Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
3 views

Computer Network

The document provides an overview of key networking concepts, including definitions of network, topology types, and protocols like TCP and HTTP. It explains components such as bandwidth, nodes, links, and the differences between IPv4 and IPv6, as well as the roles of firewalls and load balancers. Additionally, it discusses VPNs, LANs, and various types of delays in network communication.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Computer Network

The document provides an overview of key networking concepts, including definitions of network, topology types, and protocols like TCP and HTTP. It explains components such as bandwidth, nodes, links, and the differences between IPv4 and IPv6, as well as the roles of firewalls and load balancers. Additionally, it discusses VPNs, LANs, and various types of delays in network communication.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

1.

Define network
• A network is a collection of computers, servers, mainframes, network devices, and other
devices connected to each other to share data and resources.

2. What do you mean by network topology, and explain types of them?


• Network topology refers to the layout pattern of interconnections between nodes (devices) in
a network. There are several types:
• Bus Topology: Uses a single backbone (a central cable) to which all devices are connected.
• Star Topology: All devices are connected to a central hub or switch.
• Ring Topology: Each device is connected to two other devices, forming a closed loop.
• Mesh Topology: Every device is connected to every other device in a point-to-point manner.
• Tree Topology: A combination of bus and star topologies, where groups of star-configured
networks are connected to a linear bus backbone.

3. Define bandwidth, node, and link?


• Bandwidth: The maximum rate of data transfer across a network or internet connection.
• Node: Any device connected to a network that can send, receive, or forward information.
• Link: A physical or logical connection between two or more devices in a network that allows
communication.

4. Explain the TCP model.


• TCP (Transmission Control Protocol) model is a conceptual model used in networking that
standardizes the protocols used for communication over the internet. It consists of four
layers:
• Application Layer: Provides interfaces for user applications (e.g., HTTP, FTP).
• Transport Layer: Manages end-to-end communication sessions (e.g., TCP, UDP).
• Internet Layer: Handles addressing, routing, and packaging data packets for transmission
(e.g., IP).
• Link Layer: Transfers data between adjacent network nodes in a network segment (e.g.,
Ethernet).
5. Layers of OSI model
• Application Layer
• Presentation Layer
• Session Layer
• Transport Layer
• Network Layer
• Data Link Layer
• Physical Layer

6. Significance of Data Link Layer


• The Data Link Layer is responsible for the reliable transmission of data across a physical
link, ensuring error-free communication between adjacent nodes. It handles framing, error
detection, and flow control.

7. Define gateway, difference between gateway and router


• Gateway: A gateway is a network node that connects two networks using different protocols.
It acts as an entry and exit point for data packets between networks.
• Difference: A router directs data packets between networks based on IP addresses, while a
gateway is a broader term that encompasses devices performing protocol conversions in
addition to routing.

8. What does ping command do?


• The ping command tests the connectivity between two networked devices by sending ICMP
echo request packets and waiting for ICMP echo reply packets. It measures the round-trip
time and packet loss.

9. What is DNS, DNS forwarder, NIC?


• DNS (Domain Name System): Translates domain names into IP addresses to locate resources
on the internet.
• DNS Forwarder: A DNS server that forwards DNS queries to another DNS server when it
cannot resolve the queries itself.
• NIC (Network Interface Card): A hardware component that allows computers to connect to a
network and communicate with other devices.
10. What is MAC address?
• A MAC (Media Access Control) address is a unique identifier assigned to a network interface
controller (NIC) for communications at the data link layer of a network segment. It is used to
identify devices on a network uniquely.

11. What is IP address, private IP address, public IP address, APIPA?


• IP Address: A unique string of numbers separated by periods or colons that identifies each
device connected to a network.
• Private IP Address: IP addresses used within a private network not routable on the internet
(e.g., 192.168.x.x, 10.x.x.x).
• Public IP Address: IP addresses that are routable on the internet and are unique across the
entire internet.
• APIPA (Automatic Private IP Addressing): A feature in Windows that assigns an IP address in
the range 169.254.x.x when DHCP servers are unavailable.

12. Difference between IPv4 and IPv6


• IPv4:
o 32-bit address length
o Supports approximately 4.3 billion addresses
o Written in decimal format (e.g., 192.168.0.1)
o Limited security features
• IPv6:
o 128-bit address length
o Supports a virtually unlimited number of addresses
o Written in hexadecimal format (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334)
o Built-in security features (e.g., IPsec)

13. What is subnet?


• A subnet, or subnetwork, is a logically visible subdivision of an IP network. The practice of
dividing a network into two or more networks is called subnetting, which improves network
performance and security.

14. Firewalls
• Firewalls are network security devices that monitor, and control incoming and outgoing
network traffic based on predetermined security rules. They establish a barrier between
trusted internal networks and untrusted external networks.
15. Different types of delays
• Propagation Delay: The time it takes for a signal to travel from the sender to the receiver.
• Transmission Delay: The time it takes to push all the packet's bits onto the wire.
• Processing Delay: The time routers take to process the packet header.
• Queuing Delay: The time a packet spends in routing queues.

16. 3-way handshaking


• The 3-way handshake is a method used in TCP/IP networks to establish a connection
between a client and server.
• It involves three steps:
o SYN: Client sends a synchronization packet (SYN) to the server.
o SYN-ACK: Server responds with a synchronization acknowledgment (SYN-ACK).
o ACK: Client sends an acknowledgment (ACK) back to the server, establishing a
connection.

17. Server-side load balancer


• A server-side load balancer distributes incoming network traffic across multiple servers to
ensure no single server becomes overwhelmed, improving availability and reliability of
applications.

18. RSA Algorithm


• RSA (Rivest-Shamir-Adleman) is a public-key cryptosystem widely used for secure data
transmission. It involves two keys: a public key for encryption and a private key for
decryption.

19. What is HTTP and HTTPS protocol?


• HTTP (HyperText Transfer Protocol): The foundation of data communication on the web,
used to transfer hypertext documents.
• HTTPS (HyperText Transfer Protocol Secure): The secure version of HTTP, using TLS
(Transport Layer Security) to encrypt data transfer.

20. What is SMTP protocol?


• SMTP (Simple Mail Transfer Protocol) is a protocol used to send emails across the Internet.
It is used for sending messages from a client to a server or between servers.
21. TCP and UDP protocol, prepare differences
• TCP (Transmission Control Protocol):
o Connection-oriented
o Reliable data transfer with error-checking and recovery
o Ordered data transmission
o Suitable for applications requiring high reliability (e.g., web browsing, email)
• UDP (User Datagram Protocol):
o Connectionless
o No guarantee of data delivery or order
o Lower latency, higher speed
o Suitable for applications where speed is critical (e.g., streaming, online gaming)

22. What happens when you enter “google.com” (very famous question)
• When you enter "google.com":
o The browser checks the cache for a DNS record to find the IP address of
"google.com".
o If not found, a DNS query is sent to the DNS server to get the IP address.
o The browser sends an HTTP or HTTPS request to the IP address.
o The server at that IP address processes the request and sends back the web page.
o The browser renders the web page.

23. Hub vs Switch


• Hub:
o Broadcasts data to all devices in the network
o Operates at the physical layer (Layer 1)
o Less efficient, causes more network collisions
• Switch:
o Sends data only to the specific device for which it is intended
o Operates at the data link layer (Layer 2) and sometimes the network layer (Layer 3)
o More efficient, reduces network collisions
24. VPN, advantages and disadvantages of it
• VPN (Virtual Private Network): A service that encrypts your internet connection and hides
your online identity.
• Advantages:
o Enhanced security and privacy
o Access to restricted content
o Safe data transmission over public networks
o Disadvantages:
o Can reduce internet speed
o Potential for VPN provider to log user activity
o Some services block VPN traffic

25. LAN
• LAN (Local Area Network) is a network that connects computers and devices in a limited
geographical area, such as a home, school, or office building, allowing resource sharing and
communication within the network.

You might also like