Essential Networking Fundamentals: 100 Key Concepts Explained
This article provides concise explanations for over 100 fundamental networking questions, covering topics such as link types, OSI layers, protocols, IP addressing, network devices, topologies, security measures, and configuration tools, offering a quick reference for students and professionals seeking a solid networking foundation.
1) What is a link? A link refers to the connection between two devices, including the cable type and protocol that allow one device to communicate with another.
2) What are the layers of the OSI reference model? There are seven OSI layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
3) What is a backbone network? A backbone network is a centralized infrastructure designed to route and distribute traffic across various networks, handling bandwidth management and multiple channels.
4) What is a LAN? LAN stands for Local Area Network, a connection between a computer and other network devices located in a small physical area.
5) What is a node? A node is a point where a connection occurs; it can be a computer or device that is part of a network. Two or more nodes are required to form a network connection.
6) What is a router? A router can connect two or more network segments. It stores routing information such as paths and hop counts in its routing table and operates at the OSI Network layer to determine optimal data paths.
7) What is a point‑to‑point link? It is a direct connection between two computers on a network, requiring only a cable attached to each computer's NIC without any additional networking equipment.
8) What is anonymous FTP? Anonymous FTP allows users to access files on a public server without identifying themselves, logging in as an anonymous guest.
9) What is a subnet mask? A subnet mask, combined with an IP address, identifies the network portion and the host portion of an address; it is 32 bits long like an IP address.
10) What is the maximum length allowed for a UTP cable segment? A UTP cable segment may be up to 90‑100 meters long; repeaters or switches can be used to extend this limit.
11) What is data encapsulation? Data encapsulation is the process of breaking information into smaller, manageable units before transmission, adding source and destination addresses and error‑checking information to each header.
12) Describe network topology. Network topology refers to the physical layout of a computer network, showing how devices and cables are arranged and interconnected.
13) What is a VPN? VPN (Virtual Private Network) creates a secure tunnel over a network such as the Internet, allowing private communication between remote sites.
14) What is NAT? NAT (Network Address Translation) is a protocol that enables multiple computers on a private network to share a single public Internet connection.
15) What does the Network layer do in the OSI model? The Network layer handles data routing, packet switching, and network congestion control; routers operate at this layer.
16) How does network topology affect design decisions? Topology determines the media required for interconnecting devices and serves as the basis for selecting appropriate cables, connectors, and terminals.
17) What is RIP? RIP (Routing Information Protocol) is used by routers to exchange routing information, broadcasting their routing tables to other routers and measuring distance in hop counts.
18) How can a computer network be protected? Protection methods include installing up‑to‑date antivirus software on all machines, correctly configuring firewalls, and implementing strong user authentication.
19) What is a NIC? NIC (Network Interface Card) is a hardware component that connects a PC to a network and has a unique MAC address for identification.
20) What is a WAN? WAN (Wide Area Network) interconnects geographically dispersed computers and devices, linking networks across different regions or countries.
21) Why is the OSI Physical layer important? The Physical layer converts data bits to electrical signals (and vice versa) and involves considerations of network devices and cable types.
22) How many layers are in TCP/IP? TCP/IP has four layers: Network, Internet, Transport, and Application.
23) What is a proxy server and how does it protect a network? A proxy server hides internal IP addresses from external users, making the internal network’s location difficult to discover.
24) What is the function of the OSI Session layer? The Session layer provides protocols for establishing, managing, and terminating communication sessions between two devices.
25) Why is fault‑tolerance important, and are there limits? Fault‑tolerant systems ensure continuous data availability by eliminating single points of failure, though they cannot protect against all failures such as accidental deletions.
26) What does 10Base‑T mean? "10" denotes a 10 Mbps data rate, "Base" indicates baseband signaling, and "T" stands for twisted‑pair cable.
27) What are private IP addresses? Private IP addresses are assigned for internal networks and are not routable on the public Internet, preventing address conflicts across separate private networks.
28) What is a NOS? A Network Operating System is software that provides network connectivity for computers to communicate with each other and shared devices.
29) What is a DoS attack? A Denial‑of‑Service attack attempts to prevent users from accessing network services, often by overwhelming a server with traffic.
30) What is OSI and its role in computer networking? OSI (Open Systems Interconnection) is a 7‑layer reference model that defines how network devices communicate and interact.
31) Why are cables shielded and twisted‑pair used? Shielding and twisted‑pair construction reduce crosstalk and electromagnetic interference, preserving signal integrity.
32) What are the advantages of address sharing (NAT)? NAT provides security by exposing only the external interface’s public IP address, keeping internal private addresses hidden.
33) What is a MAC address? A MAC (Media Access Control) address uniquely identifies a device on a network and consists of six bytes.
34) Which TCP/IP layers correspond to the OSI Application layer? The TCP/IP Application layer maps to the OSI Session, Presentation, and Application layers.
35) How can you identify the class of a given IP address? By examining the first octet: Class A starts with 0, Class B with 10, and Class C with 110.
36) What is the primary purpose of OSPF? OSPF (Open Shortest Path First) is a link‑state routing protocol that determines the best path for data exchange using routing tables.
37) What is a firewall? A firewall protects an internal network from external attacks, blocking unauthorized access and malicious traffic.
38) Describe star topology. Star topology consists of a central hub or switch to which all nodes are connected, making it simple to set up and maintain.
39) What is a gateway? A gateway connects two or more network segments and typically runs software that translates between different network protocols.
40) What is a drawback of star topology? If the central hub or switch fails, the entire network becomes unavailable.
41) What is SLIP? SLIP (Serial Line Internet Protocol) is an early Unix protocol used for remote access over serial lines.
42) Give examples of private network address ranges. 10.0.0.0/8 (mask 255.0.0.0) and 172.16.0.0/12 (mask 255.240.0.0).
43) What is tracert? Tracert is a Windows utility that traces the route packets take to a destination, showing each hop.
44) What are the main responsibilities of a network administrator? Installing networks, configuring settings, and maintaining/troubleshooting the network.
45) What is a disadvantage of peer‑to‑peer networking? When a workstation shares resources, its performance may degrade.
46) What is a hybrid network? A hybrid network combines client‑server and peer‑to‑peer architectures.
47) What is DHCP? DHCP (Dynamic Host Configuration Protocol) automatically assigns IP addresses to devices on a network.
48) What is the main function of ARP? ARP (Address Resolution Protocol) maps known IP addresses to MAC addresses.
49) What is TCP/IP? TCP/IP (Transmission Control Protocol/Internet Protocol) is a suite of protocols for data exchange across heterogeneous networks.
50) How can a router be used to manage a network? Routers provide consoles for configuring security, traffic logging, access restrictions, and usage policies.
51) Which protocol is used for cross‑platform file transfer? FTP (File Transfer Protocol) enables platform‑independent file transfer between servers.
52) What is the purpose of a default gateway? A default gateway connects a local network to external networks, typically using the router’s external interface address.
53) What makes a good password? A strong password combines letters (both uppercase and lowercase), numbers, and avoids easily guessable information.
54) What is the correct termination resistance for UTP cable? The standard termination resistance for unshielded twisted‑pair cable is 100 Ω.
55) What is netstat? Netstat is a command‑line utility that provides information about current TCP/IP connections.
56) How many network IDs are available in a Class C network? A Class C network has 21 bits for network ID, yielding 2,097,152 possible networks; each network can have up to 254 hosts.
57) What happens when a cable exceeds its recommended length? Signal loss occurs, degrading data transmission and reception.
58) What common software issues can cause network problems? Issues include client‑server conflicts, application crashes, misconfigurations, protocol mismatches, security problems, and user permission errors.
59) What is ICMP? ICMP (Internet Control Message Protocol) provides messaging and error reporting for the TCP/IP stack.
60) What is Ping? Ping is a utility that checks connectivity between network devices by sending ICMP echo requests.
61) What is P2P? Peer‑to‑peer (P2P) networks consist of equal nodes that communicate directly without a central server.
62) What is DNS? DNS (Domain Name System) resolves hostnames to IP addresses for TCP/IP networks.
63) What are the advantages of fiber over other media? Fiber is less susceptible to electrical interference, supports higher bandwidth, and experiences minimal signal degradation over long distances.
64) What is the difference between a hub and a switch? A hub acts as a multi‑port repeater, while a switch intelligently forwards traffic, improving performance especially under high load.
65) Which network protocols does Windows RRAS support? NetBEUI, TCP/IP, and IPX.
66) What are the maximum networks and hosts for Class A, B, and C? Class A: 126 networks, 16,777,214 hosts; Class B: 16,384 networks, 65,534 hosts; Class C: 2,097,152 networks, 254 hosts.
67) What is the standard color order for a straight‑through cable? Orange/white, orange, green/white, blue, blue/white, green, brown/white, brown.
68) Which protocols sit below the TCP/IP Application layer? FTP, TFTP, Telnet, and SMTP.
69) Can two computers share files without a hub or router? Yes, by using a crossover cable that swaps transmit and receive pins.
70) What is ipconfig? ipconfig is a utility that displays a computer’s IP configuration, including physical (MAC) and IP addresses.
71) What is the difference between straight‑through and crossover cables? Straight‑through cables connect devices to hubs, switches, or routers; crossover cables connect similar devices directly (e.g., PC‑to‑PC).
72) What is client/server architecture? In a client/server network, one or more servers provide centralized resources (e.g., printers, files) to client workstations.
73) Define a network. A network is the interconnection of computers and peripheral devices for data communication, using wired or wireless links.
74) Does moving a NIC card transfer its MAC address? Yes; the MAC address is hard‑wired to the NIC circuitry, not the PC.
75) What is cluster support? Cluster support allows a network OS to connect multiple servers in a fault‑tolerant group so that if one fails, another continues processing.
76) Where should antivirus be installed in a network with two servers and twenty workstations? Antivirus should be installed on all servers and workstations to ensure comprehensive protection.
77) Describe Ethernet. Ethernet is a widely used networking technology developed in the early 1970s, based on IEEE standards, and commonly used in LANs.
78) What are the disadvantages of a ring topology? A single workstation failure can bring down the entire network, and reconfiguration often requires temporary shutdown of the whole network.
79) What is the difference between CSMA/CD and CSMA/CA? CSMA/CD (Collision Detection) retransmits after a collision; CSMA/CA (Collision Avoidance) broadcasts intent before transmitting.
80) What is SMTP? SMTP (Simple Mail Transfer Protocol) handles email transmission within the TCP/IP stack.
81) What is multicast routing? Multicast routing sends messages to a selected group of users rather than broadcasting to an entire subnet.
82) Why is encryption important on a network? Encryption transforms data into unreadable code, protecting information from being understood if intercepted.
83) How are IP addresses formatted? IP addresses are displayed as four decimal numbers separated by periods (dot‑decimal notation), e.g., 192.168.101.2.
84) Why is authentication important? Authentication verifies user credentials before granting network access, helping prevent unauthorized intrusion.
85) What does tunnel mode mean? Tunnel mode creates a virtual IPSec tunnel that secures all traffic between two gateways, without the communicating computers using IPSec directly.
86) What technologies are used to establish WAN links? Analog connections (regular telephone lines), digital connections (digital telephone lines), and switched connections (multiple links between sender and receiver).
87) What is an advantage of mesh topology? Mesh topology provides high fault tolerance; if one link fails, alternative paths remain available.
88) What common hardware problems can affect network troubleshooting? Issues include hard‑drive failures, damaged NICs, hardware startup problems, and incorrect hardware configurations.
89) How can signal attenuation be remedied? Using repeaters or hubs to regenerate the signal and ensuring proper cable termination can mitigate attenuation.
90) How does DHCP assist network management? DHCP automatically assigns IP addresses from a pool, eliminating the need to manually configure static addresses on each client.
91) What is a network profile? A network profile contains configuration settings for a user, such as group membership.
92) What is Sneakernet? Sneakernet is an early form of networking that physically transports data using removable media like disks or tapes.
93) What role does IEEE play in computer networking? IEEE (Institute of Electrical and Electronics Engineers) develops and maintains standards for network equipment, interfaces, cabling, and connectors.
94) Which protocols operate under the TCP/IP Internet layer? ICMP, IGMP, IP, and ARP.
95) What does permission mean in a network context? Permission is an authorized right for a user to perform specific actions on the network.
96) What is a basic requirement for creating a VLAN? VLANs require a switch that can segment broadcast domains, improving security and traffic management.
97) What is IPv6? IPv6 (Internet Protocol version 6) was developed to replace IPv4, providing a vastly larger address space.
98) What is the RSA algorithm? RSA (Rivest‑Shamir‑Adleman) is a widely used public‑key encryption algorithm.
99) What is mesh topology? Mesh topology connects each device directly to every other device, requiring at least two network connections per device.
100) What is the maximum segment length for 100Base‑FX? A 100Base‑FX segment can be up to 412 meters; the overall network can reach up to 5 kilometers.
Signed-in readers can open the original source through BestHub's protected redirect.
This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactand we will review it promptly.
MaGe Linux Operations
Founded in 2009, MaGe Education is a top Chinese high‑end IT training brand. Its graduates earn 12K+ RMB salaries, and the school has trained tens of thousands of students. It offers high‑pay courses in Linux cloud operations, Python full‑stack, automation, data analysis, AI, and Go high‑concurrency architecture. Thanks to quality courses and a solid reputation, it has talent partnerships with numerous internet firms.
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.
