Essential Networking Q&A: From OSI Layers to VPNs
This comprehensive guide answers over one hundred fundamental networking questions, covering topics such as links, OSI model layers, backbone networks, LANs, routers, protocols, IP addressing, subnet masks, security measures, topologies, and many other core concepts essential for understanding computer networks.
1) What is a link? A link refers to the connection between two devices. It includes the cable type and protocol that enable one device to communicate with another.
2) What are the layers of the OSI reference model? There are seven OSI layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
3) What is a backbone network? A backbone network is a centralized infrastructure designed to distribute routing and data across various networks, handling bandwidth management and multiple channels.
4) What is a LAN? LAN stands for Local Area Network, which connects computers to other network devices located in a small physical area.
5) What is a node? A node is a point where a connection occurs; it can be a computer or device that is part of a network. Two or more nodes are required to form a network connection.
6) What is a router? A router can connect two or more network segments. It stores routing information such as paths and hop counts, allowing it to determine the optimal data transmission route. Routers operate at the OSI network layer.
7) What is a point‑to‑point link? It is a direct connection between two computers on a network, requiring only a cable connected to each computer’s NIC without any additional networking devices.
8) What is anonymous FTP? Anonymous FTP grants users access to files on a public server without identifying themselves, allowing login as an anonymous guest.
9) What is a subnet mask? A subnet mask, combined with an IP address, identifies the network portion and the host portion of an address. Like an IP address, a subnet mask consists of 32 bits.
10) What is the maximum length allowed for a UTP cable? A single segment of UTP cable may be up to 90–100 meters long; this limitation can be overcome with repeaters and switches.
11) What is data encapsulation? Data encapsulation is the process of breaking information into smaller, manageable blocks before transmission over a network, adding source and destination addresses and a checksum to the header.
12) Describe network topology. Network topology refers to the physical layout of a computer network, showing how devices and cables are arranged and connected to each other.
13) What is a VPN? VPN stands for Virtual Private Network, a technology that creates a secure tunnel over a network such as the Internet.
14) What is NAT? NAT (Network Address Translation) is a protocol that allows multiple computers on a public network to share a single Internet connection.
15) What does the network layer do in the OSI model? The network layer is responsible for data routing, packet switching, and network congestion control. Routers operate at this layer.
16) How does network topology affect decisions when building a network? Topology determines the media that interconnecting devices must use and serves as the basis for selecting cables, connectors, and terminals.
17) What is RIP? RIP (Routing Information Protocol) is used by routers to send data from one network to another, broadcasting its routing table to all other routers and determining network distance by hop count.
18) What are common ways to protect a computer network? Install reliable, up‑to‑date antivirus on all computers, ensure firewalls are properly configured, and use user authentication; together these form a highly secure network.
19) What is a NIC? NIC stands for Network Interface Card, a hardware component that connects a PC to a network and has its own MAC address.
20) What is a WAN? WAN stands for Wide Area Network, interconnecting geographically dispersed computers and devices across different regions or countries.
21) Why is the OSI physical layer important? The physical layer converts data bits to electrical signals and vice versa, involving considerations of network devices and cable types.
22) How many layers are there in TCP/IP? There are four layers: Network, Internet, Transport, and Application.
23) What is a proxy server and how does it protect a network? A proxy server hides internal network IP addresses from external users, making the network’s physical location difficult to discover.
24) What is the function of the OSI session layer? The session layer provides protocols and methods for two devices on a network to communicate, handling session establishment, data exchange, and termination.
25) Why implement fault‑tolerant systems? Fault‑tolerant systems ensure continuous data availability by eliminating single points of failure, though they may not protect against accidental deletion.
26) What does 10Base‑T mean? "10" indicates a 10 Mbps data rate, "Base" denotes baseband, and "T" refers to twisted‑pair cable used for the network.
27) What are private IP addresses? Private IP addresses are assigned for internal networks and are not routable on the public Internet, preventing address conflicts and allowing reuse across multiple internal networks.
28) What is NOS? NOS (Network Operating System) is software that provides network connectivity to computers, enabling communication with other computers and connected devices.
29) What is DoS? DoS (Denial‑of‑Service) attacks attempt to prevent users from accessing Internet or network services, often by overwhelming a server with traffic.
30) What is OSI and what role does it play in computer networks? OSI (Open Systems Interconnection) is a reference model for data communication consisting of seven layers that define how network devices interconnect and communicate.
31) Why are cables shielded and twisted‑pair? Shielding and twisting prevent crosstalk—electromagnetic interference that can affect data transmitted over the cable.
32) What are the advantages of address sharing? Using address translation instead of routing provides inherent security because external hosts see only the public IP of the NAT device, not internal private addresses.
33) What is a MAC address? MAC (Media Access Control) uniquely identifies a device on a network; it is also called a physical or Ethernet address and consists of six bytes.
34) Which TCP/IP layers correspond to the OSI application layer? The TCP/IP application layer maps to three OSI layers: Session, Presentation, and Application.
35) How do you identify the class of a given IP address? Examine the first octet: if it starts with 0, it is Class A; with 10, Class B; with 110, Class C.
36) What is the primary purpose of OSPF? OSPF (Open Shortest Path First) is a link‑state routing protocol that determines the best path for data exchange using routing tables.
37) What is a firewall? A firewall protects an internal network from external attacks such as hackers and viruses, and can block external users from accessing a private network.
38) Describe star topology. Star topology consists of a central hub connected to each node, making it simple to set up and maintain.
39) What is a gateway? A gateway provides connectivity between two or more network segments, typically running gateway software that translates protocols to enable communication.
40) What are the disadvantages of star topology? If the central hub or switch fails, the entire network becomes unavailable.
41) What is SLIP? SLIP (Serial Line Internet Protocol) is an older protocol developed for early UNIX systems to provide remote access.
42) Give examples of private network addresses. 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16 are common private address ranges.
43) What is tracert? Tracert is a Windows utility that traces the route data takes from a router to a target network, showing the number of hops.
44) What is the role of a network administrator? A network administrator installs, configures, and maintains/troubleshoots the network.
45) Describe a drawback of peer‑to‑peer networks. When a workstation shares resources, its performance can degrade.
46) What is a hybrid network? A hybrid network combines client‑server and peer‑to‑peer architectures.
47) What is DHCP? DHCP (Dynamic Host Configuration Protocol) automatically assigns IP addresses to devices on a network.
48) What is the main function of ARP? ARP (Address Resolution Protocol) maps a known IP address to a MAC‑layer address.
49) What is TCP/IP? TCP/IP (Transmission Control Protocol/Internet Protocol) is a suite of protocols designed for data exchange across heterogeneous computer networks.
50) How do you manage a network using a router? Routers have consoles for configuring settings such as security and data logging, allowing you to assign access restrictions, schedule Internet usage, or block specific sites.
51) Which protocol can be used to transfer files between UNIX and Windows servers? FTP (File Transfer Protocol) is platform‑independent and can be used for such file transfers.
52) What is the purpose of a default gateway? A default gateway provides a method for a local network to connect to external networks, typically using the external router’s address.
53) What makes a good password? A strong password combines letters, numbers, and mixed case, avoiding easily guessed information such as dates or names.
54) What is the correct termination resistance for UTP cable? The normal termination resistance for unshielded twisted‑pair cable is 100 Ω.
55) What is netstat? Netstat is a command‑line utility that provides useful information about current TCP/IP connections.
56) How many network IDs are available in a Class C network? A Class C network has 21 bits for network IDs, allowing 2,097,152 possible networks, each with up to 254 hosts.
57) What happens when a cable exceeds its specified length? Signal loss occurs, affecting data transmission and reception.
58) What common software issues can cause network defects? Issues include client‑server problems, application conflicts, configuration errors, protocol mismatches, security problems, and user policy issues.
59) What is ICMP? ICMP (Internet Control Message Protocol) provides messaging and communication within the TCP/IP stack and handles error messages for tools like ping.
60) What is Ping? Ping is a utility that checks connectivity between network devices using an IP address or device name.
61) What is P2P? Peer‑to‑peer networks consist of independent workstations that communicate directly without a central server.
62) What is DNS? DNS (Domain Name System) resolves hostnames to TCP/IP addresses.
63) What are the advantages of fiber over other media? Fiber is less susceptible to electrical interference, supports higher bandwidth, and experiences minimal signal degradation over long distances.
64) What is the difference between hubs and switches? Hubs act as multi‑port repeaters and become inefficient as more devices connect, whereas switches provide better performance by managing traffic on each port.
65) Which network protocols does Windows RRAS support? RRAS supports NetBEUI, TCP/IP, and IPX.
66) What are the maximum networks and hosts for Class A, B, and C networks? Class A: 126 networks, 16,777,214 hosts; Class B: 16,384 networks, 65,534 hosts; Class C: 2,097,152 networks, 254 hosts.
67) What is the standard color order for a straight‑through cable? Orange/white, orange, green/white, blue, blue/white, green, brown/white, brown.
68) Which protocols reside below the TCP/IP application layer? FTP, TFTP, Telnet, and SMTP are application‑layer protocols.
69) Can two computers share files without a hub or router? Yes, by using a crossover cable that swaps transmit and receive pins.
70) What is ipconfig? ipconfig is a utility that displays a computer’s IP configuration, including its physical (MAC) address.
71) What is the difference between straight‑through and crossover cables? Straight‑through cables connect computers to switches, hubs, or routers; crossover cables connect similar devices directly, such as PC‑to‑PC.
72) What is client/server? In a client/server network, one or more computers act as servers providing centralized resources (e.g., printers, files) while clients are workstations that access those resources.
73) Describe a network. A network is the interconnection of computers and peripheral devices for data communication, using wired cables or wireless links.
74) Does moving a NIC card transfer its MAC address? Yes, because the MAC address is hard‑wired to the NIC hardware, not the PC.
75) Explain cluster support. Cluster support allows a network operating system to connect multiple servers in a fault‑tolerant group, ensuring continuity if one server fails.
76) Where should antivirus be installed in a network with two servers and twenty workstations? Antivirus should be installed on all servers and workstations to protect against infections introduced via removable media.
77) Describe Ethernet. Ethernet is a widely used network technology developed in the early 1970s, based on IEEE standards, and commonly used in LANs.
78) What are the disadvantages of ring topology? A single workstation failure can bring down the entire network, and reconfiguring part of the network requires temporary shutdown of the whole network.
79) What is the difference between CSMA/CD and CSMA/CA? CSMA/CD (Collision Detection) retransmits frames after a collision; CSMA/CA (Collision Avoidance) broadcasts intent before transmitting to avoid collisions.
80) What is SMTP? SMTP (Simple Mail Transfer Protocol) handles internal mail and provides necessary mail delivery services on the TCP/IP stack.
81) What is multicast routing? Multicast routing sends messages to a selected group of users rather than broadcasting to all users on a subnet.
82) Why is encryption important on a network? Encryption converts information into unreadable code, which can only be decrypted with the correct key, ensuring that intercepted data remains unintelligible.
83) How are IP addresses formatted? IP addresses are displayed as four decimal numbers separated by periods (dot‑decimal notation), e.g., 192.168.101.2.
84) Explain the importance of authentication. Authentication verifies user credentials (usually a username and password) before granting network access, helping to block malicious intruders.
85) What does tunnel mode mean? Tunnel mode creates a virtual tunnel using IPSec to protect all communications between two networks, without the communicating computers using IPSec themselves.
86) What technologies are involved in establishing a WAN link? Analog connections (regular telephone lines), digital connections (digital telephone lines), and switched connections (multiple links between sender and receiver).
87) What is an advantage of mesh topology? Mesh topology provides redundancy; if one link fails, another is available, making it highly fault‑tolerant.
88) What common hardware issues can arise when troubleshooting a network? Problems may include hard‑drive failures, damaged NICs, hardware startup issues, or incorrect hardware configuration.
89) How can signal attenuation be fixed? Use repeaters or hubs to regenerate the signal and ensure cables are properly terminated.
90) How does DHCP assist network management? DHCP allows administrators to assign IP addresses dynamically from a pool, eliminating the need to configure static IPs on each client.
91) Explain the concept of network profiles. Network profiles are configuration settings assigned to each user, such as grouping users into specific profiles.
92) What is Sneakernet? Sneakernet is an early form of networking that physically transports data using removable media like disks or tapes.
93) What is IEEE’s role in computer networking? IEEE (Institute of Electrical and Electronics Engineers) develops and manages standards for network equipment, interfaces, cabling, and connectors.
94) Which protocols operate under the TCP/IP Internet layer? The Internet layer manages ICMP, IGMP, IP, and ARP.
95) What does permission mean in a network? Permission is an authorized right for a user to perform specific actions on the network.
96) What is a basic requirement for creating a VLAN? A VLAN is needed to create separate broadcast domains at the switch level, improving security and traffic management.
97) What is IPv6? IPv6 (Internet Protocol version 6) was developed to replace IPv4, which is exhausted, and provides a vastly larger address space.
98) What is the RSA algorithm? RSA (Rivest‑Shamir‑Adleman) is the most widely used public‑key encryption algorithm.
99) What is mesh topology? Mesh topology connects each device directly to every other device, requiring at least two network connections per device.
100) What is the maximum segment length for a 100Base‑FX network? The maximum allowed length for a 100Base‑FX segment is 412 meters; the overall network can reach up to 5 kilometers.
Signed-in readers can open the original source through BestHub's protected redirect.
This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactand we will review it promptly.
Open Source Linux
Focused on sharing Linux/Unix content, covering fundamentals, system development, network programming, automation/operations, cloud computing, and related professional knowledge.
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.
