Basic Networks

Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

‫بسم هللا الرحمن الرحيم‬

Q1. What is a network?

A network consists of two or more separate devices linked together such that they can communicate.
Networks can be classified according to different criteria such as scope, type of connection, functional
relationship, topology, or function, among others.

Q2. What are the different types of networks?

Considering the size or span of a network, we can classify them as follows:

• PAN (Personal Area Network) – PAN is made up of devices used by a single person. It has a
range of a few meters.

• WPAN (Wireless Personal Area Network) – It is a PAN network that uses wireless technologies
as a medium.

• LAN (Local Area Network) – LAN is a network whose range is limited to a relatively small area,
such as a room, a building, an aeroplane, etc.

• WLAN (Wireless Local Area Network) – WLAN is a LAN network that uses wireless means of
communication. It is a widely used configuration due to its scalability and because it does not
require the installation of cables.

• CAN (Campus Area Network) – A network of high-speed devices that connects LANs in a limited
geographical area, such as a university campus, a military base, etc.

• MAN (Metropolitan Area Network) – MAN is a high-speed (broadband) network providing


coverage in a larger geographic area than a campus, but still limited.

• WAN (Wide Area Network) – WAN extends over a large geographical area using unusual means
of communication, such as satellites, interoceanic cables, fibre optics, etc. Use public media.

• VLAN – It is a type of logical or virtual LAN, mounted on a physical network, in order to increase
security and performance. In special cases, thanks to the 802.11Q protocol (also called QinQ), it
is possible to mount virtual networks on WAN networks. It is important not to confuse this
implementation with VPN technology.

Q3. What is Network Topology?

Network topology is the physical or logical arrangement in which the devices or nodes of a network
(e.g. computers, printers, servers, hubs, switches, routers, etc.) are interconnected with each other
over a communication medium. It consists of two parts – the physical topology, which is the actual
arrangement of the cables (the media), and the logical topology, which defines how the hosts access
the media.

Types of network topologies

There are various types of network topology in a computer network, such as:
• Bus Topology

• Ring Topology

• Mesh Topology

• Tree Topology

• Star Topology

• Hybrid Topology

Let us now go over these topologies one after the other:

Bus Topology

Bus topology employs a single cable (Bus) to connect all the nodes. The main cable serves as the
network’s spine. All nodes in a Bus Topology are linked to the Taps and Drop Lines via the bus. Drop
Lines are the connections between the central wire or bus and the nodes in this case. The Taps are the
three-way connector that aids in connecting the drop line to the main central cable.

The data travels only in one direction, and when it reaches the far end of the line, the terminator
removes it from the line. In a bus topology, one computer acts as a server, and the other computers act
as clients. A bus topology example is connecting two floors with a single line.

Advantages of Bus Topology

• Less cabling: A common wire connects all nodes in a bus topology.

• Less Expensive: Bus topology is less expensive because it uses a common wire.

• Small network: This is best suited for situations where only a few computers are required for
connection establishment.

• Upgradeable: A new node can be added or removed in this topology without affecting the
other nodes.

Disadvantages of Bus Topology


• Reduced signal strength: To connect a more significant number of nodes, we must increase the
number of Taps, Drop Lines, and the central cable. And increasing these things will weaken the
signal.

• Core failure: If the main central cable becomes damaged or faulty, the entire network will fail.

• Low security: This is a significant security issue because all nodes in the network can hear what
data is transmitted to other nodes in the network.

Ring Topology

Ring Topology is a topology in which each computer is linked to another on both sides. The last
computer is linked to the first, forming a ring. This topology enables each computer to have exactly two
neighbors.

For example, if Node A wishes to send data to Node D, Node A has two options for doing so. That is to
say –

• Node A > Node F > Node E > Node D

• Node A > Node B > Node C > Node D

The central computer in this topology is the monitor station, which is in charge of all operations. Devices
use tokens for data transmission between them. The computer station must have the token to transmit
data. The token is released when the transmission ends, and other computer stations can use it to send
data.

Advantages of Ring Topology

• Token system: Only nodes that have tokens can transfer data.

• Less Cabling: As every node manages the cable to its closest neighbor, it requires less cabling.

• Easier troubleshooting: It is less challenging to manage and install because the nodes or cable
flaws are easily discernible.

Disadvantages of Ring Topology


• Difficult to upgrade: Adding or removing nodes is problematic because it disrupts network
activity.

• Failure of a network: When one system crashes, it disturbs the overall network activity.

Mesh Topology

Mesh technology is a network configuration in which you link the computers via various redundant
connections. There are numerous routes from one computer to another. It lacks the switch, hub, or any
central computer that serves as a point of communication.

The Internet is a mesh topology example. Mesh topology is only suitable for wireless networks, and can
you can create it using the formula:

(n*(n-1))/2, where n denotes the number of network nodes.

There are two types of Mesh topology: fully connected mesh topology and partially connected mesh
topology. Each computer in a full mesh topology is linked to all other computers in the network. In
contrast, in a partial mesh topology, only specific computers are connected to those with whom they
frequently communicate.

Advantages of Mesh Topology

• Consistent: Mesh topology networks are reliable because any link failure does not disrupt
interaction among connected computers.

• High-speed information exchange: Communication between nodes is extremely fast.

• Easier reconfiguration: Adding new devices would not interfere with the communication of
existing devices.

Disadvantages of Ring Topology


• Cost: A mesh topology has more connected devices, such as a router, and uses more
transmission media than other topologies.

• High-maintenance: Mesh topology networks are extensive and challenging to maintain and
manage.

• Efficiency: The number of redundant connections in this topology is high, reducing network
efficiency.

Tree Topology

Tree topologies are also known as hierarchical topology, as the root node connects all other nodes to
form a hierarchy. This topology is known as a Star Bus topology because it combines several star
topologies into a single bus. Tree topology is a standard network topology similar to bus and star
topologies.

Data flows from top to bottom in this network topology, from the central hub to the secondary hub and
then to the devices, or from bottom to top, from the devices to the secondary hub, which then connects
to the central hub. It is a multi-point connection with a non-robust topology because the topology
crashes if the backbone fails.

Advantages of Tree Topology

• Structuring: It aids in structuring as the tree-like shape allows any node to hold its child. And this
can make it much easier to structure the entire network.

• Interconnection: All nodes can connect to the large and intermediate networks.

• Expansion of nodes: An increase of nodes is possible and easily achievable in this network
structure.

Disadvantages of Tree Topology

• Expensive: Managing each node in its child may be inefficient. Cabling costs will rise as well.
• Network failure: If the primary central node or another wire fails, all other nodes may become
disconnected.

Star Topology

A hub connects all computers in this type of network topology. A central node connects all other nodes.
You can use this type of network topology on LAN networks due to its low cost and ease of setup.

Advantages of Star Topology

• Network failure prevention: Only the affected nodes will fail, while the remaining nodes will
continue to function.

• Performance: High performance with a small number of nodes and very little network traffic.

• Upgradation: This topology makes adding, deleting, and moving devices simple.

Disadvantages of Star Topology

• Expensive: The cost of installing star topology is high.

• Slow connection: Heavy network traffic can sometimes significantly slow the bus.

Hybrid Topology

This topology technology combines all of the topologies we’ve discussed so far. The topology can take
any shape that you want. It means it can be a single topology like Ring or Star, or it can be a combination
of the various types of topologies shown below.
Advantages of Hybrid Topology

• Multiple advantages: These types of network topology combine the advantages of various
topologies into a single topology.

• Scalable: Hybrid networks are easily scalable as you can easily integrate the new hardware
components.

• Traffic: These types of network topology can handle a high traffic volume while remaining
extremely flexible and dependable.

Disadvantages of Hybrid Topology

• Expensive: Because it combines the benefits of multiple topologies into a single topology, this
type of topology is quite expensive.

• Complex design: Creating a hybrid topology is a difficult task.

Q4. What are the advantages of PAN?

Ans. PAN has a number of advantages including:


1. PAN does not require any extra space as it does not need any cables and wires.
2. It is used in TV and AC rooms, offices, conferences and meetings.
3. It provides multiple device connectivity at the same time.
4. It has an affordable cost.

Q5. What are the disadvantages of PAN?

Ans. PAN has the following disadvantages:


1. It can only be operated in lesser range areas.
2. It is used for personal areas.
3. It has a slow rate of transfer.
4. It also causes interference with radio signals.
Q6. Which are the examples of WPAN?

Ans. Wireless keyboards, smartphones, TV remotes, wireless printers, BlueTooth, firewire, ZigBee,
Wireless USB, Wibree are some of the examples of WPAN.

Q7. What is Network Cabling?

Network cables can connect two computers or computer systems directly. A cable is a cord that is made
up of different conductors, which are insulated from each other. This cord is usually protected by a wrap
for better strength and flexibility.

To choose a network cable, several aspects must be taken into account such as –

• The distance that must be covered with that cable

• The maximum data transmission speed

• The coating of the cable

• The type of network to be created

• The type of braiding, shielding, and/or sheath

Q8. What are the different types of network cables used in networking?

The different types of cables used in networks are –

• Unshielded Twisted Pair (UTP) Cable

• Shielded Twisted Pair (STP) Cable

• Cable Installation Guides

• Coaxial Cable

• Fibre Optic Cable

• Wireless LANs

Q9. Mention the maximum length of the Thinnet cable?

Ans. The maximum length of the Thinnet cable is 185 meters.

Q10. Name the cable which uses the RJ11 connector?

Ans. Telephone cables use the RJ11 connector.

Q11. Explain 10Base-T.

Ans. 10Base-T specifies data transfer rate, i.e., 10Mbps. Here the usage of the term ‘Base’ defines
‘Baseband’ and not ‘Broadband’. T denotes the type of cable, which is a twisted pair.
Q12. Mention the types of wires used for data transmission in UTP cable.

Ans. There are four types of wires used for data transmission in UTP cable, which is wire 1, 2, 3, and 6.
Where wires 1 and 2 are used to transmit the data while wires 3 and 6 are used to receive the data.

Q13. Can we use RG59 and RG6 cables in a computer network?

Ans. RG59 and RG6 cables are not used in the computer network. These cables are made for the cable
TV network.

Q14. What is 10Base2?

Ans. 10Base2 is defined as part of the IEEE 802.3a standard, specifies data transmission speeds of
10Mbps and a total segment length of 185 meters using RG-58 coaxial cable. The 10Base2 standard
specifies a physical bus topology and uses BNC connectors with 50-ohm terminators at each end of
the cable. One of the physical ends of each segment must be grounded.

Q15. Name the cable used in the 10BaseFL network.

Ans. Fibre optical cable is the cable used in the 10BaseFL network.

Q16. How many network segments can be populated in 10Base2?

Ans. 10Base2 networks allow a maximum of five segments with only three of those segments
populated. Each of the three populated segments can have a maximum of 30 nodes attached.

Q17. What is the 5-4-3 rule? In which architectures do we use the 5-4-3 rule?

Ans. In the 5-4-3 rule, there is a maximum of five segments in a network that are connected with four
repeaters. It is used in 10Base2 and 10Base5 Ethernet architectures. In this rule, only three segments
can be populated with nodes.

Q18. What standard color sequences are used for a straight-through cable?

Ans. Standard color sequences used for a straight-through cable are Orange/white, orange,
green/white, green, blue/white, blue, brown/white, brown.

Q19. What is MAU?

Ans. Multistation Access Unit(MAU) is a device used to connect multiple network stations in star
topology in the form of a ring which is also known as a token ring network.

Q20. What is a Network Interface Card?

Ans. Network Interface Card is a connecting device used to interlink computers with the network.
These cards are of two types: Internal network cards and External network cards.

Q21. Differentiate between ‘attenuation’, ‘distortion’, and ‘noise’.

Ans. When a signal travels through a medium, it loses some of its energy due to the resistance of the
medium. This loss of energy is called attenuation.
When a signal travels through a medium from one point to another, it may change the form or shape
of the signal. This is known as distortion.

Noise is unwanted electrical or electromagnetic energy that degrades the quality of signals and data.

Q22. What are the major types of networks?

Ans. There are two major type of networks: Server-based network and Peer-to-peer network.

Q23. What are the important topologies for networks?

Ans. There are three essential topologies: Star, Bus, and Ring.

Q24. How can you secure a computer network?

Ans. You can achieve a secure computer network in the following ways:

• Install a reliable and updated antivirus program across the network

• Ensure firewalls are setup and configured properly

• Monitor firewall performance

• Ensure User authentication

• Update passwords regularly, every quarter

• Create a virtual private network (VPN)

Q25. How would you differentiate between Firewall and Antivirus?

Ans. Both are security applications used in networking.

A firewall prevents unauthorized access in private networks as intranets. However, it does not protect
against viruses, spyware, or adware.

An antivirus is a software that protects a computer from any malicious software, virus, spyware, or
adware.

You may consider such networking interview questions to be basic, but such questions are the
favourite of interviewers as interviewees often leave behind such networking interview questions
while preparing.

Q26. How will you recover data from a Virus-infected system?

Ans. We will install an OS and updated antivirus in a system that is free of any viruses, and then
connect the hard drive of the infected system as a secondary drive. The hard drive will then be
scanned and cleaned. Data can now be copied into the system.

Q27. What is the difference between a Domain and a Workgroup?


Ans. This is one of the important networking interview questions that you must prepare for your
interview. The main difference between a Domain and a Workgroup is where do the computer
networks belong to. If it is a home network, then computers will be a part of a workgroup, and if it’s a
workplace network, then the computers will be a part of a domain.

Below are some of the major differences between a Domain and a Workgroup:

Domain Workgroup

The computers in a domain have a The computers in the workgroup have their
centralized database. own local database.

Computers can be on a different local All computers must be on the same local area
network. network.

One or more computers are servers for


All computers are peers and no computer has
providing access, security permission to
control over another computer.
all other computers in a network.

A domain is used for transferring and


It is used for sharing less secure data.
sharing sensitive and important data.

Domain has centralized authentication


Each computer has its own authentication
servers which set the rule of
rule for every user account.
authentication.

Each computer has a set of user accounts. If


If a user has an account in a domain
the user has an account on that computer
then the user can log in to any
then only the user will be able to access the
computer in a domain.
computer.

Changes made in one computer are


Computer settings need to change manually
automatically made to all other
for each computer.
computers in a network.
It is used by large public and business A workgroup is better suited for fewer
networks. computers.

Thousands of computers can be


Only 20 computer
connected.

Q28. What is a Virtual Private Network (VPN)? What are the advantages of using a VPN Connection?

Ans. A VPN or Virtual Private Network is an encrypted connection (secure tunnel) built on the internet
from a device to a network. It helps in the creation of a protected network between different
networks using the internet (public network), ensuring that sensitive data is safely transmitted. This
makes it difficult for third parties to gain unauthorized access, track your activities online, or steal
data. By using the VPN, a client can connect to the organization’s network remotely.

Some of the advantages of using VPN Connection are:

• Remote Access

• Protected File Sharing

• Anonymity

• Enhanced Security

• Improved Performance

• Anonymity

• Network Scalability

• Prevents Data Throttling

Q29. Explain the different types of VPN.

Ans. There are two types of VPNs:

• Remote Access Virtual Private Network:

A Remote Access VPN securely connects a device (endpoints like laptops, tablets, or smartphones)
outside the corporate office. It allows a client to associate with a private network and access every
one of its resources and services remotely. The connection between the private network and the user
happens securely through the Internet. It is a low-cost solution and is helpful for both business and
home users.

• Site-to-Site or Router-to-Router Virtual Private Network:


This VPN is mostly used in large organizations with branches in different locations to connect the
network of one office to another in different locations. It has two sub-categories:

• Intranet VPN: Intranet VPN allows several offices of the same company to connect using the
Site-to-Site VPN type. It is commonly used for connecting remote offices in different
geographical locations using shared infrastructure (internet connectivity and servers) with the
same accessibility policies as a private WAN (wide area network).

• Extranet VPN: Extranet VPN allows companies to use Site-to-site VPN type to connect to the
office of another company. It uses shared infrastructure over an intranet, suppliers,
customers, partners, etc., and connects them using dedicated connections.

Q30. What are ‘firewalls’?

Ans. A firewall is a network security system, responsible to manage network traffic. It uses a set of
security rules to prevent remote access and content filtering. Firewalls are used to protect the systems
or networks from viruses, worms, malware, etc. Firewalls are usually of two types –

Physical – A physical firewall or hardware firewall is a physical device, sits between the external
network and the server. They analyze incoming traffic and filter out any threats to the device. Widely
used in institutions and large companies.

Logical – A logical or software firewall can exist anywhere on the subnet and protects hosts anywhere
on the subnet without rewiring. They only protect the computer on which they are installed, and in
many cases, they are integrated into the operating system itself.

Q31. How does a firewall work?

Ans. This is among the popularly asked networking interview questions. The firewall ‘listens’ for what
information packets are trying to leave or enter the computer system. Blocking can be done based on
various criteria, such as the IP to which they are destined, the type of port used to send them, or the
application of origin.

One of the most complex aspects of using firewalls lies in their configuration, in deciding what types
of connections are blocked and which ones are not.

You might also like