Essential Networking Q&A: 100+ Key Concepts Every IT Professional Should Know
This comprehensive guide answers over one hundred fundamental networking questions, covering links, OSI layers, backbone networks, LAN, routers, protocols, security measures, cable standards, IP addressing, and many other core concepts essential for anyone working with computer networks.
1) What is a link?
A link refers to the connection between two devices, including the cable type and protocol that enable communication.
2) What are the layers of the OSI reference model?
There are seven OSI layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
3) What is a backbone network?
A backbone network is a centralized infrastructure that distributes routing and data across various networks, handling bandwidth management and multiple channels.
4) What is a LAN?
LAN stands for Local Area Network, describing connections between computers and other network devices within a small physical area.
5) What is a node?
A node is a point where a connection occurs, such as a computer or device that is part of a network; at least two nodes are needed to form a network connection.
6) What is a router?
A router connects two or more network segments, storing routing information (paths, hop counts, etc.) in its routing table to determine optimal data paths and operates at the OSI network layer.
7) What is a point‑to‑point link?
It is a direct connection between two computers on a network, requiring only a cable connecting the NICs of the two machines, without any additional networking equipment.
8) What is anonymous FTP?
Anonymous FTP allows users to access files on a public server without identifying themselves, logging in as an anonymous guest.
9) What is a subnet mask?
A subnet mask, combined with an IP address, identifies the network and host portions of the address; like an IP address, it consists of 32 bits.
10) What is the maximum length allowed for a UTP cable segment?
A single UTP cable segment may be 90–100 meters long; this limit can be overcome with repeaters or switches.
11) What is data encapsulation?
Data encapsulation is the process of breaking information into smaller, manageable blocks before transmission, adding source and destination addresses and error‑checking information to the headers.
12) Describe network topology.
Network topology refers to the physical layout of computers, devices, and cables, showing how they are interconnected.
13) What is a VPN?
A Virtual Private Network creates a secure tunnel over a network such as the Internet, allowing private communication.
14) Briefly describe NAT.
Network Address Translation enables multiple computers on a public network to share a single Internet connection.
15) What does the network layer do in the OSI model?
The network layer handles data routing, packet switching, and network congestion control; routers operate at this layer.
16) How does network topology affect network design decisions?
Topology determines the media required for interconnecting devices and influences the choice of cabling, connectors, and terminals.
17) What is RIP?
RIP (Routing Information Protocol) is used by routers to send data between networks, broadcasting routing tables and using hop count to determine distance.
18) How can a computer network be protected?
Protection methods include installing up‑to‑date antivirus software on all machines, correctly configuring firewalls, and implementing user authentication.
19) What is a NIC?
A Network Interface Card (NIC) is a hardware component that connects a PC to a network and has a unique MAC address.
20) What is a WAN?
A Wide Area Network interconnects geographically dispersed computers and devices across different regions or countries.
21) Why is the OSI physical layer important?
The physical layer converts data bits to electrical signals (and vice versa) and determines the types of network devices and cables used.
22) How many layers are in TCP/IP?
TCP/IP has four layers: Network, Internet, Transport, and Application.
23) What is a proxy server and how does it protect a network?
A proxy server hides internal IP addresses from external users, making the internal network’s location difficult to discover.
24) What is the function of the OSI session layer?
The session layer provides protocols for establishing, managing, and terminating sessions between two devices.
25) Why is implementing fault‑tolerant systems important?
Fault‑tolerant systems ensure continuous data availability by eliminating single points of failure, though they cannot protect against all issues such as accidental deletion.
26) What does 10Base‑T mean?
"10" denotes a 10 Mbps data rate, "Base" indicates baseband signaling, and "T" refers to twisted‑pair cabling.
27) What are private IP addresses?
Private IP addresses are assigned for internal networks and are not routable on the public Internet, allowing multiple internal networks to reuse the same address ranges.
28) What is a NOS?
A Network Operating System is software that provides network connectivity for computers to communicate with each other and attached devices.
29) What is DoS?
Denial‑of‑Service attacks attempt to prevent users from accessing Internet or network services, often by overwhelming a server with traffic.
30) What is OSI and its role in computer networking?
OSI (Open Systems Interconnection) is a reference model with seven layers that define how network devices communicate and transmit data.
31) Why are cables shielded and twisted?
Shielding and twisting prevent crosstalk and electromagnetic interference that can degrade signal quality.
32) What are the advantages of address sharing (NAT)?
Address sharing provides inherent security because external hosts see only the public IP of the NAT device, not internal private addresses.
33) What is a MAC address?
A Media Access Control address uniquely identifies a device on a network; it consists of six bytes.
34) Which TCP/IP application‑layer protocols correspond to OSI layers?
TCP/IP application‑layer protocols map to OSI’s Session, Presentation, and Application layers (e.g., FTP, TFTP, Telnet, SMTP).
35) How can you identify the class of a given IP address?
Examine the first octet: 0‑127 → Class A, 128‑191 → Class B, 192‑223 → Class C.
36) What is the main purpose of OSPF?
Open Shortest Path First is a link‑state routing protocol that determines optimal data paths using routing tables.
37) What is a firewall?
A firewall protects internal networks from external attacks, blocking unauthorized traffic and preventing malware spread.
38) Describe star topology.
Star topology consists of a central hub to which all nodes are connected, making it simple to set up and maintain.
39) What is a gateway?
A gateway connects two or more network segments and typically runs software that translates between different network protocols.
40) What is a drawback of star topology?
If the central hub or switch fails, the entire network becomes unavailable.
41) What is SLIP?
Serial Line Internet Protocol is an early protocol used for remote access on UNIX systems.
42) Give examples of private network addresses.
10.0.0.0/8 (mask 255.0.0.0), 172.16.0.0/12 (mask 255.240.0.0), 192.168.0.0/16 (mask 255.255.0.0).
43) What is tracert?
Tracert is a Windows utility that traces the route packets take to a destination, showing each hop.
44) What are the functions of a network administrator?
Key duties include installing the network, configuring settings, and maintaining/troubleshooting the network.
45) Describe a disadvantage of a peer‑to‑peer network.
When a workstation shares resources, its performance may degrade for other users.
46) What is a hybrid network?
A hybrid network combines client‑server and peer‑to‑peer architectures.
47) What is DHCP?
Dynamic Host Configuration Protocol automatically assigns IP addresses to devices on a network.
48) What is the main function of ARP?
Address Resolution Protocol maps known IP addresses to MAC (layer‑2) addresses.
49) What is TCP/IP?
Transmission Control Protocol/Internet Protocol is a suite of protocols for data exchange across heterogeneous networks.
50) How can a router be used to manage a network?
Routers provide consoles for configuring security, traffic control, access restrictions, and scheduling.
51) Which protocol is used for cross‑platform file transfer? FTP (File Transfer Protocol) enables platform‑independent file transfer between servers. 52) What is the purpose of a default gateway? A default gateway provides a path for a local network to reach external networks, typically via a router. 53) What makes a good password? A strong password combines letters (both cases) and numbers, avoiding easily guessed information. 54) What is the correct termination impedance for UTP cable? Unshielded twisted‑pair cables should be terminated at 100 Ω. 55) What is netstat? Netstat is a command‑line utility that displays current TCP/IP connections and related information. 56) How many network IDs are available in a Class C network? Class C networks have 21 bits for network ID, yielding 2,097,152 possible network IDs; each supports up to 254 hosts. 57) What happens if a cable exceeds its specified length? Signal loss occurs, degrading data transmission and reception. 58) What common software issues can cause network defects? Client‑server problems Application conflicts Configuration errors Protocol mismatches Security issues User policy and rights problems 59) What is ICMP? Internet Control Message Protocol provides messaging and error handling for the TCP/IP stack (e.g., used by ping). 60) What is Ping? Ping is a utility that checks connectivity between network devices using IP addresses or hostnames. 61) What is P2P? Peer‑to‑peer networking connects computers directly without a central server. 62) What is DNS? The Domain Name System resolves hostnames to TCP/IP addresses. 63) What are the advantages of fiber over other media? Fiber is less susceptible to electrical interference, supports higher bandwidth, and experiences minimal signal degradation over long distances. 64) What is the difference between a hub and a switch? Hubs act as multi‑port repeaters and become inefficient with many devices, while switches provide better performance by managing traffic on each port. 65) Which network protocols does Windows RRAS support? RRAS supports NetBEUI, TCP/IP, and IPX. 66) What are the maximum networks and hosts for A, B, and C classes? Class A: 126 networks, 16,777,214 hosts; Class B: 16,384 networks, 65,534 hosts; Class C: 2,097,152 networks, 254 hosts. 67) What is the standard color order for a straight‑through cable? Orange/white, orange, green/white, blue, blue/white, green, brown/white, brown. 68) Which protocols lie beneath the TCP/IP application layer? FTP, TFTP, Telnet, and SMTP are application‑layer protocols. 69) Can two computers share files without a hub or router? Yes, by using a crossover cable that connects transmit pins on one end to receive pins on the other. 70) What is ipconfig? Ipconfig is a utility that displays a computer’s IP configuration, including physical (MAC) and IP addresses. 71) What is the difference between straight‑through and crossover cables? Straight‑through cables connect devices to hubs, switches, or routers; crossover cables connect similar devices directly (e.g., PC‑to‑PC). 72) What is client/server architecture? In client/server networks, one or more servers provide centralized resources (e.g., printers, files) to client workstations. 73) Describe a network. A network is an interconnection of computers and peripheral devices for data communication, using wired or wireless links. 74) Does moving a NIC card transfer its MAC address? Yes; the MAC address is hard‑wired to the NIC circuitry, not the PC. 75) Explain cluster support. Cluster support allows a network operating system to connect multiple servers in a fault‑tolerant group so that if one server fails, another continues processing. 76) Where should antivirus be installed in a network with two servers and twenty workstations? Antivirus should be installed on all servers and workstations to protect against virus introduction via removable media. 77) Describe Ethernet. Ethernet is a widely used LAN technology developed in the early 1970s, based on IEEE standards. 78) What are the disadvantages of ring topology? A single workstation failure can bring down the entire network, and reconfiguring part of the network requires temporary shutdown. 79) What is the difference between CSMA/CD and CSMA/CA? CSMA/CD (Collision Detection) retransmits frames after a collision; CSMA/CA (Collision Avoidance) broadcasts intent before transmitting. 80) What is SMTP? Simple Mail Transfer Protocol handles internal mail delivery and provides mail transfer services on the TCP/IP stack. 81) What is multicast routing? Multicast routing sends messages to a selected group of users rather than broadcasting to an entire subnet. 82) Why is encryption important on a network? Encryption transforms information into unreadable code, protecting data from interception unless the correct key or password is used. 83) How are IP addresses formatted? IP addresses appear as four decimal numbers separated by periods (dot‑decimal notation), e.g., 192.168.101.2. 84) Explain the importance of authentication. Authentication verifies user credentials (usually username and password) before granting network access, limiting harmful intruders. 85) What does tunnel mode mean? In tunnel mode, two communicating computers use a virtual tunnel (often IPSec) to protect all traffic between them. 86) What technologies are involved in establishing a WAN link? Analog connections (regular telephone lines), digital connections (digital telephone lines), and switched connections (multiple links between sender and receiver). 87) What is an advantage of mesh topology? If one link fails, alternative links remain available, making mesh one of the most fault‑tolerant topologies. 88) What common hardware issues arise when troubleshooting a network? Problems may include hard‑drive failures, damaged NICs, hardware startup issues, or incorrect hardware configuration. 89) How can signal attenuation be remedied? Using repeaters or hubs to regenerate the signal and ensuring proper cable termination can mitigate attenuation. 90) How does DHCP assist network management? DHCP allows administrators to assign IP addresses dynamically from a pool, eliminating the need to configure each client manually. 91) Explain the concept of a network profile. A network profile defines configuration settings for a user, such as group membership. 92) What is Sneakernet? Sneakernet is an early form of networking that physically transports data using removable media like disks or tapes. 93) What is IEEE’s role in computer networking? The Institute of Electrical and Electronics Engineers develops and manages standards for network equipment, interfaces, cabling, and connectors. 94) Which protocols operate under the TCP/IP Internet layer? ICMP, IGMP, IP, and ARP are managed by the Internet layer. 95) What is a permission in networking? A permission is an authorized right that allows a user to perform specific actions on the network. 96) What is a basic requirement for creating a VLAN? A VLAN creates separate broadcast domains at the switch level, improving security and traffic segmentation. 97) What is IPv6? Internet Protocol version 6 replaces IPv4 to address the exhaustion of IPv4 addresses and provides a larger address space. 98) What is the RSA algorithm? RSA (Rivest‑Shamir‑Adleman) is the most widely used public‑key encryption algorithm. 99) What is mesh topology? Mesh topology connects each device directly to every other device, requiring at least two connections per device. 100) What is the maximum segment length for 100Base‑FX? A 100Base‑FX segment can be up to 412 meters; the overall network can extend up to 5 kilometers.
Efficient Ops
This public account is maintained by Xiaotianguo and friends, regularly publishing widely-read original technical articles. We focus on operations transformation and accompany you throughout your operations career, growing together happily.
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.