Fundamentals 32 min read

Essential Networking Fundamentals: 100+ Q&A on OSI Model, Protocols & Security

This comprehensive guide answers over one hundred fundamental networking questions, covering links, OSI layers, devices, protocols, IP addressing, security measures, cable types, and network topologies to help readers build a solid understanding of computer networks.

Efficient Ops
Efficient Ops
Efficient Ops
Essential Networking Fundamentals: 100+ Q&A on OSI Model, Protocols & Security

1) What is a link?

A link refers to the connection between two devices, including the cable type and protocol that enable communication.

2) What are the layers of the OSI reference model?

There are seven OSI layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

3) What is a backbone network?

A backbone network is a centralized infrastructure that distributes routing and data across various networks, handling bandwidth management and multiple channels.

4) What is a LAN?

LAN stands for Local Area Network, which connects computers and other network devices within a small physical area.

5) What is a node?

A node is a point where a connection occurs; it can be a computer or device that is part of a network. At least two nodes are required to form a network connection.

6) What is a router?

A router connects two or more network segments and stores routing information such as paths and hop counts in its routing table, operating at the OSI Network layer.

7) What is a point‑to‑point link?

A point‑to‑point link is a direct connection between two computers on a network, requiring only a cable between their NICs and no additional networking equipment.

8) What is anonymous FTP?

Anonymous FTP allows users to access files on a public server without identifying themselves, logging in as an anonymous guest.

9) What is a subnet mask?

A subnet mask, combined with an IP address, identifies the network and host portions of the address; it is also 32 bits long.

10) What is the maximum length allowed for a UTP cable?

A single UTP cable segment may be up to 90–100 meters long; longer distances can be overcome with repeaters or switches.

11) What is data encapsulation?

Data encapsulation is the process of breaking information into smaller, manageable units before transmission, adding source and destination addresses and error‑checking information to each header.

12) Describe network topology.

Network topology refers to the physical layout of computers, devices, and cables, showing how they are interconnected.

13) What is a VPN?

A VPN (Virtual Private Network) creates a secure tunnel over a network such as the Internet, allowing safe connections to remote servers.

14) What is NAT?

NAT (Network Address Translation) enables multiple computers on a private network to share a single public Internet connection.

15) What does the Network layer do in the OSI model?

The Network layer handles data routing, packet switching, and network congestion control; routers operate at this layer.

16) How does network topology affect design decisions?

Topology determines the media required for interconnecting devices and influences the choice of cables, connectors, and terminals.

17) What is RIP?

RIP (Routing Information Protocol) is used by routers to exchange routing tables, determining network distance by hop count.

18) How can a computer network be protected?

Protection methods include installing up‑to‑date antivirus software, properly configuring firewalls, and enforcing user authentication.

19) What is a NIC?

A NIC (Network Interface Card) connects a PC to a network and has a unique MAC address for identification.

20) What is a WAN?

WAN (Wide Area Network) interconnects geographically dispersed computers and devices across different regions or countries.

21) Why is the OSI Physical layer important?

The Physical layer converts data bits to electrical signals (and vice versa) and determines the appropriate devices and cable types.

22) How many layers are there in TCP/IP?

TCP/IP has four layers: Network, Internet, Transport, and Application.

23) What is a proxy server and how does it protect a network?

A proxy server hides internal IP addresses from external users, making the internal network’s location difficult to discover.

24) What is the function of the OSI Session layer?

The Session layer establishes, manages, and terminates communication sessions between two devices.

25) Why implement fault‑tolerant systems?

Fault‑tolerant systems ensure continuous data availability by eliminating single points of failure, though they cannot protect against accidental deletions.

26) What does 10Base‑T mean?

"10" denotes a 10 Mbps data rate, "Base" indicates baseband signaling, and "T" refers to twisted‑pair cabling.

27) What are private IP addresses?

Private IP addresses are assigned for internal networks and are not routable on the public Internet, allowing reuse across multiple internal networks.

28) What is a NOS?

A Network Operating System provides software that enables computers to connect and communicate over a network.

29) What is a DoS attack?

A Denial‑of‑Service attack attempts to prevent users from accessing network services, often by overwhelming a server with traffic.

30) What is OSI and its role in computer networking?

OSI (Open Systems Interconnection) is a reference model with seven layers that defines how network devices communicate and how data is transmitted.

31) Why are cables shielded and twisted?

Shielding and twisting reduce electromagnetic interference and crosstalk, preserving signal integrity.

32) What are the advantages of address sharing?

Using address translation (NAT) provides security by exposing only a public IP address to the Internet while keeping internal private addresses hidden.

33) What is a MAC address?

A MAC (Media Access Control) address uniquely identifies a device on a network and consists of six bytes.

34) Which TCP/IP protocols correspond to the OSI Application layer?

FTP, TFTP, Telnet, and SMTP are TCP/IP protocols that map to the OSI Application layer.

35) How can you identify the class of a given IP address?

By examining the first octet: 0‑127 indicates Class A, 128‑191 indicates Class B, and 192‑223 indicates Class C.

36) What is the main purpose of OSPF?

OSPF (Open Shortest Path First) is a link‑state routing protocol that determines optimal data paths using routing tables.

37) What is a firewall?

A firewall protects internal networks from external attacks by filtering traffic based on security rules.

38) Describe a star topology.

A star topology connects all devices to a central hub or switch, making it simple to set up and maintain.

39) What is a gateway?

A gateway connects two or more network segments and performs protocol translation to enable communication between different systems.

40) What is a drawback of star topology?

If the central hub or switch fails, the entire network becomes unavailable.

41) What is SLIP?

SLIP (Serial Line Internet Protocol) is an early protocol used for remote access over serial lines.

42) Give examples of private network addresses.

10.0.0.0/8 (mask 255.0.0.0) and 172.16.0.0/12 (mask 255.240.0.0).

43) What is tracert?

Tracert is a Windows utility that traces the route packets take to a destination, showing each hop.

44) What are the roles of a network administrator?

Network administrators install, configure, and maintain networks.

45) Describe a drawback of a peer‑to‑peer network.

When a workstation shares resources, its performance may degrade.

46) What is a hybrid network?

A hybrid network combines client‑server and peer‑to‑peer architectures.

47) What is DHCP?

DHCP (Dynamic Host Configuration Protocol) automatically assigns IP addresses to devices on a network.

48) What is the main function of ARP?

ARP (Address Resolution Protocol) maps known IP addresses to MAC addresses.

49) What is TCP/IP?

TCP/IP (Transmission Control Protocol/Internet Protocol) is a suite of protocols for data exchange across heterogeneous networks.

50) How can a router be used to manage a network?

Routers provide consoles for configuring security, traffic logging, access restrictions, and time‑based internet usage.

51) Which protocol is used to transfer files between UNIX and Windows servers?

FTP (File Transfer Protocol) enables platform‑independent file transfers.

52) What is the purpose of a default gateway?

A default gateway routes traffic from a local network to external networks, typically using the router’s external interface address.

53) What makes a good password?

A strong password combines letters (both cases), numbers, and avoids easily guessable information such as dates or names.

54) What is the correct termination resistance for UTP cable?

Unshielded twisted‑pair cables should be terminated at 100 Ω.

55) What is netstat?

Netstat is a command‑line utility that provides information about current TCP/IP connections.

56) How many network IDs are available in a Class C network?

A Class C network has 21 bits for network ID, yielding 2,097,152 possible networks, each with up to 254 host IDs.

57) What happens if a cable exceeds its specified length?

Signal loss occurs, degrading data transmission and reception.

58) What common software issues can cause network problems?

Issues include client‑server conflicts, application crashes, configuration errors, protocol mismatches, security problems, and user permission issues.

59) What is ICMP?

ICMP (Internet Control Message Protocol) provides messaging and error reporting for the TCP/IP stack.

60) What is Ping?

Ping is a utility that checks connectivity between network devices by sending ICMP echo requests.

61) What is P2P?

Peer‑to‑Peer networks consist of equal workstations that communicate directly without a central server.

62) What is DNS?

DNS (Domain Name System) resolves hostnames to IP addresses for TCP/IP networks.

63) What are the advantages of fiber over other media?

Fiber is less susceptible to electrical interference, supports higher bandwidth, and experiences minimal signal degradation over long distances.

64) What is the difference between a hub and a switch?

A hub acts as a multi‑port repeater, while a switch intelligently forwards traffic, improving performance on busy networks.

65) Which network protocols does Windows RRAS support?

NetBEUI, TCP/IP, and IPX.

66) What are the maximum numbers of networks and hosts for Class A, B, and C?

Class A: 126 networks, 16,777,214 hosts; Class B: 16,384 networks, 65,534 hosts; Class C: 2,097,152 networks, 254 hosts.

67) What is the standard color order for a straight‑through cable?

Orange/white, orange, green/white, blue, blue/white, green, brown/white, brown.

68) Which protocols lie beneath the TCP/IP Application layer?

FTP, TFTP, Telnet, and SMTP.

69) Can two computers share files without a hub or router?

Yes, by using a crossover cable that connects the transmit pins of one computer to the receive pins of the other.

70) What is ipconfig?

Ipconfig is a utility that displays a computer’s IP configuration, including physical (MAC) and IP addresses.

71) What is the difference between straight‑through and crossover cables?

Straight‑through cables connect a computer to a hub, switch, or router; crossover cables connect similar devices directly, such as PC‑to‑PC.

72) What is client/server architecture?

In a client/server network, one or more computers act as servers providing centralized resources (e.g., printers, files) to client workstations.

73) Define a network.

A network interconnects computers and peripheral devices for data communication, using wired or wireless links.

74) Does moving a NIC card transfer its MAC address?

Yes, the MAC address is hard‑wired to the NIC circuitry, not the PC, so swapping NICs changes the MAC address.

75) What is cluster support?

Cluster support allows a network operating system to connect multiple servers in a fault‑tolerant group, ensuring continuity if one server fails.

76) Where should antivirus software be installed in a network with two servers and twenty workstations?

Antivirus should be installed on all servers and workstations to protect against virus introduction via removable media.

77) Describe Ethernet.

Ethernet is a widely used LAN technology developed in the early 1970s, based on IEEE standards.

78) What are the disadvantages of a ring topology?

A single workstation failure can bring down the entire network, and reconfiguring a specific segment requires temporary network shutdown.

79) What is the difference between CSMA/CD and CSMA/CA?

CSMA/CD (Collision Detection) retransmits frames after a collision; CSMA/CA (Collision Avoidance) broadcasts intent before transmitting to prevent collisions.

80) What is SMTP?

SMTP (Simple Mail Transfer Protocol) handles email transmission within the TCP/IP stack.

81) What is multicast routing?

Multicast routing sends messages to a selected group of users rather than broadcasting to all nodes in a subnet.

82) Why is encryption important on a network?

Encryption transforms data into unreadable code, ensuring that intercepted information remains unintelligible without the correct key.

83) How are IP addresses formatted?

IP addresses are displayed as four decimal numbers separated by periods (dot‑decimal notation), e.g., 192.168.101.2.

84) Why is authentication important?

Authentication verifies user credentials before granting network access, helping prevent unauthorized intrusion.

85) What does tunnel mode mean?

In tunnel mode, two communicating computers use a virtual tunnel (e.g., IPSec) to protect all traffic between them.

86) What technologies are used to establish WAN links?

Analog connections (regular telephone lines), digital connections (digital telephone lines), and switched connections (multiple links between sender and receiver).

87) What is an advantage of mesh topology?

Mesh topology provides high fault tolerance because alternative links are available if one fails.

88) What common hardware issues can arise when troubleshooting network problems?

Hardware failures such as hard‑drive crashes, damaged NICs, or improper hardware configuration can cause network issues.

89) How can signal attenuation be remedied?

Using repeaters or hubs to regenerate the signal and ensuring proper cable termination can mitigate attenuation.

90) How does DHCP assist network management?

DHCP allows administrators to assign IP addresses from a pool dynamically, eliminating the need to configure each client manually.

91) What is a network profile?

A network profile contains configuration settings for a user, such as group memberships.

92) What is Sneakernet?

Sneakernet is an early form of networking that physically transports data using removable media like disks or tapes.

93) What is IEEE’s role in computer networking?

IEEE (Institute of Electrical and Electronics Engineers) develops and maintains standards for network equipment, interfaces, cabling, and connectors.

94) Which protocols operate under the TCP/IP Internet layer?

ICMP, IGMP, IP, and ARP.

95) What does permission mean in a network context?

Permission is an authorization that allows a user to perform specific actions on the network.

96) What is a basic requirement for establishing a VLAN?

A VLAN creates separate broadcast domains at the switch level, improving security and traffic segmentation.

97) What is IPv6?

IPv6 (Internet Protocol version 6) was developed to replace IPv4, providing a larger address space to overcome IPv4 exhaustion.

98) What is the RSA algorithm?

RSA (Rivest‑Shamir‑Adleman) is a widely used public‑key encryption algorithm.

99) What is a grid topology?

In a grid topology, each device is directly connected to every other device, requiring at least two network connections per device.

100) What is the maximum segment length for a 100Base‑FX network?

A 100Base‑FX segment may be up to 412 meters; the overall network can extend up to 5 kilometers.

protocolsTCP/IPnetworkingNetwork SecurityOSI modelLANWAN
Efficient Ops
Written by

Efficient Ops

This public account is maintained by Xiaotianguo and friends, regularly publishing widely-read original technical articles. We focus on operations transformation and accompany you throughout your operations career, growing together happily.

0 followers
Reader feedback

How this landed with the community

login Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.