Computer Network viva Questions
1. What is a computer network?
A computer network is a group of computers and devices that are connected together to share resources such as data, printers, and internet access.
2. What are the different types of computer networks?
There are several types of computer networks, including:
- Local Area Network (LAN): A LAN is a network that is limited to a small geographical area, such as a single building or campus.
- Wide Area Network (WAN): A WAN is a network that spans a large geographical area, such as a city or country.
- Metropolitan Area Network (MAN): A MAN is a network that spans a large metropolitan area, such as a city.
- Personal Area Network (PAN): A PAN is a network that is used to connect devices in close proximity, such as a computer and a printer.
3. What is a network topology?
A network topology is the arrangement of the various components (links, nodes, etc.) of a computer network. Various types of network topologies exist, including:
- Bus topology: All devices in a bus topology are linked to one central cable, or backbone.
- Star topology: The hub or switch in the middle of a star topology serves as the connection point for all devices.
- Ring topology: Each device among a ring topology is connected to two more devices in a circular pattern.
4. Describe a protocol.
A network's communication between devices is governed by a set of rules and standards called a protocol. There are various kinds of protocols, such as:
- A network's components can communicate reliably thanks to the Transmission Control Protocol (TCP).
- A network's devices are identified and data is routed between them using the Internet Protocol (IP), which is a protocol.
- FTP, or File Send Protocol, is a protocol often used to transfer files between computers on a network.
5. Describe a router.
A router is a piece of hardware that connects multiple networks and routes data between them. Routers consult routing tables and protocols to decide which network to send data to.
6. What is a switch?
A switch is a piece of hardware that connects networked devices and allows data to be sent between them. Data packets are forwarded by switches in accordance with the destination, which is determined by their MAC addresses.
7. What is a hub?
A hub is a device that is used to connect devices on a network and forward data packets to all connected devices. Hubs do not have the ability to route data based on destination, unlike switches.
8. What is a LAN?
A local area network is a type of network that is restricted to a limited geographic region, often known as a campus or one building. Pcs, printer, and other devices are frequently connected using LANs to share resources inside a single space.
9. What is a WAN?
A WAN (Wide Area Network) is a network that spans a large geographical area, such as a city or country. WANs are often used to connect devices across multiple locations, such as branches of a company or schools in a district.
10. How do VPNs work?
A network called a Virtual Private Network is used to safely connect devices to the internet. VPNs create a secure, encrypted connection between devices, allowing them to communicate as if they were on a private network. VPNs are often used to allow remote workers to access company resources or to protect sensitive data when using public Wi-Fi networks.
11. Describe a firewall.
An effective security tool for shielding a network from intrusions and illegal access is a firewall. Firewalls can be hardware or software-based and are used to block or allow traffic based on predetermined rules.
12. What is a peer-to-peer architecture?
A peer-to-peer architecture is a type of network architecture in which each device on the network has the ability to communicate and share resources directly with other devices on the network, without the need for a central server or authority. Each device functions as both a client and a server in a peer-to-peer network, enabling more decentralized and dispersed communication and resource sharing. Peer-to-peer networks are often used in situations where the cost or complexity of a traditional client-server network is not practical, such as in home networks or small businesses.
13. What does MAC stand for?
Each device on a network is given a specific identity known as a MAC (Media Access Control) address. Devices are identified and data is routed between them using MAC addresses.
14. What is a packet?
Data that is sent via a network is transmitted in packets. In addition to the data itself, packets also include information about the data's source and destination.
15. What is a domain name?
An online resource on the internet is identified by its domain name, which is a distinctive name. Domain names are made up of a series of letters and numbers and are used to identify the IP address of a website or server.
16. Describe the DNS.
Domain names are converted into IP addresses using a DNS (Domain Name System). When you enter a domain name onto your computer, the DNS glances up the accompanying IP address and routes the request to the appropriate website.
17. Describe a server.
A computer or other device that hosts services or resources that can be accessible across a network is called a server. Websites, files, and other sorts of data that are accessible by network clients can be stored on servers.
18. What does IP stand for?
Each device on a network is given a specific identity called an IP (Internet Protocol) address. Devices are identified and data is routed between them using IP addresses.
19. Describe a subnet.
A subnet is just a smaller network that's also established within a bigger network. A huge network is frequently divided into more manageable, more compact pieces using subnets.
20. Network interface card (NIC): What is it?
A hardware element used to join a device to a network is called a network interface card (NIC). In order to be recognized on a network, NICs are often placed in devices such as computers. Each NIC has a specific MAC address.
21. What exactly is a wireless access point (WAP)?
A device used to establish a wireless network is known as a wireless access point (WAP). WAPs enable wireless network connections by using radio frequencies to broadcast and receive data.
22. What is a modem?
Using a modem, you can attach a desktop or other device to a landline or broadband connection. Data sent via the internet or even other networks is transmitted and received using modems.
23. What is a port?
On a computer or other device, a port is a logical point of connection used for sending and receiving data via a network. Ports are used to distinguish between various types of information or services and are given a number to identify them.
24. What is a network security key?
A network security key is a password or passphrase that is used to secure a wireless network. Network security keys are used to protect the network from unauthorized access and protect the data transmitted over the network.
25. What exactly is a network bridge?
A device that joins a number of networks together is known as a network bridge. Networking bridges use routing and protocols to decide which network to send data to.
26. What exactly is a network gateway?
A network gateway is a tool that connects two or more networks and functions as a tube for data transfer between them. Router tables and protocols are used by network gateways, which can be hardware- or software-based, to select the optimal route for data to take.
27. An explanation of network security protocols
A set of guidelines and requirements known as a network security protocol is used to safeguard networks and the data that is sent across them. Network security protocols may also use access control, authentication, and encryption procedures to guard against unapproved access and assaults.
28. What does a network firewall do?
A network firewall is a security tool used to guard against intrusions or other unauthorized activity. Network firewalls are used to restrict or permit traffic depending on predefined criteria. They can be hardware or software-based.
29. An explanation of network sniffers.
A tool called a network sniffer is used to keep an eye on network activity and grab data packets for examination. Network sniffers are frequently employed for security-related tasks to monitor data transported over a network or to identify and fix network problems.
30. What exactly is a network analyzer?
A network analyzer is a system that measures, examine, and debug network traffic. A network's problems, such as sluggish performance or security holes, can be found and diagnosed with network analyzers.
31. What does a load balancer on a network do?
A device called a network load balancer is used to split up network traffic among various servers or gadgets. With the help of network load balancers, a network's performance and availability can be increased by evenly dispersing the workload among several devices.
32. What is a network traffic monitor?
A network traffic monitor is a tool that is used to monitor and analyze network traffic in real-time. Network traffic monitors can be used to identify trends and patterns in network usage, as well as to troubleshoot and diagnose issues with a network.
33. What is a network performance monitor?
A tool used to track and gauge a network's performance is called a network performance monitor. Network performance concerns, such as sluggish response times or heavy traffic, can be found with network performance monitors, and the network can then be optimized for improved performance.
34. What is a network management system?
A network management system is a software or hardware tool that is used to monitor, manage, and maintain a network. Network management systems can be used to perform tasks such as inventory management, configuration management, and performance monitoring of network devices.
35. What is a network monitoring tool?
A network monitoring tool is a software or hardware device that is used to monitor the performance and availability of a network. Network monitoring tools can be used to identify issues with network performance, such as slow response times or high levels of traffic, and to troubleshoot and diagnose problems.
36. What is a network configuration tool?
A network configuration tool is a software or hardware device that is used to manage and configure the settings and parameters of a network. Network configuration tools can be used to perform tasks such as setting up network devices, configuring network security, and managing network traffic.
37. What is a network mapping tool?
A network mapping tool is a software or hardware device that is used to create a visual representation of a network. Network mapping tools can be used to create diagrams or maps of a network, including the devices and connections within it.
38. What is a network simulator?
In a controlled setting, a network simulator is a tool that is employed to imitate the behavior and functionality of a network. Before implementing network configurations, protocol, and security procedures in a real environment, network simulators are frequently used to test them.
39. What is a network analyzer tool?
A network analyzer tool is a software or hardware device that is used to monitor and analyze network traffic. Network analyzer tools can be used to identify trends and patterns in network usage, as well as to troubleshoot and diagnose issues with a network.
40. An explanation of network security services
A service or product that is intended to safeguard a network from security risks and weaknesses is known as a network security service. Network security services can include a variety of measures, such as firewalls, intrusion prevention systems, access control measures, and ongoing security assessments and evaluations. Network security services can be provided by external companies or organizations, or can be implemented in-house by the network owner or administrator.
Network security services can be used to protect networks of all sizes and types, including small business networks, enterprise networks, and public networks. They can be provided on a subscription or fee-based model, and can be customized to meet the specific needs and requirements of the network.