Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

What happens when you enter google.com in the web browser?

Answer»

Below are the steps that are being followed:

  • Check the browser cache first if the content is fresh and present in cache display the same.
  • If not, the browser checks if the IP of the URL is present in the cache (browser and OS) if not then request the OS to do a DNS LOOKUP using UDP to get the corresponding IP address of the URL from the DNS server to establish a new TCP connection.
  • A new TCP connection is set between the browser and the server using three-way handshaking.
  • An HTTP request is sent to the server using the TCP connection.
  • The web servers running on the Servers handle the INCOMING HTTP request and send the HTTP response.
  • The browser process the HTTP response sent by the server and may close the TCP connection or reuse the same for future requests.
  • If the response data is cacheable then BROWSERS cache the same.
  • Browser decodes the response and renders the content.
Conclusion

In today’s world, it is very hard to stay away from the Internet and that is what makes networking one of the most important interview topics. As of 2021 if we check the facts, there is a total of 1.3 million kilometers of submarine optical fiber cables set globally to connect the world to the Internet. These cables are more than ENOUGH to revolve around the earth more than 100 times.

Resources

Learn Coding

How To Become Network Engineer

Network Engineer Salary

2.

What are Unicasting, Anycasting, Multicasting and Broadcasting?

Answer»
  • UNICASTING: If the message is SENT to a single node from the source then it is known as unicasting. This is commonly used in networks to establish a new connection.
  • Anycasting: If the message is sent to any of the nodes from the source then it is known as anycasting. It is mainly used to get the content from any of the servers in the Content Delivery System.
  • Multicasting: If the message is sent to a subset of nodes from the source then it is known as multicasting. Used to SEND the same data to multiple RECEIVERS
  • BROADCASTING: If the message is sent to all the nodes in a network from a source then it is known as broadcasting. DHCP and ARP in the local network use broadcasting.
3.

What is the firewall?

Answer»

The firewall is a network security system that is used to monitor the incoming and OUTGOING traffic and blocks the same based on the firewall security POLICIES. It acts as a wall between the internet (public network) and the networking devices (a private network). It is either a hardware device, software program, or a combination of both. It adds a layer of security to the network.

Firewall
4.

What is the difference between the ipconfig and the ifconfig?

Answer»
ipconfigifconfig
Internet Protocol ConfigurationInterface Configuration
Command used in MICROSOFT OPERATING systems to VIEW and configure network interfacesCommand used in MAC, Linux, UNIX operating systems to view and configure network interfaces

Used to GET the TCP/IP summary and allows to changes the DHCP and DNS settings

5.

Compare the hub vs switch

Answer»
HubSwitch
Operates at Physical LayerOperates at DATA Link Layer
Half-Duplex transmission modeFull-Duplex transmission mode
Ethernet devices can be connectedsendLAN devices can be connected
Less COMPLEX, less intelligent, and cheaperIntelligent and effective
No software support for the administrationAdministration software support is present
Less speed up to 100 MBPSSupports high speed in GBPS
Less efficient as there is no WAY to avoid collisions when more than one nodes SENDS the PACKETS at the same timeMore efficient as the collisions can be avoided or reduced as compared to Hub
6.

What is a subnet?

Answer»

A subnet is a network inside a network achieved by the process called subnetting which HELPS divide a network into subnets. It is used for getting a higher ROUTING efficiency and enhances the SECURITY of the network. It reduces the time to EXTRACT the host address from the routing table.

Subnet
7.

Differentiate the MAC address with the IP address

Answer»

The difference between MAC address and IP address are as follows:

MAC AddressIP Address
Media Access Control AddressInternet Protocol Address
6 or 8-byte HEXADECIMAL number4 (IPv4) or 16 (IPv6) Byte address
It is embedded with NICIt is OBTAINED from the NETWORK
Physical AddressLogical Address
Operates at Data LINK LayerOperates at Network Layer.
Helps to identify the deviceHelps to identify the device connectivity on the network.
8.

What is the MAC address and how is it related to NIC?

Answer»

MAC address is the Media Access Control address. It is a 48-bit or 64-bit UNIQUE identifier of devices in the network. It is also called the physical address embedded with Network Interface Card (NIC) used at the Data Link LAYER. NIC is a hardware component in the networking device using which a device can CONNECT to the network.

9.

What is the FTP protocol?

Answer»

FTP is a File TRANSFER Protocol. It is an APPLICATION layer protocol used to transfer files and data reliably and efficiently between hosts. It can also be used to download files from REMOTE servers to your COMPUTER. It uses port 27 by default.

10.

What is the ARP protocol?

Answer»

ARP is ADDRESS Resolution Protocol. It is a network-level protocol used to convert the logical address i.e. IP address to the device's PHYSICAL address i.e. MAC address. It can also be used to GET the MAC address of devices when they are trying to communicate over the local network.

ARP Protocol
11.

What do you mean by the DHCP Protocol?

Answer»

DHCP is the Dynamic Host Configuration Protocol.

It is an application layer protocol used to auto-configure devices on IP networks enabling them to use the TCP and UDP-based protocols. The DHCP servers auto-assign the IPs and other NETWORK configurations to the devices individually which enables them to COMMUNICATE over the IP network. It helps to get the SUBNET MASK, IP address and helps to RESOLVE the DNS. It uses port 67 by default.

12.

What is the ICMP protocol?

Answer»

ICMP is the Internet Control Message Protocol. It is a network layer protocol used for error handling. It is mainly used by network devices like routers for DIAGNOSING the network connection issues and crucial for error reporting and TESTING if the data is REACHING the preferred DESTINATION in time. It uses port 7 by default.

13.

Compare between TCP and UDP

Answer»
TCP/IPUDP
Connection-Oriented ProtocolConnectionless Protocol
More ReliableLess Reliable
Slower TransmissionFaster Transmission
Packets order can be PRESERVED or can be rearrangedPackets order is not fixed and packets are independent of each other
Uses THREE ways HANDSHAKE model for connectionNo handshake for establishing the connection
TCP packets are heavy-weightUDP packets are light-weight
Offers error checking mechanismNo error checking mechanism
Protocols like HTTP, FTP, Telnet, SMTP, HTTPS, etc use TCP at the transport layerProtocols like DNS, RIP, SNMP, RTP, BOOTP, TFTP, NIP, etc use UDP at the transport layer
TCP VS UDP
14.

What is the UDP protocol?

Answer»

UDP is the USER Datagram Protocol and is based on Datagrams. Mainly, it is used for multicasting and BROADCASTING. Its functionality is ALMOST the same as TCP/IP Protocol EXCEPT for the three ways of handshaking and error checking. It uses a simple TRANSMISSION without any hand-shaking which makes it less reliable.

15.

What is the TCP protocol?

Answer»

TCP or TCP/IP is the Transmission Control PROTOCOL/INTERNET Protocol. It is a set of rules that decides how a computer connects to the Internet and how to transmit the data over the NETWORK. It creates a VIRTUAL network when more than one computer is connected to the network and uses the three ways handshake model to establish the CONNECTION which makes it more reliable.