Essential Networking Q&A: From OSI Layers to IP Addressing Explained
This article provides concise explanations of core networking concepts, covering links, OSI model layers, backbone networks, LANs, nodes, routers, point‑to‑point links, FTP, subnet masks, UTP cable limits, data encapsulation, network topologies, VPN, NAT, routing protocols, firewalls, DNS, IPv6, RSA, and many other fundamental topics essential for anyone studying computer networks.
1) What is a link? A link refers to the connection between two devices, including the cable type and protocol that enable communication.
2) What are the OSI model layers? The OSI model has seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
3) What is a backbone network? A backbone is a centralized infrastructure that routes traffic between different networks and manages bandwidth and channels.
4) What is a LAN? LAN stands for Local Area Network, connecting computers and devices within a small physical area.
5) What is a node? A node is any point where a network connection occurs, such as a computer or device; at least two nodes are needed to form a network.
6) What is a router? A router connects two or more network segments, stores routing information in a routing table, and determines optimal data paths at the OSI Network layer.
7) What is a point‑to‑point link? It is a direct connection between two computers, requiring only a crossover cable and no additional network devices.
8) What is anonymous FTP? Anonymous FTP allows users to access public server files without identifying themselves, logging in as an anonymous guest.
9) What is a subnet mask? A subnet mask, combined with an IP address, identifies the network and host portions of the address; it is a 32‑bit value.
10) What is the maximum length of a UTP cable segment? A single UTP segment may be up to 90‑100 meters; repeaters or switches can extend the reach.
11) What is data encapsulation? Data encapsulation breaks information into manageable blocks before transmission, adding source/destination addresses and error‑checking headers.
12) Describe network topology. Network topology is the physical layout of devices and cables, showing how they interconnect.
13) What is a VPN? A Virtual Private Network creates a secure tunnel over public networks (e.g., the Internet) to connect remote sites.
14) What is NAT? Network Address Translation allows multiple internal computers to share a single public Internet connection.
15) What does the OSI Network layer do? It handles routing, packet switching, and congestion control; routers operate at this layer.
16) How does network topology affect design decisions? Topology determines the media required, as well as the choice of connectors and cabling.
17) What is RIP? Routing Information Protocol enables routers to exchange routing tables, using hop count to determine distance.
18) How can a computer network be protected? Install up‑to‑date antivirus on all machines, configure firewalls correctly, and enforce user authentication.
19) What is a NIC? A Network Interface Card provides a physical connection to a network and has a unique MAC address.
20) What is a WAN? A Wide Area Network interconnects geographically dispersed computers and devices.
21) Why is the OSI Physical layer important? It converts bits to electrical signals and defines cable types and device considerations.
22) How many layers are in TCP/IP? TCP/IP has four layers: Network, Internet, Transport, and Application.
23) What is a proxy server and how does it protect a network? A proxy hides internal IP addresses from external users, making the network harder to locate and target.
24) What does the OSI Session layer do? It establishes, manages, and terminates communication sessions between devices.
25) Why implement fault‑tolerant systems? They ensure continuous data availability by eliminating single points of failure, though they cannot protect against all errors such as accidental deletion.
26) What does 10Base‑T mean? "10" denotes 10 Mbps speed, "Base" indicates baseband signaling, and "T" refers to twisted‑pair cabling.
27) What are private IP addresses? Private IPs are used within internal networks and are not routable on the public Internet, preventing address conflicts.
28) What is a NOS? A Network Operating System provides the software needed for computers to communicate over a network.
29) What is a DoS attack? A Denial‑of‑Service attack overwhelms a system to prevent legitimate users from accessing services.
30) What is OSI and its role in networking? OSI is a reference model with seven layers that defines how network devices interact and communicate.
31) Why are cables shielded and twisted? Shielding and twisting reduce crosstalk and electromagnetic interference.
32) What are the benefits of address sharing? Using NAT provides security by exposing only a single public IP address while keeping internal addresses hidden.
33) What is a MAC address? A Media Access Control address uniquely identifies a network device; it is a 6‑byte physical address.
34) Which TCP/IP layers correspond to the OSI Application layer? The TCP/IP Application layer maps to the OSI Session, Presentation, and Application layers.
35) How to identify the class of an IP address? Examine the first octet: 0‑127 = Class A, 128‑191 = Class B, 192‑223 = Class C.
36) What is the primary purpose of OSPF? Open Shortest Path First is a link‑state routing protocol that selects optimal paths using routing tables.
37) What is a firewall? A firewall protects internal networks from external attacks, blocking unauthorized traffic.
38) Describe star topology. All nodes connect to a central hub, making it simple to set up and maintain.
39) What is a gateway? A gateway connects multiple network segments and translates protocols to enable communication.
40) What is a drawback of star topology? Failure of the central hub disables the entire network.
41) What is SLIP? Serial Line Internet Protocol is an early UNIX protocol for remote access.
42) Give examples of private network addresses. 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16.
43) What is tracert? Tracert is a Windows utility that traces the route packets take to a destination, showing hop counts.
44) What are the roles of a network administrator? Installing, configuring, and maintaining networks, including troubleshooting.
45) What is a downside of peer‑to‑peer networks? Resource sharing can degrade performance of the hosting workstation.
46) What is a hybrid network? It combines client‑server and peer‑to‑peer architectures.
47) What is DHCP? Dynamic Host Configuration Protocol automatically assigns IP addresses to devices.
48) What does ARP do? Address Resolution Protocol maps known IP addresses to MAC addresses.
49) What is TCP/IP? The Transmission Control Protocol/Internet Protocol suite defines a set of layers for data exchange across heterogeneous networks.
50) How can routers manage a network? Routers provide console interfaces to configure security, traffic limits, and access controls.
51) Which protocol is used for cross‑platform file transfer? FTP (File Transfer Protocol) works across UNIX, Windows, and other systems.
52) What is the purpose of a default gateway? It provides a path for a local network to reach external networks.
53) What makes a good password? A mix of letters (both cases), numbers, and avoidance of easily guessed personal information.
54) What is the correct termination resistance for UTP? 100 Ω for unshielded twisted‑pair cables.
55) What is netstat? Netstat is a command‑line utility that displays current TCP/IP connections and statistics.
56) How many network IDs are available in a Class C network? 21 bits for network ID, yielding 2,097,152 possible networks; each network supports up to 254 hosts.
57) What happens if a cable exceeds its specified length? Signal loss occurs, degrading data transmission and reception.
58) Common software issues that cause network defects? Client‑server problems, application conflicts, misconfigurations, protocol mismatches, security issues, and policy violations.
59) What is ICMP? Internet Control Message Protocol provides messaging and error handling within the TCP/IP stack.
60) What is Ping? Ping is a utility that checks connectivity between network devices using IP addresses or hostnames.
61) What is P2P? Peer‑to‑peer networks consist of equal workstations that communicate directly without a central server.
62) What is DNS? The Domain Name System resolves hostnames to IP addresses for TCP/IP communication.
63) Advantages of fiber over other media? Fiber is less susceptible to electrical interference, supports higher bandwidth, and experiences minimal signal degradation over long distances.
64) Difference between hub and switch? Hubs act as multi‑port repeaters and become inefficient with many devices, while switches intelligently forward traffic, improving performance.
65) Which network protocols does Windows RRAS support? NetBEUI, TCP/IP, and IPX.
66) Maximum networks and hosts for Class A, B, C? Class A: 126 networks, 16,777,214 hosts; Class B: 16,384 networks, 65,534 hosts; Class C: 2,097,152 networks, 254 hosts.
67) Standard color order for a straight‑through cable? Orange/white, orange, green/white, blue, blue/white, green, brown/white, brown.
68) Which protocols sit below the TCP/IP Application layer? FTP, TFTP, Telnet, and SMTP.
69) Can two computers share files without a hub or router? Yes, using a crossover cable that directly connects the two machines.
70) What is ipconfig? Ipconfig displays a computer's IP configuration, including physical (MAC) and IP addresses.
71) Difference between straight‑through and crossover cables? Straight‑through cables connect devices to hubs/switches; crossover cables connect similar devices directly.
72) What is client/server? A network model where servers provide centralized resources (e.g., printers, files) to client workstations.
73) Describe a network. A network interconnects computers and peripherals for data communication, using wired or wireless links.
74) Does moving a NIC transfer its MAC address? Yes, because the MAC address is hard‑wired to the NIC hardware, not the PC.
75) Explain clustering support. Clustering allows multiple servers to act as a fault‑tolerant group, ensuring continuity if one server fails.
76) Where should antivirus be installed in a network with two servers and twenty workstations? On all servers and workstations to protect against virus introduction via removable media.
77) Describe Ethernet. Ethernet is a widely used LAN technology standardized by IEEE, originating in the early 1970s.
78) Drawback of ring topology? A single workstation failure can bring down the entire network, and reconfiguration may require temporary shutdown.
79) Difference between CSMA/CD and CSMA/CA? CSMA/CD detects collisions and retransmits; CSMA/CA avoids collisions by announcing transmission intent first.
80) What is SMTP? Simple Mail Transfer Protocol handles email delivery within the TCP/IP stack.
81) What is multicast routing? Multicast routing sends messages to selected groups of users rather than broadcasting to all.
82) Why is encryption important on a network? Encryption transforms data into unreadable code, protecting it from interception unless the correct key is used.
83) How are IP addresses formatted? As four decimal numbers separated by periods (dot‑decimal notation), e.g., 192.168.101.2.
84) Why is authentication important? It verifies user credentials before granting network access, helping prevent unauthorized intrusion.
85) What does tunnel mode mean? Data is encapsulated in an IPSec tunnel, allowing a LAN to connect securely to a transit network via a gateway.
86) Technologies for establishing WAN links? Analog connections (regular phone lines), digital connections (digital phone lines), and switched connections (multiple links between endpoints).
87) Advantage of mesh topology? Provides redundancy; if one link fails, alternative paths keep the network operational.
88) Common hardware issues when troubleshooting networks? Hard‑disk failures, NIC damage, power issues, and misconfigurations.
89) How to fix signal attenuation? Use repeaters or hubs to regenerate the signal and ensure proper cable termination.
90) How does DHCP assist network management? It eliminates the need to manually configure static IPs by dynamically assigning addresses from a pool.
91) What is a network profile? A set of configuration settings applied to users, such as group membership.
92) What is Sneakernet? An early networking method that physically transports data using removable media like disks or tapes.
93) Role of IEEE in computer networking? IEEE develops and maintains standards for network equipment, interfaces, cabling, and connectors.
94) Protocols under the TCP/IP Internet layer? ICMP, IGMP, IP, and ARP.
95) What is permission in a network? An authorization that allows a user to perform specific actions on the network.
96) Basic requirement for creating a VLAN? A VLAN creates separate broadcast domains at the switch level, enhancing security and traffic segmentation.
97) What is IPv6? Internet Protocol version 6 replaces IPv4 to address address exhaustion and provides a larger address space.
98) What is the RSA algorithm? RSA (Rivest‑Shamir‑Adleman) is a widely used public‑key encryption algorithm.
99) What is mesh topology? Every device connects directly to every other device, requiring at least two connections per device.
100) Maximum segment length for 100Base‑FX? Up to 412 meters per segment, with a total network length of up to 5 kilometers.
Signed-in readers can open the original source through BestHub's protected redirect.
This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactand we will review it promptly.
IT Architects Alliance
Discussion and exchange on system, internet, large‑scale distributed, high‑availability, and high‑performance architectures, as well as big data, machine learning, AI, and architecture adjustments with internet technologies. Includes real‑world large‑scale architecture case studies. Open to architects who have ideas and enjoy sharing.
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.
