Mayank_Singh
Basic Networking Q&A
I’ve created a document with essential networking questions that are super
helpful for interviews.
1. What is Computer Networking?
Answer: Computer networking is the practice of connecting computers and
other devices to share resources, communicate, and exchange data. Networks
can range from small local area networks (LANs) to wide area networks (WANs)
and the Internet. Example: The Internet, where millions of devices worldwide
communicate using various protocols.
2. What is the Internet?
Answer: The Internet is a global system of interconnected computer networks
that use the Internet Protocol Suite (TCP/IP) to communicate. It is a network of
networks that connects billions of devices worldwide. Example: Browsing
websites, sending emails, or streaming videos are typical uses of the Internet.
3. What is the Client-Server Model?
Answer: The client-server model is a network architecture where the client
requests services or resources, and the server provides them. Example:
Mayank_Singh
Accessing a website where your browser (client) requests the page from a web
server.
4. What is Peer-to-Peer (P2P) Networking?
Answer: In P2P networking, devices (peers) communicate directly without a
centralized server, sharing resources equally. Example: File-sharing systems like
BitTorrent.
5. What is the Application Layer?
Answer: The application layer is the topmost layer in the Internet protocol
stack that provides network services to applications. Example: Protocols like
HTTP (web browsing), SMTP (email), and DNS (domain name resolution).
6. What is HTTP?
Answer: Hypertext Transfer Protocol (HTTP) is the protocol used for
transmitting web pages over the Internet. It operates on the request-response
model. Example: Visiting a website by typing its URL in a browser.
7. What is HTTPS?
Answer: HTTPS is the secure version of HTTP, using encryption protocols like
TLS/SSL to ensure secure data transfer. Example: Online banking or e-
commerce transactions.
8. What is FTP?
Answer: File Transfer Protocol (FTP) is a protocol for transferring files between
a client and server. Example: Uploading files to a web server.
9. What is DNS?
Mayank_Singh
Answer: The Domain Name System (DNS) translates human-readable domain
names (e.g., [Link]) into IP addresses. Example: Typing
"[Link]" in your browser, which DNS resolves to an IP address.
10. What is SMTP?
Answer: Simple Mail Transfer Protocol (SMTP) is a protocol for sending emails.
Example: Sending an email from Gmail to another email server.
11. What is the Transport Layer?
Answer: The transport layer ensures reliable data transfer between hosts,
providing end-to-end communication. Example: TCP (reliable) and UDP
(unreliable) protocols.
12. What is TCP?
Answer: Transmission Control Protocol (TCP) is a reliable, connection-oriented
protocol that ensures error-free data transfer. Example: File downloads or
loading web pages.
13. What is UDP?
Answer: User Datagram Protocol (UDP) is a lightweight, connectionless
protocol with no guarantee of delivery. Example: Video streaming or online
gaming.
14. What is the Network Layer?
Answer: The network layer handles the routing of data packets between
devices across networks. Example: Protocols like IP, ICMP, and ARP.
15. What is an IP Address?
Mayank_Singh
Answer: An IP address is a unique identifier assigned to a device on a network
for communication. Example: IPv4 (e.g., [Link]) or IPv6 (e.g.,
[Link]).
16. What is Subnetting?
Answer: Subnetting divides a larger network into smaller sub-networks to
improve management and security. Example: A company dividing its office
network into separate subnets for different departments.
17. What is NAT?
Answer: Network Address Translation (NAT) allows private IP addresses to be
translated into a public IP address for Internet communication. Example: Home
routers using a single public IP for all connected devices.
18. What is ARP?
Answer: Address Resolution Protocol (ARP) maps an IP address to a device's
physical MAC address. Example: Resolving a device's hardware address in a
local network.
19. What is the Data Link Layer?
Answer: The data link layer ensures error-free data transfer over the physical
network. Example: Ethernet frames carrying data across a wired LAN.
20. What is Ethernet?
Answer: Ethernet is a technology for connecting devices in a wired LAN,
following the IEEE 802.3 standard. Example: Office networks using Ethernet
cables.
21. What is a MAC Address?
Mayank_Singh
Answer: A MAC address is a hardware identifier for a network interface card
(NIC), unique to each device. Example: "[Link]."
22. What is Wi-Fi?
Answer: Wi-Fi is a wireless networking technology allowing devices to
communicate over radio waves. Example: Connecting a smartphone to a home
wireless router.
23. What is the Physical Layer?
Answer: The physical layer transmits raw bits over a communication medium,
such as cables or wireless signals. Example: Fiber-optic cables for high-speed
Internet.
24. What is Network Security?
Answer: Network security involves protecting data and resources from
unauthorized access or attacks. Example: Firewalls, encryption, and VPNs.
25. What is a Firewall?
Answer: A firewall is a security device that monitors and controls incoming and
outgoing network traffic. Example: Blocking unauthorized access to a private
network.
26. What is Encryption?
Answer: Encryption converts data into an unreadable format to protect it
during transmission. Example: HTTPS using SSL/TLS.
27. What is a VPN?
Answer: A Virtual Private Network (VPN) extends a private network across a
public network securely. Example: Employees accessing company resources
remotely.
Mayank_Singh
28. What is Bandwidth in Networking?
Answer:
Bandwidth refers to the maximum amount of data that can be transmitted over
a network connection in a given amount of time, typically measured in bits per
second (bps).
Example: A 100 Mbps internet connection can transfer up to 100 million bits
per second.
29. What is a Packet in Networking?
Answer:
A packet is a small unit of data sent over a network. It includes a header (with
metadata like source and destination addresses) and the payload (actual data).
Example: When you send an email, it is divided into packets, each routed
separately to the recipient.
30. What is Latency in Networking?
Answer:
Latency is the delay between the time data is sent and the time it is received. It
is measured in milliseconds (ms).
Example: High latency in online gaming can cause lag, affecting gameplay.
31. What is a Hub?
Answer:
A hub is a networking device that connects multiple devices in a LAN and
broadcasts incoming data to all connected devices.
Example: Hubs are mostly outdated, replaced by switches for better efficiency.
32. What is a Switch?
Answer:
A switch is a network device that connects devices in a LAN and uses MAC
Mayank_Singh
addresses to forward data to the correct destination.
Example: Modern office networks use switches for efficient data transfer
between devices.
33. What is a Router?
Answer:
A router is a device that connects multiple networks and directs data packets
based on IP addresses. It enables communication between devices on different
networks.
Example: A home Wi-Fi router connects your devices to the Internet.
34. What is an SSID?
Answer:
SSID (Service Set Identifier) is the name of a Wi-Fi network that devices use to
identify and connect to it.
Example: When connecting to a public Wi-Fi, you select its SSID from the
available network list.
35. What is Network Congestion?
Answer:
Network congestion occurs when a network's bandwidth is overwhelmed by
too much traffic, leading to delays and packet loss.
Example: Slow internet speed during peak hours in heavily populated areas.
36. What is QoS (Quality of Service)?
Answer:
QoS refers to technologies that manage network traffic to ensure performance
for critical applications, minimizing latency, jitter, and packet loss.
Example: Prioritizing VoIP calls over file downloads in a network.
37. What is Multicast in Networking?
Mayank_Singh
Answer:
Multicast is a communication method where data is sent from one source to
multiple recipients simultaneously, reducing bandwidth usage.
Example: Streaming live events to multiple viewers using multicast protocols.
38. What is a Proxy Server?
Answer:
A proxy server acts as an intermediary between a client and the internet. It
processes client requests, forwards them to the internet, and returns the
responses. Proxy servers are used for anonymity, caching data to improve
performance, and controlling access to certain websites. They also enhance
security by filtering malicious content and hiding the client's IP address. Proxies
can be forward or reverse, depending on the direction of traffic flow.
Example: Organizations use proxy servers to restrict employee access to social
media during work hours.
39. What is a VLAN?
Answer:
A Virtual Local Area Network (VLAN) is a logical grouping of devices within a
physical LAN to segregate traffic. VLANs allow networks to be divided into
smaller, isolated segments, improving security and reducing congestion. Each
VLAN functions as a separate network, even if devices are on the same physical
infrastructure. VLANs are implemented through switches using specific tags in
the Ethernet frames. They are configured to optimize traffic flow and network
management.
Example: In an office, VLANs can separate traffic for HR, IT, and Finance
departments, ensuring better security.
40. What is a Data Packet's Structure?
Answer:
A data packet consists of three main parts: the header, payload, and footer. The
header contains metadata such as source/destination addresses, sequence
numbers, and protocol information. The payload is the actual data being
transmitted, like a file or message. The footer ensures data integrity with error-
checking information. Packets are transmitted independently and reassembled
Mayank_Singh
at the destination. This modular structure is key for efficient and reliable
communication over networks.
Example: An email sent over the internet is broken into multiple packets, each
following this structure.
41. What is TCP Handshake?
Answer:
The TCP handshake, also called the three-way handshake, establishes a reliable
connection between a client and a server. It involves three steps: SYN
(synchronize), SYN-ACK (synchronize-acknowledge), and ACK (acknowledge).
This process ensures both parties agree to start communication and determine
initial sequence numbers for data transfer. The handshake minimizes errors and
guarantees data integrity.
Example: When you visit a website, your browser initiates a TCP handshake
with the server before loading the page.
42. What is Jitter in Networking?
Answer:
Jitter refers to the variation in packet arrival times during data transmission.
High jitter occurs when packets take inconsistent times to reach their
destination, causing issues in time-sensitive applications like VoIP and video
streaming. It results from network congestion, route changes, or hardware
issues. Jitter is measured in milliseconds, and lower values indicate better
network performance.
Example: A video call experiencing delays and poor synchronization due to
fluctuating packet arrival times.
43. What is DHCP?
Answer:
The Dynamic Host Configuration Protocol (DHCP) automatically assigns IP
addresses to devices on a network, simplifying network management. DHCP
servers allocate unique IP addresses, subnet masks, default gateways, and DNS
server information dynamically to clients. This eliminates manual configuration,
reduces errors, and ensures efficient use of IP address pools. It operates on a
Mayank_Singh
lease mechanism, meaning addresses are temporary and can be reused.
Example: When you connect a laptop to Wi-Fi, the router assigns it an IP
address using DHCP.
44. What is a Broadcast in Networking?
Answer:
A broadcast is a method of sending a message to all devices in a network
segment simultaneously. Unlike unicast (to one recipient) or multicast (to
multiple specific recipients), broadcast reaches every device in the domain. It is
used for network discovery, like identifying services or requesting IP addresses
(via DHCP). Broadcast traffic is limited to its subnet to avoid overwhelming the
network.
Example: A DHCP request broadcasted to locate a DHCP server within the LAN.
45. What is ICMP?
Answer:
The Internet Control Message Protocol (ICMP) is used for error reporting and
operational queries in a network. It is not used to transmit application data but
rather to report issues like unreachable hosts or network congestion. ICMP
messages include Echo Request and Echo Reply, commonly used in the ping
command for network diagnostics. While useful, ICMP traffic can be blocked or
filtered for security reasons.
Example: Using ping to test connectivity to a website by sending ICMP packets.
46. What is MPLS?
Answer:
Multiprotocol Label Switching (MPLS) is a routing technique that uses labels
instead of IP addresses to direct data packets through a network. This improves
speed and efficiency by avoiding complex routing table lookups. MPLS is widely
used in enterprise networks for creating VPNs, enhancing performance, and
ensuring quality of service (QoS) for critical applications. It supports multiple
protocols, making it versatile for various network types.
Example: A telecom company using MPLS for reliable data transmission across
its backbone network.
Mayank_Singh
47. What is a CDN?
Answer:
A Content Delivery Network (CDN) is a distributed network of servers that
delivers web content and resources based on the user's geographical location.
CDNs reduce latency and improve load times by caching content closer to end
users. They are essential for high-traffic websites and global services, ensuring
reliability and scalability. CDNs also provide DDoS protection and load
balancing for better security and performance.
Example: Streaming platforms like Netflix use CDNs to deliver videos quickly
and efficiently.
48. What is a Load Balancer?
Answer:
A load balancer is a device or software that distributes incoming network traffic
across multiple servers to ensure optimal resource use, minimize response
time, and prevent overload on any single server. It improves the reliability and
scalability of web applications by evenly distributing workloads and rerouting
traffic in case of server failure. Load balancers use algorithms like round-robin,
least connections, and IP hashing to allocate requests effectively.
Example: Websites like Amazon use load balancers to handle millions of user
requests during peak shopping seasons.
49. What is a Honeypot in Networking?
Answer:
A honeypot is a security mechanism that acts as a decoy system to attract
cyber attackers and analyze their behavior. It mimics a vulnerable or legitimate
network resource, luring attackers to interact with it while protecting the actual
network. Honeypots are used for monitoring, detecting threats, and learning
attack strategies to improve overall security measures.
Example: A honeypot server placed outside a firewall to detect unauthorized
access attempts and collect forensic data.
50. What is the OSI Model, and Why is it Important?
Mayank_Singh
Answer:
The OSI (Open Systems Interconnection) model is a conceptual framework that
standardizes network communication into seven layers: Physical, Data Link,
Network, Transport, Session, Presentation, and Application. It helps in
understanding and designing interoperable systems by clearly defining each
layer's functions. The OSI model also assists in troubleshooting by isolating
issues to specific layers. While the Internet primarily uses the TCP/IP model,
the OSI model remains a teaching and reference standard.
Example: Diagnosing a broken cable at the Physical Layer or resolving
application issues at the Application Layer.