Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

What is the use of a router and how is it different from a gateway?

Answer»

The router is a networking device used for connecting two or more network segments. It DIRECTS the traffic in the network. It TRANSFERS INFORMATION and data like web pages, EMAILS, images, videos, etc. from source to destination in the form of packets. It operates at the network layer. The gateways are also used to route and regulate the network traffic but, they can also send data between two dissimilar networks while a router can only send data to similar networks.

2.

What is the DNS?

Answer»

DNS is the Domain Name System. It is considered as the devices/services directory of the INTERNET. It is a decentralized and hierarchical naming system for devices/services connected to the Internet. It translates the domain names to their corresponding IPs. For e.g. interviewbit.com to 172.217.166.36. It uses port 53 by DEFAULT.

3.

What is the SMTP protocol?

Answer»

SMTP is the Simple Mail TRANSFER Protocol. SMTP sets the RULE for communication between SERVERS. This set of rules helps the SOFTWARE to transmit emails over the internet. It supports both End-to-End and Store-and-Forward methods. It is in always-listening mode on port 25.

SMTP Protocol
4.

What are the HTTP and the HTTPS protocol?

Answer»

HTTP is the HyperText Transfer Protocol which defines the set of rules and standards on how the information can be transmitted on the World WIDE Web (WWW).  It helps the web browsers and web SERVERS for communication. It is a ‘stateless protocol’ where each command is INDEPENDENT with respect to the previous command. HTTP is an application layer protocol built upon the TCP. It USES port 80 by default.

HTTPS is the HyperText Transfer Protocol Secure or Secure HTTP. It is an advanced and secured version of HTTP. On top of HTTP, SSL/TLS protocol is used to provide security. It enables secure transactions by encrypting the communication and also helps identify network servers securely. It uses port 443 by default.

5.

Differentiate OSI Reference Model with TCP/IP Reference Model

Answer»

OSI Vs TCP/IP

OSI Reference ModelTCP/IP Reference Model
7 LAYERED architecture4 layered architecture
Fixed boundaries and FUNCTIONALITY for each LAYERFlexible architecture with no strict boundaries between layers
Low ReliabilityHigh Reliability
Vertical Layer ApproachHorizontal Layer Approach
6.

Define the 4 different layers of the TCP/IP Reference Model

Answer»

Layers of TCP/IP

LayerDescription
LinkDecides which links such as serial lines or classic Ethernet must be USED to meet the needs of the CONNECTIONLESS internet layer.
Internet
  • The internet layer is the most important layer which holds the whole ARCHITECTURE together.
  • It delivers the IP packets where they are SUPPOSED to be delivered.
TransportIts FUNCTIONALITY is almost the same as the OSI transport layer. It enables peer entities on the network to carry on a conversation.
ApplicationIt contains all the higher-level protocols.
7.

Describe the TCP/IP Reference Model

Answer»

It is a compressed version of the OSI model with only 4 layers. It was developed by the US Department of Defence (DOD) in the 1980s. The NAME of this model is based on 2 standard protocols used i.e. TCP (TRANSMISSION Control Protocol) and IP (Internet Protocol).

8.

Define the 7 different layers of the OSI Reference Model

Answer»

Here the 7 layers of the OSI reference MODEL:

Layers of OSI Model
LayerUnit ExchangedDescription
PhysicalBit
  • It is concerned with transmitting RAW bits over a communication channel.
  • Chooses which type of transmission mode is to be SELECTED for the transmission. The available transmission modes are Simplex, Half Duplex and Full Duplex.,
Data LinkFrame
  • The main task of this layer is to transform a raw transmission facility into a line that appears free of undetected transmission errors.
  • It also allows detecting damaged packets using the CRC (Cyclic Redundancy Check) error-detecting, code.
  • When more than ONE node is connected to a shared link, Data Link Layer protocols are required to determine which device has control over the link at a given time.
  • It is implemented by protocols like CSMA/CD, CSMA/CA, ALOHA, and Token Passing.
NetworkPacket
  • It controls the operation of the subnet.
  • The network layer takes care of feedback messaging through ICMP messages.
TransportTPDU - Transaction Protocol Data Unit
  • The basic functionality of this layer is to ACCEPT data from the above layers, split it up into smaller units if needed, pass these to the network layer, and ensure that all the pieces arrive correctly at the other end.
  • The Transport Layer takes care of Segmentation and Reassembly.
SessionSPDU - Session Protocol Data Unit
  • The session layer allows users on different machines to establish sessions between them.
  • Dialogue control is using the full-duplex link as half-duplex. It sends out dummy packets from the client to the server when the client is ideal.
PresentationPPDU - Presentation Protocol Data Unit
  • The presentation layer is concerned with the syntax and semantics of the information transmitted.
  • It translates a message from a common form to the encoded format which will be understood by the receiver.
ApplicationAPDU - Application Protocol Data Unit
  • It contains a variety of protocols that are commonly needed by users.
  • The application layer sends data of any size to the transport layer.
9.

Describe the OSI Reference Model

Answer»

Open System Interconnections (OSI) is a network architecture model based on the ISO standards. It is called the OSI model as it deals with connecting the SYSTEMS that are open for communication with other systems.

The OSI model has seven layers. The principles used to arrive at the seven layers can be SUMMARIZED  briefly as below:

  • Create a NEW layer if a DIFFERENT abstraction is needed.
  • Each layer should have a well-defined function.
  • The function of each layer is chosen based on internationally STANDARDIZED protocols.