Fundamentals 32 min read

100 Essential Networking Fundamentals Explained

This article provides concise explanations of 100 core networking concepts—from basic link definitions and OSI model layers to protocols, topologies, security measures, and hardware components—offering readers a comprehensive overview of computer network fundamentals essential for IT professionals and students alike.

Open Source Linux
Open Source Linux
Open Source Linux
100 Essential Networking Fundamentals Explained

1) What is a link?

A link refers to the connection between two devices, including the cable type and protocol that enable communication.

2) What are the layers of the OSI reference model?

There are seven OSI layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

3) What is a backbone network?

A backbone network is a centralized infrastructure that routes and distributes data across various networks, handling bandwidth management and multiple channels.

4) What is a LAN?

LAN stands for Local Area Network, connecting computers and other devices within a small physical area.

5) What is a node?

A node is a point where a network connection occurs; it can be a computer or device that is part of the network, and at least two nodes are required to form a connection.

6) What is a router?

A router connects two or more network segments and uses a routing table to determine the optimal path for data transmission, operating at the OSI Network layer.

7) What is a point‑to‑point link?

A point‑to‑point link is a direct connection between two computers on a network, requiring only a cable between their NICs and no additional networking equipment.

8) What is anonymous FTP?

Anonymous FTP allows users to access files on a public server without identifying themselves, logging in as an anonymous guest.

9) What is a subnet mask?

A subnet mask, combined with an IP address, identifies the network and host portions of the address; it is also 32 bits long.

10) What is the maximum length allowed for a UTP cable segment?

A single UTP cable segment may be up to 90–100 meters long; repeaters or switches can extend this distance.

11) What is data encapsulation?

Data encapsulation is the process of breaking information into smaller, manageable units before transmission, adding source and destination addresses and error‑checking information to the header.

12) Describe network topology.

Network topology refers to the layout of a computer network, showing the physical arrangement of devices and cables and how they interconnect.

13) What is a VPN?

A VPN (Virtual Private Network) creates a secure tunnel over a network such as the Internet, allowing safe remote connections.

14) What is NAT?

NAT (Network Address Translation) enables multiple computers on a private network to share a single public Internet connection.

15) What does the Network layer do in the OSI model?

The Network layer handles data routing, packet switching, and congestion control; routers operate at this layer.

16) How does network topology affect network design decisions?

Topology determines the media required for interconnecting devices and serves as the basis for selecting cables, connectors, and terminals.

17) What is RIP?

RIP (Routing Information Protocol) is used by routers to exchange routing information, broadcasting their routing tables to determine network distance in hops.

18) What are common ways to protect a computer network?

Install up‑to‑date antivirus software, configure firewalls correctly, and use user authentication to create a highly secure network.

19) What is a NIC?

A NIC (Network Interface Card) is a hardware component that connects a PC to a network and has a unique MAC address.

20) What is a WAN?

WAN (Wide Area Network) interconnects geographically dispersed computers and devices, linking networks across regions or countries.

21) Why is the OSI Physical layer important?

The Physical layer converts data bits to electrical signals (and vice versa) and concerns the selection and setup of network devices and cable types.

22) How many layers are there in TCP/IP?

TCP/IP has four layers: Network, Internet, Transport, and Application.

23) What is a proxy server and how does it protect a network?

A proxy server hides internal IP addresses from external users, making the internal network difficult to locate and reducing exposure.

24) What is the function of the OSI Session layer?

The Session layer establishes, manages, and terminates communication sessions between two devices.

25) Why is fault‑tolerance important, and are there limits?

Fault‑tolerant systems ensure continuous data availability by eliminating single points of failure, though they cannot protect against all issues such as accidental deletion.

26) What does 10Base‑T mean?

"10" denotes a 10 Mbps data rate, "Base" indicates baseband signaling, and "T" refers to twisted‑pair cabling.

27) What is a private IP address?

Private IP addresses are assigned for internal networks and are not routable on the public Internet, allowing reuse across multiple isolated networks.

28) What is a NOS?

A NOS (Network Operating System) is software that provides network connectivity for computers to communicate with each other and shared devices.

29) What is a DoS attack?

A DoS (Denial of Service) attack attempts to prevent users from accessing network services, often by overwhelming a server with traffic.

30) What is OSI and its role in networking?

OSI (Open Systems Interconnection) is a reference model with seven layers that defines how network devices communicate and interact.

31) Why are cables shielded and twisted?

Shielding and twisting reduce crosstalk and electromagnetic interference, preserving signal integrity.

32) What are the advantages of address sharing (NAT)?

Address sharing provides security by exposing only the public IP of the NAT device, keeping internal private IPs hidden.

33) What is a MAC address?

A MAC (Media Access Control) address uniquely identifies a device on a network; it is a 6‑byte physical address.

34) Which TCP/IP layers correspond to the OSI Application layer?

The TCP/IP Application layer maps to the OSI Session, Presentation, and Application layers.

35) How can you identify the class of a given IP address?

Examine the first octet: Class A starts with 0, Class B with 10, and Class C with 110.

36) What is the main purpose of OSPF?

OSPF (Open Shortest Path First) is a link‑state routing protocol that determines the best path for data exchange using routing tables.

37) What is a firewall?

A firewall protects internal networks from external attacks such as hackers and viruses, and can block unauthorized access.

38) Describe star topology.

Star topology connects all nodes to a central hub, making it simple to set up and maintain.

39) What is a gateway?

A gateway connects two or more network segments and typically runs software that translates between different network protocols.

40) What is a drawback of star topology?

If the central hub or switch fails, the entire network becomes unavailable.

41) What is SLIP?

SLIP (Serial Line Internet Protocol) is an early Unix protocol used for remote access over serial lines.

42) Give examples of private network address ranges.

10.0.0.0/8 (mask 255.0.0.0) and 172.16.0.0/12 (mask 255.240.0.0).

43) What is tracert?

Tracert is a Windows utility that traces the route packets take from a router to a destination, showing hop counts.

44) What are the main responsibilities of a network administrator?

Installing, configuring, and maintaining/troubleshooting the network.

45) What is a drawback of peer‑to‑peer networks?

When a workstation shares resources, its performance may degrade.

46) What is a hybrid network?

A hybrid network combines client‑server and peer‑to‑peer architectures.

47) What is DHCP?

DHCP (Dynamic Host Configuration Protocol) automatically assigns IP addresses to devices on a network.

48) What is the main function of ARP?

ARP (Address Resolution Protocol) maps known IP addresses to MAC addresses.

49) What is TCP/IP?

TCP/IP (Transmission Control Protocol/Internet Protocol) is a suite of protocols for data exchange across heterogeneous networks.

50) How can a router be used to manage a network?

Routers provide consoles for configuring security, access restrictions, time‑based policies, and content filtering.

51) Which protocol is used for cross‑platform file transfer?

FTP (File Transfer Protocol) enables platform‑independent file transfer between servers.

52) What is the purpose of a default gateway?

A default gateway routes traffic from a local network to external networks, typically using the router’s external interface address.

53) What makes a good password?

A strong password combines letters (both cases), numbers, and avoids easily guessable information.

54) What is the correct termination resistance for UTP cable?

Unshielded twisted‑pair should be terminated at 100 Ω.

55) What is netstat?

Netstat is a command‑line utility that provides information about current TCP/IP connections.

56) How many network IDs are available in a Class C network?

A Class C network has 21 bits for network ID, yielding 2,097,152 possible networks, each with up to 254 hosts.

57) What happens if a cable exceeds its specified length?

Signal loss occurs, degrading data transmission and reception.

58) What common software issues can cause network problems?

Client‑server conflicts, application clashes, misconfigurations, protocol mismatches, security issues, and policy violations.

59) What is ICMP?

ICMP (Internet Control Message Protocol) provides messaging and error handling for the TCP/IP stack.

60) What is Ping?

Ping is a utility that checks connectivity between network devices using IP addresses or hostnames.

61) What is P2P?

P2P (Peer‑to‑Peer) networks consist of individual workstations that communicate directly without a central server.

62) What is DNS?

DNS (Domain Name System) resolves hostnames to IP addresses for TCP/IP networks.

63) What are the advantages of fiber over other media?

Fiber is less susceptible to electrical interference, supports higher bandwidth, and experiences minimal signal degradation over long distances.

64) What is the difference between a hub and a switch?

A hub acts as a multi‑port repeater, while a switch intelligently forwards traffic, improving performance on busy ports.

65) Which network protocols does Windows RRAS support?

RRAS supports NetBEUI, TCP/IP, and IPX.

66) What are the maximum networks and hosts for Class A, B, and C?

Class A: 126 networks, 16,777,214 hosts; Class B: 16,384 networks, 65,534 hosts; Class C: 2,097,152 networks, 254 hosts.

67) What is the standard color order for a straight‑through cable?

Orange/white, orange, green/white, blue, blue/white, green, brown/white, brown.

68) Which protocols lie beneath the TCP/IP Application layer?

FTP, TFTP, Telnet, and SMTP.

69) Can two computers share files without a hub or router?

Yes, by connecting them with a crossover cable that swaps transmit and receive pins.

70) What is ipconfig?

Ipconfig is a utility that displays a computer’s network configuration, including MAC and IP addresses.

71) What is the difference between straight‑through and crossover cables?

Straight‑through cables connect a computer to a hub, switch, or router; crossover cables connect similar devices directly (e.g., PC‑to‑PC).

72) What is client/server architecture?

In a client/server network, one or more computers act as servers providing resources (e.g., printers, files) to client workstations.

73) How is a network defined?

A network is the interconnection of computers and peripheral devices for data communication, using wired or wireless links.

74) Does moving a NIC card transfer its MAC address?

Yes; the MAC address is hard‑wired to the NIC, not the PC, so swapping NICs changes the MAC address.

75) What is cluster support?

Cluster support allows multiple servers to operate together so that if one fails, another continues processing.

76) Where should antivirus software be installed in a network with two servers and twenty workstations?

Antivirus should be installed on all servers and workstations to protect against virus introduction via removable media.

77) Describe Ethernet.

Ethernet is a widely used LAN technology developed in the early 1970s, based on IEEE standards.

78) What are the drawbacks of a ring topology?

A single workstation failure can bring down the entire network, and reconfiguring part of the network requires temporary shutdown.

79) What is the difference between CSMA/CD and CSMA/CA?

CSMA/CD (Collision Detection) retransmits after a collision; CSMA/CA (Collision Avoidance) broadcasts intent before transmitting.

80) What is SMTP?

SMTP (Simple Mail Transfer Protocol) handles internal email delivery and provides mail transfer services on the TCP/IP stack.

81) What is multicast routing?

Multicast routing sends messages to a selected group of users rather than broadcasting to an entire subnet.

82) Why is encryption important on a network?

Encryption transforms information into unreadable code, ensuring that intercepted data remains unintelligible without the correct key.

83) How are IP addresses formatted?

IP addresses are displayed as four decimal numbers separated by periods (dot‑decimal notation), e.g., 192.168.101.2.

84) Why is authentication important?

Authentication verifies user credentials before granting network access, helping prevent unauthorized intrusion.

85) What does tunnel mode mean?

Tunnel mode creates a virtual IPSec tunnel that secures all traffic between a LAN and a gateway without using IPSec on the communicating computers themselves.

86) What technologies are used to establish WAN links?

Analog connections (regular telephone lines), digital connections (digital telephone lines), and switched connections (multiple links between sender and receiver).

87) What is an advantage of mesh topology?

If one link fails, alternative paths exist, making mesh topology highly fault‑tolerant.

88) What common hardware problems can cause network issues?

Hard‑drive failures, damaged NICs, improper hardware configuration, and other hardware faults.

89) How can signal attenuation be mitigated?

Use repeaters or hubs to regenerate the signal and ensure proper cable termination.

90) How does DHCP assist network management?

DHCP allows administrators to allocate IP address pools dynamically, eliminating the need to manually configure static addresses on each client.

91) What is a network profile?

A network profile defines configuration settings for a user, such as group membership.

92) What is Sneakernet?

Sneakernet is an early form of networking that physically transports data using removable media like disks or tapes.

93) What role does IEEE play in computer networking?

IEEE develops and manages standards for network equipment, interfaces, cabling, and connectors.

94) Which protocols operate under the TCP/IP Internet layer?

ICMP, IGMP, IP, and ARP.

95) What does permission mean in a network context?

Permission is an authorized right for a user to perform specific actions on the network.

96) What is a basic requirement for creating a VLAN?

A VLAN creates a separate broadcast domain at the switch level, improving security and traffic segmentation.

97) What is IPv6?

IPv6 (Internet Protocol version 6) was developed to replace IPv4, providing a larger address space to overcome IPv4 exhaustion.

98) What is the RSA algorithm?

RSA (Rivest‑Shamir‑Adleman) is a widely used public‑key encryption algorithm.

99) What is mesh topology?

Mesh topology connects each device directly to every other device, requiring at least two network connections per device.

100) What is the maximum segment length for 100Base‑FX?

A 100Base‑FX segment can be up to 412 meters; the overall network can reach up to 5 kilometers.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

ProtocolsSecurityOSI modeltopology
Open Source Linux
Written by

Open Source Linux

Focused on sharing Linux/Unix content, covering fundamentals, system development, network programming, automation/operations, cloud computing, and related professional knowledge.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.