through networks?
Answer: Data transferring modes in computer networks are of three types. They are listed
below,
1. Simplex: Data transferring which takes place only in one direction is called Simplex. In
Simplex mode, the data gets transferred either from sender to receiver or from receiver to
sender. For Example, Radio signal, the print signal given from computer to printer, etc.
2. Half Duplex: Data transferring can happen in both directions but not at the same time.
Alternatively, the data is sent and received. For Example, Browsing through the internet,
a user sends the request to the server and later the server processes the request and sends
back the web page.
3. Full Duplex: Data transferring happens in both directions that too simultaneously. For
Example, Two-lane roads where traffic flows in both directions, communication through
telephone, etc.
Q #33) Name the different types of network topologies and brief their advantages?
Answer: Network Topology is nothing but the physical or logical way in which the devices (like
nodes, links, and computers) of a network are arranged. Physical Topology means the actual
place where the elements of a network are located.
Logical Topology deals with the flow of data over the networks. A link is used to connect more
than two devices of a network. And more than two links located nearby form a topology.
b) Star Topology: In Star Topology, there is a central controller or hub to which every node or
device is connected through a cable. In this topology, the devices are not linked to each other. If
a device needs to communicate with the other, then it has to send the signal or data to the central
hub. And then the hub sends the same data to the destination device.
The advantage of the star topology is that if a link breaks then only that particular link is
affected. The whole network remains undisturbed. The main disadvantage of the star topology is
that all the devices of the network are dependent on a single point (hub). If the central hub gets
failed, then the whole network gets down.
c) Ring Topology: In Ring Topology, each device of the network is connected to two other
devices on either side which in turn forms a loop. Data or Signal in ring topology flow only in a
single direction from one device to another and reaches the destination node.
The advantage of ring topology is that it can be installed easily. Adding or deleting devices to the
network is also easy. The main disadvantage of ring topology is the data flows only in one
direction. And a break at a node in the network can affect the whole network.
d) Mesh Topology: In a Mesh Topology, each device of the network is connected to all
other devices of the network. Mesh Topology uses Routing and Flooding techniques for
data transmission.
The advantage of mesh topology is if one link breaks then it does not affect the whole
network. And the disadvantage is, huge cabling is required and it is expensive.
Answer: In data transmission, if the sender sends any data frame to the receiver then the
receiver should send the acknowledgment to the sender. The receiver will temporarily delay
(waits for the network layer to send the next data packet) the acknowledgment and hooks it
to the next outgoing data frame, this process is called Piggybacking.
Q #36) In how many ways the data is represented and what are they?
Answer: Data transmitted through the networks’ comes in different ways like text, audio, video,
images, numbers, etc.
Audio: It is nothing but the continuous sound which is different from text and numbers.
Video: Continuous visual images or a combination of images.
Images: Every image is divided into pixels. And the pixels are represented using bits.
Pixels may vary in size based on image resolution.
Numbers: These are converted into binary numbers and are represented using bits.
Text: Text is also represented as bits.
Answer: The time taken for a signal to reach the destination and travel back to the sender with
the acknowledgment is termed as Round Trip Time (RTT). It is also called Round Trip Delay
(RTD).
Q #40) Define Brouter?
Answer: Brouter or Bridge Router is a device that acts as both a bridge and a router. As a
bridge, it forwards data between the networks. And as a router, it routes the data to
specified systems within a network.
Answer: VPN stands for Virtual Private Network. With the help of a VPN, remote users can
securely connect to the organization’s network. Corporate companies, educational institutions,
government offices, etc use this VPN.
Answer: Firewall and Antivirus are two different security applications used in networking. A
firewall acts as a gatekeeper which prevents unauthorized users to access the private networks as
intranets. A firewall examines each message and blocks the same which are unsecured.
Antivirus is a software program that protects a computer from any malicious software, any virus,
spyware, adware, etc.
Note: A Firewall cannot protect the system from viruses, spyware, adware, etc.
Answer: If a network self-repair its problem then it is termed as Beaconing. Mainly, it is used in
the token ring and FDDI (Fiber Distributed Data Interface) networks. If a device in the network
is facing any problem, then it notifies the other devices that they are not receiving any signal.
Likewise, the problem gets repaired within the network.
Answer: The OSI model was started in the month of February in 1980. So it is standardized as
802.XX. This ‘80’ stands for the year 1980 and ‘2’ represents the month of February.
Only the DHCP server will react to the message and assigns a new IP address to the newly added
device of the network. With the help of DHCP, IP management became very easy.
Q #47) How can a network be certified as an effective network? What are the factors
affecting them?
Answer: DNS stands for Domain Naming Server. DNS acts as a translator between domain
names and IP addresses. As humans remember names, the computer understands only numbers.
Generally, we assign names to websites and computers like Gmail.com, Hotmail, etc. When we
type such names the DNS translates it into numbers and executes our requests.
Translating the names into numbers or IP address is named as a Forward lookup.
Answer: IEEE stands for the Institute of Electrical and Electronic Engineer. This is used to
design or develop standards that are used for networking.
Answer: Encryption is the process of converting the transmission data into another form that is
not read by any other device other than the intended receiver.
Decryption is the process of converting back the encrypted data to its normal form. An algorithm
called cipher is used in this conversion process.
Answer: Encapsulation means adding one thing on top of the other thing. When a message or a
packet is passed through the communication network (OSI layers), every layer adds its header
information to the actual packet. This process is termed as Data Encapsulation.
Answer: Networks are classified into two categories based on their connection types. They are
mentioned below:
Peer-to-peer networks (P2P): When two or more computers are connected together to
share resources without the use of a central server is termed as a peer-to-peer network.
Computers in this type of network act as both server and client. It is generally used in
small companies as they are not expensive.
Server-based networks: In this type of network, a central server is located to store the
data, applications, etc of the clients. The server computer provides the security and
network administration to the network.
Q #54) Define Pipelining?
Answer: In Networking, when a task is in progress another task gets started before the previous
task is finished. This is termed as Pipelining.
Answer: Encoder is a circuit that uses an algorithm to convert any data or compress audio data
or video data for transmission purposes. An encoder converts the analog signal into the digital
signal.
Answer: Decoder is a circuit that converts the encoded data to its actual format. It converts
the digital signal into an analog signal.
Q #57) How can you recover the data from a system which is infected with a Virus?
Answer: In another system (not infected with a virus) install an OS and antivirus with the
latest updates. Then connect the HDD of the infected system as a secondary drive. Now
scan the secondary HDD and clean it. Then copy the data into the system.
Answer:
Baseband Transmission: A single signal consumes the whole bandwidth of the
cable.
Broadband Transmission: Multiple signals of multiple frequencies are sent
simultaneously.
Answer: SLIP stands for Serial Line Interface Protocol. SLIP is a protocol used for transmitting
IP datagrams over a serial line.