Computer Network Viva Question
Computer Network Viva Question
Ans. A network consists of two or more separate devices linked together such that they can
communicate. Networks can be classified according to different criteria such as scope, type
of connection, functional relationship, topology, or function, among others.
Ans. Considering the size or span of a network, we can classify them as follows:
You can also explore – What is the Difference Between LAN and WAN?
To choose a network cable, several aspects must be taken into account such as –
Ans. A ‘subnet’ is a generic term for a section of an extensive network, usually separated by
a bridge or a router. It also works for the network’s broadcast domains, manages traffic flow,
and helps increasing network performance. Uses of the subnet in networking include:
Ans. The Domain Name System (DNS) is a central part of the internet, providing a way to
match names (a website you’re seeking) to numbers (the address for the website). Anything
connected to the internet – laptops, tablets, mobile phones, and websites – has an Internet
Protocol (IP) address made up of numbers.
Ans. Following are the major differences between a forward lookup and reverse lookup in
DNS:
Uses A Records (basic) to identify any Uses DNS pointer record to identify a
IP address for a particular hostname hostname for a given IP address
Ans. This is among the important networking interview questions. Network topology is the
physical or logical arrangement in which the devices or nodes of a network (e.g. computers,
printers, servers, hubs, switches, routers, etc.) are interconnected with each other over a
communication medium. It consists of two parts – the physical topology, which is the actual
arrangement of the cables (the media), and the logical topology, which defines how the
hosts access the media.
You must explore: What are the Different Types of Network Topology?
Bus – In the bus network topology, each workstation is connected to a main cable called a
bus. Therefore, in effect, each workstation is directly connected to every other workstation
on the network.
Ring – In the ring network topology, the workstations are connected in a closed-loop
configuration. Adjacent workstation pairs are directly connected. Other pairs of workstations
are indirectly connected, passing data through one or more intermediate nodes.
Mesh – Mesh network topology has two forms – full and partial mesh. In the full mesh
topology, each workstation is directly connected. In the partial mesh topology, some
workstations are connected to all the others, and some are connected only to the other
nodes with which they exchange more data.
Fully Connected Mesh (Left) and Partial Mesh Network Topology (Right)
Tree – The tree network topology uses two or more star networks connected to each other.
The central computers in star networks are connected to the main bus. Thus, a tree network
is a bus network of star networks.
Tree Network Topology
Ans. Clients and servers are separate logical entities that work together over a network to
accomplish a task.
Ans. Frame Relay is a data link layer digital packet-switched network protocol technology
designed to connect local area networks (LANs) and transfer data over wide area networks
(WANs). Frame Relay shares some of the same underlying technology as X.25.
It is based on the older X.25 packet-switching technology that was designed to transmit
analogue data as voice conversations. Unlike X.25, which was designed for analogue
signals, Frame Relay is a fast packet technology, which means that the protocol does not
attempt to correct errors. It is often used to connect LANs with main backbones, as well as
in public wide area networks and in private network environments with leased T-1 lines. It
requires a dedicated connection during the transmission period and is not ideal for voice or
video, which require a constant stream of transmissions.
Ans. Frame Relay supports the multiplexing of traffic from multiple connections over a
shared physical link. It uses hardware components that include router frames, bridges, and
switches to pack data into individual frame relay messages. Each connection uses a 10-bit
Data Link Connection Identifier (DLCI) for unique channel addressing. There are two types
of connections:
Frame Relay
Ans. A MAC (Media Access Control) address is the unique 48-bit hardware address of a
LAN card, usually stored in the ROM of the network adapter card.
The MAC address is a unique identifier that manufacturers assign to a network card or
device. It is also known as a physical address represented by hexadecimal digits. Each
MAC address is unique worldwide and, in theory, they are fixed for each device.
Each MAC address includes six pairs of numbers. The first three pairs help to identify the
manufacturer and the next three to the specific model. It is important to bear in mind that a
computer may have a variety of hardware to connect to networks; thus, it is common to
have a MAC address for Ethernet, one for Wi-Fi, and another for Bluetooth.
Ans. Beaconing is the process that allows a network to self-repair network problems. This is
among the important networking interview questions and you must prepare for the related
terminologies as well.
Ans. When a signal travels through a medium, it loses some of its energy due to the
resistance of the medium. This loss of energy is called attenuation.
When a signal travels through a medium from one point to another, it may change the form
or shape of the signal. This is known as distortion.
Noise is unwanted electrical or electromagnetic energy that degrades the quality of signals
and data.
Ans. Finding the IP address of a website or a domain is not a tricky task and involves the
below steps –
Ans. The limited range of frequencies of signals that a line can carry is called the
bandwidth. Bandwidth is often confused with Internet speed when it is actually the volume
of information that can be sent over a connection in a measured amount of time, calculated
in megabits per second (Mbps).
Logically the bandwidth of our network will be decisive for its quality and speed. The more
bandwidth we have, the better, since the faster we can transfer data.
Ans. A firewall is a network security system, responsible to manage network traffic. It uses a
set of security rules to prevent remote access and content filtering. Firewalls are used to
protect the systems or networks from viruses, worms, malware, etc. Firewalls are usually of
two types –
Physical – A physical firewall or hardware firewall is a physical device, sits between the
external network and the server. They analyze incoming traffic and filter out any threats to
the device. Widely used in institutions and large companies.
Logical – A logical or software firewall can exist anywhere on the subnet and protects hosts
anywhere on the subnet without rewiring. They only protect the computer on which they are
installed, and in many cases, they are integrated into the operating system itself.
You can also explore: What are the Different Types of Firewalls?
Ans. This is among the popularly asked networking interview questions. The firewall ‘listens’
for what information packets are trying to leave or enter the computer system. Blocking can
be done based on various criteria, such as the IP to which they are destined, the type of
port used to send them, or the application of origin.
One of the most complex aspects of using firewalls lies in their configuration, in deciding
what types of connections are blocked and which ones are not.
Q21. What are the major types of networks?
Ans. There are two major type of networks: Server-based network and Peer-to-peer
network.
Ans. There are three essential topologies: Star, Bus, and Ring.
● Simplex
● Half-duplex
● Full-duplex
Ans. Routers connect two or more network segments. These intelligent network devices
store information in their routing tables such as paths, hops, and bottlenecks. They
determine the most accurate data transfer paths and operate in Open Systems
Interconnection (OSI) Network Layer.
● Inter-network communication
● Best path selection
● Packet forwarding
● Packet filtering
For more information, you can also explore: What is Router in Computer Networks?
You can also explore: Network Devices in Computer Networks and Its Types
Q26. What are the criteria for the best path selection of a router?
Ans. The source route is defined as a sequence of IP addresses that are used to identify
the route of a datagram. You can also involve the source route in the IP datagram header.
Q28. What is the difference between ‘standard’ and ‘extended’ ACL (access
control list)?
Ans. Standard ACLs are source-based, whereas extended ACLs are source- and
destination-based.
Ans. Data encapsulation is the process of breaking down information into smaller,
manageable chunks before their transmission across the network.
Ans. RAS (Remote Access Services) refers to any combination of hardware and software to
enable remote access to tools or information that typically reside on a network of IT devices.
Q31. Mention the different network protocols that are supported by Windows
RRAS services?
Ans. Following are the three main network protocols supported by Windows RRAS services:
● NetBEUI
● TCP/IP
● IPX
Q32. What are the perquisites to configure a server?
Ans. You can achieve a secure computer network in the following ways:
● Modems
● Satellites
● PlasmaCAM
● Shielding wire
● Embedded Processor
● Computer Memory
● Open connectors
Q35. What are proxy servers and how do they protect computer networks?
Ans. Proxy servers prevent external users from identifying the IP addresses of an internal
network. They make a network virtually invisible to external users, who cannot identify the
physical location of a network without knowledge of the correct IP address.
Ans. Nodes – Devices or data points on a more extensive network are known as nodes.
They are individual parts of a larger data structure and contain data. They also link other
nodes.
Links- A link is the physical and logical network component for interconnecting hosts or
nodes in a network. It is a physical communication medium such as a coaxial cable or
optical fibre.
Ans. SLIP or Serial Line Interface Protocol was developed during the early UNIX days and it
is used for remote access.
SLIP does not provide error detection as it relies on higher-layer protocols for it. Therefore,
SLIP alone is not successful on an error-prone dial-up connection. However, it is still useful
to test the operating system’s response capabilities under load (looking at ping flood
statistics).
Interviewers often ask such networking interview questions and you must prepare for such
abbreviations.
Ans. TCP/IP is the short form of the Transmission Control Protocol / Internet Protocol. It is a
set of protocol layers designed to facilitate data exchange on heterogeneous networks.
Learn all about Cisco Certifications, their Scope, and Benefits, read our blog – what are
Cisco Certifications?
Q39. How many layers does TCP/IP Model have?
Layer Description
Ans. It is one of the most commonly asked networking interview questions. The OSI (Open
Systems Interconnection) Model consists of seven layers:
Layer Description
Physical It is the lowest layer of the OSI Model. It transmits raw
unstructured data bits over a communication channel.
The Physical layer is responsible for the actual physical
connection between the devices. While receiving data,
the Physical layer gets the signal received, converts it
into 0s and 1s, and sends them to the Data Link layer.
Ans. The OSI model was introduced in February 1980. In 802.XX, ‘80’ is named for the year
1980, and ‘2’ is named for the month of February.
● Application conflicts
● Client-server problems
● Configuration error
● Protocol mismatch
● Security issues
● User policy & rights issues
This question is among the basic networking interview questions and you must prepare for
such questions.
Ans. Encryption is the process of changing data from its original readable format to an
unreadable format, thus ensuring network security. It requires the user to use a secret key
or password to decrypt the data.
Encryption is not only useful for communications, but also in any case where you want to
protect sensitive information. Thus, it is possible to encrypt the information contained in
disks, folders or even individual files, to prevent unauthorized access. Then, in addition to
the benefit of protecting the privacy of users, data encryption prevents other types of attacks
such as identity theft, or bank fraud, in addition to providing a protection mechanism against
the theft or loss of devices with sensitive information.
Client-Server Functions
Ans. TELNET is a client-service protocol on the internet or local area network, allowing a
user to log on to a remote device and have access to it. This is among the most commonly
asked networking interview questions. Technically, it is a bidirectional interactive
text-oriented communication facility, which uses a virtual terminal connection.
Ans. It is the mode of communication between two devices. Here the data flows
bi-directionally but simultaneously. A perfect example of a half-duplex is a walkie-talkie.
Ans. It is a mode of communication between two devices and the data flow is bi-directional
too, but the flow is simultaneous. One of the examples of full-duplex is a telephone.
Ans. Netstat is a command-line utility program that provides information about the current
Transmission Control Protocol /Internet Protocol (TCP/IP) settings of a connection.
Q52. What is a peer-peer process?
Ans. The processes on each machine that communicate at a given layer are called the
peer-peer process.
Ans. With the help of an anonymous FTP, users can be granted access to files in public
servers. Users can log in as anonymous guests, thus the name.
Ans. It stands for Network Address Translation and is a protocol that allows a network
device, usually a firewall, to assign a public address to a computer/s inside a private
network.
● Syntax: It refers to the structure or format of the data and their order of
presentation.
● Semantics: It specifies the meaning of each section of bits.
● Timing: Timing refers to two characteristics, which include the timing of data
sending and the speed of data sending.
Such common networking interview questions are often asked by the interviewers.
Ans. NIC is the abbreviation for Network Interface Card. It is a peripheral card with
electronic circuitry. It is attached to a PC and connects to a network. NIC has its own MAC
address and this identifies a PC on the network.
Ans. Transmission – A process of sending and receiving data between source and
destination, in only one way. It is regarded as the physical movement of data.
Communication – A process of sending and receiving data between source and destination,
in both ways.
Ans. Network Address Translation (NAT) is a protocol used to convert the IP address of the
computer network into a local network to a single IP address. It takes all your local network
devices and provides a single IP address to share a single connection to the internet. NAT
is used router, computer, firewall in a local network.
Ans. Short form for Network Operating System. Specialized software that provides
connectivity to a computer such that it can communicate with other computers and devices
on a network.
Ans. IDEA is the abbreviation for International Data Encryption Algorithm. It is the
replacement for the Data Encryption Standard (DES).
Ans. Brouter is a device that functions as both a bridge and a router. It forwards data within
the networks and also routes data to individual systems in a network.
You may consider such networking interview questions to be basic, but such questions are
the favourite of interviewers as interviewees often leave behind such networking interview
questions while preparing.
Ans. We will install an OS and updated antivirus in a system that is free of any viruses, and
then connect the hard drive of the infected system as a secondary drive. The hard drive will
then be scanned and cleaned. Data can now be copied into the system.
Ans. It is an acronym for Interface Configuration and is used on Linux, Mac, and UNIX
operating systems. ‘ifconfig’ configures and controls the TCP/IP network interface
parameters from Command Line Interface while allowing the user to check the IP addresses
of these network interfaces.
Ans. This is one of the important networking interview questions that you must prepare for
your interview. The main difference between a Domain and a Workgroup is where do the
computer networks belong to. If it is a home network, then computers will be a part of a
workgroup, and if it’s a workplace network, then the computers will be a part of a domain.
Below are some of the major differences between a Domain and a Workgroup:
Domain Workgroup
A domain is used for transferring and It is used for sharing less secure data.
sharing sensitive and important data.
It is used by large public and business A workgroup is better suited for fewer
networks. computers.
Ans. NVT stands for Network Virtual Terminal and is a representation of a primary terminal.
This virtual terminal helps you to start a telnet session.
Q73. What Is BGP?
Ans. BGP or Border Gateway Protocol is a protocol used to transfer data and information
between different host gateways or autonomous systems.
Ans. Round Trip Time or RTT is the time taken to send a message from one end of a
network to the other and back.
Ans. Localhost is the standard hostname given to the machine, and it is represented by the
IP address 127.0.0.1. Therefore, we can say that 127.0.0.1 and localhost are the same
thing.
Q76. Which are the most typical functional units of the client/server applications?
Ans. The most typical functional units of the client/server applications are –
Ans. Triggers are event-driven specialized procedures and are managed by database
management systems. It is capable of performing complex actions and uses procedural
languages full throttle.
Ans. A gateway is a hardware device that is connected to two or more networks. It may be a
router, firewall, server, or any other similar device, and is capable of regulating traffic in the
network.
For more information, you can also explore: What is a Gateway in networking?
Ans. A gateway sends the data between two dissimilar networks, while a router sends the
data between two similar networks.
● Remote Access
● Protected File Sharing
● Anonymity
● Enhanced Security
● Improved Performance
● Anonymity
● Network Scalability
● Prevents Data Throttling
This VPN is mostly used in large organizations with branches in different locations to
connect the network of one office to another in different locations. It has two sub-categories:
● Intranet VPN: Intranet VPN allows several offices of the same company to
connect using the Site-to-Site VPN type. It is commonly used for connecting
remote offices in different geographical locations using shared infrastructure
(internet connectivity and servers) with the same accessibility policies as a private
WAN (wide area network).
● Extranet VPN: Extranet VPN allows companies to use Site-to-site VPN type to
connect to the office of another company. It uses shared infrastructure over an
intranet, suppliers, customers, partners, etc., and connects them using dedicated
connections.
Ans. EGP stands for Exterior Gateway Protocol. It is used to exchange net-reachability
information between Internet gateways within the same or different autonomous systems.
EGP is the protocol of the routers. It is used to identify the set of networks that you will be
able to reach within or via each independent system.
We are now moving on to the last category of networking interview questions. This section
covers interview questions for experienced candidates.
Ans. 10Base-T specifies data transfer rate, i.e., 10Mbps. Here the usage of the term ‘Base’
defines ‘Baseband’ and not ‘Broadband’. T denotes the type of cable, which is a twisted
pair.
● Session Layer
● Presentation Layer and
● Application Layer
Q85. What is Piggy Backing?
Ans. It is a serial mode of transmission. It is the process of data transmission, where every
character is a self-contained unit. Each character in asynchronous transmission has its start
and stop bits, along with an uneven interval between them.
Ans. Synchronous transmission refers to continuous data streaming in the form of signals,
accompanied by regular timing signals. These signals are generated by the external
clocking mechanism and ensure that senders and receivers are in synchrony.
Ans. Process Sigma measures the frequency of a task that is performed without any error. It
is expressed as a number of standard deviations on a normal distribution.
Ans. Failure Mode Effect and Analysis or FMEA is a qualitative and systematic tool to
identify potential failure modes in a system, the reasons, and their effects.
Ans. It refers to a centralized infrastructure for distributing different routes and data to
various networks. Backbone networks connect LANs and WANs and also handles the
management of bandwidth and multiple channels.
Ans. OSPF is an abbreviation for Open Shortest Path First. It is a routing protocol that uses
a link-state routing (LSR) algorithm to find out the best possible path for data exchange.
Q93. What is the range of addresses in the classes of internet addresses?
Ans. Following are the five different ranges of addresses in the classes of the internet:
Ans. Datalink protocols are defined as the sets of requirements used to implement the data
link layer. There are the following categories of Data Link protocols:
● Synchronous Protocols
● Asynchronous Protocols
● Bit Oriented protocols
● Character Oriented Protocols
● Addressing
● Encapsulation
● Routing
● Decapsulation
Q97. Mention the different types of links used to build a computer network.
Ans. Following are the different types of links used to build a computer network:
● Cables
● Wireless Links
● Last-Mile Links
● Leased Lines
Q98. Mention the types of wires used for data transmission in UTP cable.
Ans. There are four types of wires used for data transmission in UTP cable, which is wire 1,
2, 3, and 6. Where wires 1 and 2 are used to transmit the data while wires 3 and 6 are used
to receive the data.
Ans. RG59 and RG6 cables are not used in the computer network. These cables are made
for the cable TV network.
Ans. 10Base2 is defined as part of the IEEE 802.3a standard, specifies data transmission
speeds of 10Mbps and a total segment length of 185 meters using RG-58 coaxial cable.
The 10Base2 standard specifies a physical bus topology and uses BNC connectors with
50-ohm terminators at each end of the cable. One of the physical ends of each segment
must be grounded.
Ans. Fibre optical cable is the cable used in the 10BaseFL network.
Ans. 10Base2 networks allow a maximum of five segments with only three of those
segments populated. Each of the three populated segments can have a maximum of 30
nodes attached.
Ans. The NIC stands for the network interface controller. NIC is a device or module that
controls and configures the interface of a processor system to a network or other
interconnection. There are many different types of interfaces in electronic systems. NICs
generally configure, maintain the current state, handle faults, and provide algorithm
implementation to successfully transfer data to and from the interface.
You can also explore: What is Network Interface Card And Its Type
Q106. Mention any five applications that use TCP port.
Ans. Following are the five application that uses TCP port:
● FTP
● POP
● SSH
● SMTP
● Telnet
Q107. What is the 5-4-3 rule? In which architectures do we use the 5-4-3 rule?
Ans. In the 5-4-3 rule, there is a maximum of five segments in a network that are connected
with four repeaters. It is used in 10Base2 and 10Base5 Ethernet architectures. In this rule,
only three segments can be populated with nodes.
Q108. Name the measurement unit used to measure the transmission speed of
Ethernet?
Ans. Mbps is the measurement unit used to measure the transmission speed of Ethernet.
Q109. Name the switching method used to explore the destination Mac address.
Ans. The switching method that is used to explore the destination Mac address is Cut
Through.
Ans. DDR stands for dial-on-demand routing used to generate and close a circuit-switched
session. It provides on-demand routing to the low volume and periodic traffic.
Ans. One access list can be used per interface and per protocol.
Q112. What is the possible way to convert the user data from DTE to the WAN
Service Form?
Ans. To convert the user data from DTE to WAN Service Form, we can use the Modem,
CSU/DSU, and TA/NT1.
Ans. WAN services obtained by Cisco routers are switched services where protocols are
used to connect end to end devices and Interface front end.
Q114. Name the various technologies involved in building WAN links?
Ans. In the Sliding Window, the sender and receiver must deal with the manageable
sequence numbers. This abstract concept defines the range of sequence numbers with the
concern of sender and receiver.
Q116. What standard color sequences are used for a straight-through cable?
Ans. Standard colour sequences used for a straight-through cable are Orange/white,
orange, green/white, green, blue/white, blue, brown/white, brown.
Ans. Simple Mail Transfer Protocol (SMTP) is a protocol used to move all internal mail
across different networks. It works with Mail Transfer Agent (MTA) and provides the mail
transmission on the TCP/IP protocol stack.
1. PAN does not require any extra space as it does not need any cables and wires.
Ans. In TCP IP protocol, a link-layer switch is involved with the data-link layer and physical
layer.
Ans. Multistation Access Unit(MAU) is a device used to connect multiple network stations in
star topology in the form of a ring which is also known as a token ring network.
Q125. Mention the maximum number of networks and hosts used in classes A,
B, and C networks.
Ans. The maximum number of networks and hosts used in class A, B, and C networks are:
Baud rate = bit rate / N, where N is the no. of bits represented by each signal shift.
Ans. ICMP (Internet Control Message Protocol) is a network layer protocol of the TCP/IP
suite used by hosts and gateways to send notification of datagram problems back to the
sender.
Ans. This is one of the important networking interview questions. The differences between
TCP and UDP are:
For more information, you can also explore: TCP vs UDP: What’s the Difference?
TCP (Transmission Control UDP (User Datagram Protocol)
Protocol)
Heavyweight. Lightweight.
TCP is used by HTTP, HTTPS, FTP, UDP is used by protocols like DNS,
and SMTP. RIP, SNMP, RTP, TFTP, and NIP.
We hope these networking interview questions will help you to crack your next hardware
and networking interview.
_________________________________________________________________________
_
Recently completed any professional course/certification from the market? Tell us what liked
or disliked in the course for more curated content.
Like
72 readers liked the blog
(303.8k views)
Rashmi Karan