0% found this document useful (0 votes)
33 views16 pages

Computer Network Placement Guide

Uploaded by

jayshah2337
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views16 pages

Computer Network Placement Guide

Uploaded by

jayshah2337
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Vishwakarma Government Engineering College,

Chandkheda, Ahmedabad
Department of Information Technology

COMPUTER NETWORK

PLACEMENT GUIDE

Mentor: Nikunj Gamit Compiled by:Janvi Gupta


Guide By:Abhi Shah Ayushi Mandavia
Darmit Shah Aayushi Prajapati
Mihir Someshwara Sakshi Bagaria
Table of Content
SR.NO TITLE PAGE NO

1. Introduction 1

2. Types of Network 2

3. Network Topology 3

4. VPN 5

5. IP address 5

6. Mac address 6

7. OSI Layer 6

8. TCP/IP Reference model 7

9. Firewall 8

10. Protocols 8

11. Key points 10


Computer Networks
● A network is a set of devices that are connected with a physical media link.
● In a network, two or more nodes are connected by a physical link or two or
more networks are connected by one or more nodes.
● A network is a collection of devices connected to each other to allow the
sharing of data.
● Example of a network is the internet. An internet connects the millions of
people across the world.

❖ Types of Network:

1) PAN (Personal Area Network):


● Let devices connect and communicate over the range of a person. E.g.
connecting Bluetooth devices.

2) LAN (Local Area Network):


● It is a privately owned network that operates within and nearby a single
building like a home, office, or factory.

1
3) MAN (Metropolitan Area Network):
● It connects and covers the whole city. E.g. TV Cable connection over
the city.

4) WAN (Wide Area Network):


● It spans a large geographical area, often a country or continent. The
Internet is the largest WAN.

5) GAN (Global Area Network):


● It is also known as the Internet which connects the globe using
satellites. The Internet is also called the Network of WANs.

2
❖ Network Topology:
● The arrangement of a network that comprises nodes and connecting lines
via sender and receiver is referred to as network topology.

❖ Types of network topology:


1. Bus Topology:
● All the nodes are connected using the central link known as the bus. It
is useful to connect a smaller number of devices. If the main cable gets
damaged, it will damage the whole network.

2. Star Topology:
● All the nodes are connected to one single node known as the central
node. If the central node fails, the complete network is damaged.
Mainly used in home and office networks.

3
3. Ring Topology:
● Each node is connected to exactly two nodes forming a ring structure.
If one of the nodes are damaged, it will damage the whole network. It is
used very rarely as it is expensive and hard to install and manage.

4. Mesh Topology:
● Each node is connected to one or many nodes. It is robust as failure in
one link only disconnects that node. It is rarely used and installation
and management are difficult.

5. Tree Topology:
● A combination of star and bus topology also know as an extended bus
topology. All the smaller star networks are connected to a single bus. If
the main bus fails, the whole network is damaged.

4
6. Hybrid Topology: It is a combination of different topologies to form a new
topology. It helps to ignore the drawback of a particular topology and helps to
pick the strengths from other.

❖ VPN:
● VPN stands for the Virtual Private Network.
● A virtual private network (VPN) is a technology that creates a safe and
encrypted connection over a less secure network, such as the internet.
● A Virtual Private Network is a way to extend a private network using a public
network such as the internet.
● The name only suggests that it is a Virtual “private network” i.e. user can be
part of a local network sitting at a remote location. It makes use of
tunnelling protocols to establish a secure connection.

❖ IP address:
● An IP address is a unique numerical identifier assigned to each device
connected to a computer network. IP addresses are used to route traffic
across the internet and can be used to identify individual devices.
● IPv4: An IP address is a 32-bit dynamic address of a node in the network. An
IPv4 address has 4 octets of 8-bit each with each number with a value up to
255. IPv4 classes are differentiated based on the number of hosts it supports
on the network.
● IPv6: IPv6 is the most recent version of the Internet Protocol, and it features a
number of improvements and additions over IPv4. For one, IPv6 addresses are
much longer than IPv4 addresses, which allows for a far greater number of
unique addresses. IPv6 also supports a number of new features, such as
Quality of Service, which allows for better control of traffic flow, and multicast

5
addressing, which allows for one message to be sent to multiple recipients at
once.

❖ MAC Address:
● MAC address is the Media Access Control address. It is a 48-bit or 64-bit
unique identifier of devices in the network. It is also called the physical
address embedded with Network Interface Card (NIC) used at the Data Link
Layer.

❖ OSI Layer:
● Open System Interconnections (OSI) is a network architecture model based
on the ISO standards. It is called the OSI model as it deals with connecting the
systems that are open for communication with other systems.

❖ Layers of OSI:

Layer Unit Exchanged Description


It is concerned with transmitting raw bits over a
communication channel.
Chooses which type of transmission mode is to be
Physical Bit selected for the transmission. The available
transmission modes are Simplex, Half Duplex and Full
Duplex.,

The main task of this layer is to transform a raw


transmission facility into a line that appears free of
undetected transmission errors.
It also allows detecting damaged packets using the
CRC (Cyclic Redundancy Check) error-detecting,
code.
Data Link Frame When more than one node is connected to a shared
link, Data Link Layer protocols are required to
determine which device has control over the link at a
given time.
It is implemented by protocols like CSMA/CD,
CSMA/CA, ALOHA, and Token Passing.

It controls the operation of the subnet.


Network Packet The network layer takes care of feedback messaging
through ICMP messages.

6
Layer Unit Exchanged Description
The basic functionality of this layer is to accept data
TPDU - from the above layers, split it up into smaller units if
Transaction needed, pass these to the network layer, and ensure
Transport that all the pieces arrive correctly at the other end.
Protocol Data
Unit The Transport Layer takes care of Segmentation and
Reassembly.

The session layer allows users on different machines


SPDU - Session to establish sessions between them.
Session Protocol Data Dialogue control is using the full-duplex link as
Unit half-duplex. It sends out dummy packets from the
client to the server when the client is ideal.

The presentation layer is concerned with the syntax


PPDU - and semantics of the information transmitted.
Presentatio Presentation It translates a message from a common form to the
n Protocol Data encoded format which will be understood by the
Unit receiver.

APDU - It contains a variety of protocols that are commonly


Application needed by users.
Application The application layer sends data of any size to the
Protocol Data
Unit transport layer.

❖ TCP/IP Reference Model:


● It is a compressed version of the OSI model with only 4 layers. It was
developed by the US Department of Defence (DoD) in the 1980s. The name of
this model is based on 2 standard protocols used i.e. TCP (Transmission
Control Protocol) and IP (Internet Protocol).

❖ Layers of TCP/IP

Layer Description
Decides which links such as serial lines or classic Ethernet must be
Link
used to meet the needs of the connectionless internet layer.
The internet layer is the most important layer which holds the
Internet
whole architecture together.

7
Layer Description
It delivers the IP packets where they are supposed to be delivered.

Its functionality is almost the same as the OSI transport layer. It


Transport
enables peer entities on the network to carry on a conversation.

Application It contains all the higher-level protocols.

❖ Firewall:
● A firewall is a network security system, responsible to manage network traffic.
● It uses a set of security rules to prevent remote access and content filtering.
● Firewalls are used to protect the systems or networks from viruses, worms,
malware, etc.

❖ Protocols:
● A protocol is a set of rules for formatting and processing data. Network
protocols are like a common language for computers.

1. HTTP:
● Hypertext Transfer Protocol (HTTP) is an application-layer protocol for
transmitting hypermedia documents, such as HTML.

2. HTTPS:
● The full form of HTTPS is Hypertext transfer protocol secure. It is an
advanced version of the HTTP protocol. Its port number is 443 by
default. It uses SSL/TLS protocol for providing security.

8
3. TELNET:
● TELNET is a client-service protocol on the internet or local area
network, allowing a user to log on to a remote device and have access
to it. This is among the most commonly asked networking interview
questions. Technically, it is a bidirectional interactive text-oriented
communication facility, which uses a virtual terminal connection.

4. TCP:
● TCP or TCP/IP is the Transmission Control Protocol/Internet Protocol.
It is a set of rules that decides how a computer connects to the Internet
and how to transmit the data over the network. It creates a virtual
network when more than one computer is connected to the network
and uses the three ways handshake model to establish the connection
which makes it more reliable.

5. UDP:
● UDP is the User Datagram Protocol and is based on Datagrams. Mainly,
it is used for multicasting and broadcasting. Its functionality is almost
the same as TCP/IP Protocol except for the three ways of handshaking
and error checking. It uses a simple transmission without any
hand-shaking which makes it less reliable.

6. RIP:
● RIP stands for Routing Information Protocol. It is accessed by the
routers to send data from one network to another. RIP is a dynamic
protocol which is used to find the best route from source to the
destination over a network by using the hop count algorithm. Routers
use this protocol to exchange the network topology information. This
protocol can be used by small or medium-sized networks.

7. ICMP:
● ICMP is the Internet Control Message Protocol. It is a network layer
protocol used for error handling. It is mainly used by network devices
like routers for diagnosing the network connection issues and crucial
for error reporting and testing if the data is reaching the preferred
destination in time. It uses port 7 by default.

8. DHCP:
● DHCP is the Dynamic Host Configuration Protocol. It is an application
layer protocol used to auto-configure devices on IP networks enabling
them to use the TCP and UDP-based protocols. The DHCP servers
auto-assign the IPs and other network configurations to the devices

9
individually which enables them to communicate over the IP network. It
helps to get the subnet mask, IP address and helps to resolve the DNS.
It uses port 67 by default.

9. ARP:
● ARP is Address Resolution Protocol. It is a network-level protocol used
to convert the logical address i.e. IP address to the device's physical
address i.e. MAC address. It can also be used to get the MAC address
of devices when they are trying to communicate over the local network.

10.FTP:
● FTP is a File Transfer Protocol. It is an application layer protocol used
to transfer files and data reliably and efficiently between hosts. It can
also be used to download files from remote servers to your computer.
It uses port 27 by default.

11.SMTP:
● SMTP is the Simple Mail Transfer Protocol. SMTP sets the rule for
communication between servers. This set of rules helps the software
to transmit emails over the internet. It supports both End-to-End and
Store-and-Forward methods. It is in always-listening mode on port 25.

12.POP3:
● POP3 stands for Post Office Protocol version3. POP is responsible for
accessing the mail service on a client machine. POP3 works on two
models such as Delete mode and Keep mode.

❖ Key Points:

1. Link:
● A link basically is the connection between two or more computers or
devices. It can be anything depending on whether it is a physical connection
or a wireless one. Physical links include cables, hubs, switches, etc and
wireless links wireless access points, routers, etc.

2. Nodes:

● The point of intersection in a network is called a Node. Nodes can send or


receive data/ information within a network. For example, if two computers
are connected to form a network, there are 2 nodes in that network.
Similarly, in case there are computers, there will be three nodes and so on. It

10
is not necessary for a node to be a computer, it can be any communicating
device such as a printer, servers, modems, etc.

3. Subnet:

● A subnet is a network inside a network achieved by the process called


subnetting which helps divide a network into subnets. It is used for getting a
higher routing efficiency and enhances the security of the network. It
reduces the time to extract the host address from the routing table.

4. Gateway:

● A node that is connected to two or more networks is commonly known as a


gateway

5. Router:

● Routers are networking devices operating at layer 3 or a network layer of the


OSI model. They are responsible for receiving, analysing, and forwarding
data packets among the connected computer networks. When a data packet
arrives, the router inspects the destination address, consults its routing
tables to decide the optimal route and then transfers the packet along this
route.

6. Hub:

● Hub is a networking device which is used to transmit the signal to each port
(except one port) to respond from which the signal was received. Hub is
operated on a Physical layer. In this packet filtering is not available. It is of
two types: Active Hub, Passive Hub.

7. Switch:

● Switch is a network device which is used to enable the connection


establishment and connection termination on the basis of need. Switch is
operated on the Data link layer. In this packet filtering is available. It is a type
of full duplex transmission mode and it is also called an efficient bridge.

11
8. Ipconfig:

● Internet Protocol Configuration, It is a command used in Microsoft operating


systems to view and configure network interfaces

9. Ifconfig:

● Interface Configuration, It is a command used in MAC, Linux, UNIX operating


systems to view and configure network interfaces

10. DNS:

● DNS is the Domain Name System. It is considered as the devices/services


directory of the Internet. It is a decentralized and hierarchical naming
system for devices/services connected to the Internet. It translates the
domain names to their corresponding IPs. For e.g. interviewbit.com to
172.217.166.36. It uses port 53 by default.

11. NIC:

● NIC stands for Network Interface Card. It is a peripheral card attached to the
PC to connect to a network. Every NIC has its own MAC address that
identifies the PC on the network. It provides a wireless connection to a local
area network. NICs were mainly used in desktop computers.

12.PING:

● The "ping" is a utility program that allows you to check the connectivity
between the network devices. You can ping devices using its IP address or
name.

13. Netstat:

● It is a command line utility program. It gives useful information about the


current TCP/IP setting of a connection

14. Unicasting:

● If the message is sent to a single node from the source, then it is known as
unicasting. This is commonly used in networks to establish a new
connection

12
15. Multicasting:

● If the message is sent to a subset of nodes from the source, then it is known
as multicasting. Used to send the same data to multiple receivers.

16. Anycasting:

● If the message is sent to any of the nodes from the source, then it is known
as anycasting. It is mainly used to get the content from any of the servers in
the Content Delivery System.

17. Broadcasting:

● If the message is sent to all the nodes in a network from a source, then it is
known as broadcasting. DHCP and ARP in the local network use
broadcasting.

18. NAT:

● It stands for Network Address Translation and is a protocol that allows a


network device, usually a firewall, to assign a public address to a
computer/s inside a private network.

19. RTT:

● Round Trip Time or RTT is the time taken to send a message from one end
of a network to the other and back.

20. Localhost:

● Localhost is the standard hostname given to the machine, and it is


represented by the IP address 127.0.0.1. Therefore, we can say that
127.0.0.1 and localhost are the same thing.

21. Multiplexing:

● In Networking, multiplexing is the set of techniques that is used to allow the


simultaneous transmission of multiple signals across a single data link.

13
❖ References:

https://www.javatpoint.com/networking-interview-questions

https://www.interviewbit.com/networking-interview-questions/

https://www.naukri.com/learning/articles/networking-interview-questions-
answers/

https://www.guru99.com/networking-interview-questions.html

https://www.geeksforgeeks.org/top-50-computer-networking-interview-qu
estions-and-answers/

https://www.indiabix.com/technical/networking/

14

You might also like