10. What is an IPv4 address? What are the different classes of IPv4?
An IP address is a 32-bit dynamic address of a node in the network. An IPv4 address has
4 octets of 8-bit each with each number with a value up to 255.
IPv4 classes are differentiated based on the number of hosts it supports on the network.
There are five types of IPv4 classes and are based on the first octet of IP addresses which
are classified as Class A, B, C, D, or E.
IPv4 Class IPv4 Start Address IPv4 End Address Usage
A 0.0.0.0 127.255.255.255 Used for Large Network
B 128.0.0.0 191.255.255.255 Used for Medium Size Network
C 192.0.0.0 223.255.255.255 Used for Local Area Network
D 224.0.0.0 239.255.255.255 Reserved for Multicasting
E 240.0.0.0 255.255.255.254 Study and R&D
What are Private and Special IP addresses?
Private Address: For each class, there are specific IPs that are reserved specifically for
private use only. This IP address cannot be used for devices on the Internet as they are
non-routable.
IPv4 Class Private IPv4 Start Address Private IPv4 End Address
A 10.0.0.0 10.255.255.255
B 172.16.0.0 172.31.255.255
B 192.168.0.0 192.168.255.255
Special Address: IP Range from 127.0.0.1 to 127.255.255.255 are network testing
addresses also known as loopback addresses are the special IP address
Describe the OSI Reference Model
Open System Interconnections (OSI) is a network architecture model based
on the ISO standards. It is called the OSI model as it deals with connecting
the systems that are open for communication with other systems.
The OSI model has seven layers. The principles used to arrive at the seven
layers can be summarized briefly as below:
Create a new layer if a different abstraction is needed.
Each layer should have a well-defined function.
The function of each layer is chosen based on internationally
standardized protocols.
13. Define the 7 different layers of the OSI Reference Model
Here the 7 layers of the OSI reference model:
Layers of OSI Model
Layer Unit Exchanged Description
It is concerned with transmitting raw bits over a
communication channel.
Physical Bit Chooses which type of transmission mode is to be
selected for the transmission. The available transmission
modes are Simplex, Half Duplex and Full Duplex.,
Data Link Frame The main task of this layer is to transform a raw
transmission facility into a line that appears free of
undetected transmission errors.
It also allows detecting damaged packets using the
CRC (Cyclic Redundancy Check) error-detecting, code.
When more than one node is connected to a shared
link, Data Link Layer protocols are required to determine
which device has control over the link at a given time.
Layer Unit Exchanged Description
It is implemented by protocols like CSMA/CD,
CSMA/CA, ALOHA, and Token Passing.
It controls the operation of the subnet.
Network Packet The network layer takes care of feedback messaging
through ICMP messages.
The basic functionality of this layer is to accept data
from the above layers, split it up into smaller units if needed,
TPDU - Transaction pass these to the network layer, and ensure that all the
Transport pieces arrive correctly at the other end.
Protocol Data Unit
The Transport Layer takes care of Segmentation and
Reassembly.
The session layer allows users on different machines
to establish sessions between them.
SPDU - Session
Session Dialogue control is using the full-duplex link as half-
Protocol Data Unit duplex. It sends out dummy packets from the client to the
server when the client is ideal.
The presentation layer is concerned with the syntax
PPDU - Presentation and semantics of the information transmitted.
Presentation
Protocol Data Unit It translates a message from a common form to the
encoded format which will be understood by the receiver.
It contains a variety of protocols that are commonly
APDU - Application needed by users.
Application
Protocol Data Unit The application layer sends data of any size to the
transport layer.
14. Describe the TCP/IP Reference Model
It is a compressed version of the OSI model with only 4 layers. It was
developed by the US Department of Defence (DoD) in the 1980s. The name
of this model is based on 2 standard protocols used i.e. TCP (Transmission
Control Protocol) and IP (Internet Protocol).
15. Define the 4 different layers of the TCP/IP Reference Model
Layers of TCP/IP
Layer Description
Decides which links such as serial lines or classic Ethernet must be used to meet the
Link
needs of the connectionless internet layer.
The internet layer is the most important layer which holds the whole
Internet architecture together.
It delivers the IP packets where they are supposed to be delivered.
Its functionality is almost the same as the OSI transport layer. It enables peer entities
Transport
on the network to carry on a conversation.
Application It contains all the higher-level protocols.
16. Differentiate OSI Reference Model with TCP/IP Reference Model
OSI Vs TCP/IP
OSI Reference Model TCP/IP Reference Model
7 layered architecture 4 layered architecture
Fixed boundaries and functionality for each Flexible architecture with no strict boundaries
layer between layers
Low Reliability High Reliability
Vertical Layer Approach Horizontal Layer Approach
17. What are the HTTP and the HTTPS protocol?
HTTP is the HyperText Transfer Protocol which defines the set of rules and
standards on how the information can be transmitted on the World Wide
Web (WWW). It helps the web browsers and web servers for communication.
It is a ‘stateless protocol’ where each command is independent with respect
to the previous command. HTTP is an application layer protocol built upon
the TCP. It uses port 80 by default.
HTTPS is the HyperText Transfer Protocol Secure or Secure HTTP. It is an
advanced and secured version of HTTP. On top of HTTP, SSL/TLS protocol is
used to provide security. It enables secure transactions by encrypting the
communication and also helps identify network servers securely. It uses port
443 by default.
18. What is the SMTP protocol?
SMTP is the Simple Mail Transfer Protocol. SMTP sets the rule for
communication between servers. This set of rules helps the software to
transmit emails over the internet. It supports both End-to-End and Store-
and-Forward methods. It is in always-listening mode on port 25.
SMTP Protocol
19. What is the DNS?
DNS is the Domain Name System. It is considered as the devices/services
directory of the Internet. It is a decentralized and hierarchical naming system
for devices/services connected to the Internet. It translates the domain
names to their corresponding IPs. For e.g. interviewbit.com to
172.217.166.36. It uses port 53 by default.
20. What is the use of a router and how is it different from a gateway?
The router is a networking device used for connecting two or more network
segments. It directs the traffic in the network. It transfers information and
data like web pages, emails, images, videos, etc. from source to destination in
the form of packets. It operates at the network layer. The gateways are also
used to route and regulate the network traffic but, they can also send data
between two dissimilar networks while a router can only send data to similar
networks.
Advanced Interview Questions
21. What is the TCP protocol?
TCP or TCP/IP is the Transmission Control Protocol/Internet Protocol. It is a
set of rules that decides how a computer connects to the Internet and how to
transmit the data over the network. It creates a virtual network when more
than one computer is connected to the network and uses the three ways
handshake model to establish the connection which makes it more reliable.
22. What is the UDP protocol?
UDP is the User Datagram Protocol and is based on Datagrams. Mainly, it is
used for multicasting and broadcasting. Its functionality is almost the same
as TCP/IP Protocol except for the three ways of handshaking and error
checking. It uses a simple transmission without any hand-shaking which
makes it less reliable.
23. Compare between TCP and UDP
TCP/IP UDP
Connection-Oriented Protocol Connectionless Protocol
More Reliable Less Reliable
Slower Transmission Faster Transmission
Packets order can be preserved or can be Packets order is not fixed and packets are
rearranged independent of each other
Uses three ways handshake model for
No handshake for establishing the connection
connection
TCP packets are heavy-weight UDP packets are light-weight
Offers error checking mechanism No error checking mechanism
Protocols like HTTP, FTP, Telnet, SMTP, Protocols like DNS, RIP, SNMP, RTP, BOOTP, TFTP,
HTTPS, etc use TCP at the transport layer NIP, etc use UDP at the transport layer
TCP VS UDP
24. What is the ICMP protocol?
ICMP is the Internet Control Message Protocol. It is a network layer protocol
used for error handling. It is mainly used by network devices like routers for
diagnosing the network connection issues and crucial for error reporting and
testing if the data is reaching the preferred destination in time. It uses port 7
by default.
25. What do you mean by the DHCP Protocol?
DHCP is the Dynamic Host Configuration Protocol.
It is an application layer protocol used to auto-configure devices on IP
networks enabling them to use the TCP and UDP-based protocols. The DHCP
servers auto-assign the IPs and other network configurations to the devices
individually which enables them to communicate over the IP network. It helps
to get the subnet mask, IP address and helps to resolve the DNS. It uses port
67 by default.
26. What is the ARP protocol?
ARP is Address Resolution Protocol. It is a network-level protocol used to
convert the logical address i.e. IP address to the device's physical address i.e.
MAC address. It can also be used to get the MAC address of devices when
they are trying to communicate over the local network.
ARP Protocol
27. What is the FTP protocol?
FTP is a File Transfer Protocol. It is an application layer protocol used to
transfer files and data reliably and efficiently between hosts. It can also be
used to download files from remote servers to your computer. It uses port 27
by default.
28. What is the MAC address and how is it related to NIC?
MAC address is the Media Access Control address. It is a 48-bit or 64-bit
unique identifier of devices in the network. It is also called the physical
address embedded with Network Interface Card (NIC) used at the Data Link
Layer. NIC is a hardware component in the networking device using which a
device can connect to the network.
29. Differentiate the MAC address with the IP address
The difference between MAC address and IP address are as follows:
MAC Address IP Address
Media Access Control Address Internet Protocol Address
6 or 8-byte hexadecimal number 4 (IPv4) or 16 (IPv6) Byte address
It is embedded with NIC It is obtained from the network
Physical Address Logical Address
Operates at Data Link Layer Operates at Network Layer.
Helps to identify the device Helps to identify the device connectivity on the network.
30. What is a subnet?
A subnet is a network inside a network achieved by the process called
subnetting which helps divide a network into subnets. It is used for getting a
higher routing efficiency and enhances the security of the network. It reduces
the time to extract the host address from the routing table.
TCP/IP
TCP/IP INTERVIEW QUESTIONS:
1. Explain range of TCP/IP classes
Answer :
CLASS A = 1 to 126
CLASS B = 128 to 191
CLASS C = 192 to 223
CLASS D = 224 to 239 (Multicasting)
CLASS E = 240 to 255 (Research)
2. What are Pvt. IP address ?
Answer : Pvt. IP are IPs which are not used in Internet or which are not routable in
Class A =
Internet. They are also called as non-routable IP's.
10.0.0.0 to 10.255.255.255
Class B = 172.16.0.0 to 172.31.255.255
Class C = 192.168.0.0. to 192.168.255.255
3. What is function of Router ?
Answer : Router is a device or PC which is used to connect two or more IP networks.
4. What is Default Gateway :
Answer : Default gateway is the address of router.
5. What is Subnet Mask ?
Answer : Subnet mask is used to differentiate Network ID and Host ID from a given IP
address. The default subnet mask are as under
Class A = 255.0.0.0
Class B = 255.255.0.0
Class C = 255.255.255.0
6. What is Loopback address ?
Answer : The loopback address is 127.0.0.1. This address is used to check local TCP/IP
suite or local machine.
7. What protocol is used by PING ?
Answer : Ping uses ICMP(Internet Control Management Protocol)
8. What is used of Tracert ?
Answer : Tracert is a to find path information between source and desitnation. It show no.
of hops between source and desitination. Tracert also uses ICMP protocol.
9. Difference between NetBEUI and TCP/IP
Answer :
TCP/IP NetBEUI
a. industry standard Microsoft propertiery
b. IP address NO addressing
c. supports routing Non routable
d. Large network small network
e. more confiugration no configuration
10. What is full form of PING ?
Answer : Packet Internet Network Gopher
BASICS OF NETWORKING
1. Difference between Switch and Hub
Switch HUB
a. Works at layer 2 works at layer 1
b. Uses MAC address for packet uses broadcast for packet forwarding
forwarding
c. Does not required CSMA/CD requires CSMA/CD
d. Faster than HUB Slower than Switch
e. Full-duplex Half-duplex
f. high throughput low throughput
2. Explain AT&T color code for straight cable and cross cable
Answer :
Orange/white
orange
green/white
3. what is bandwidth of of CAT5 cable
Answer : 100 Mbps
4. What is the recommanded CAT5 cable length between switch and PC ?
Answer : 100 meters
5. When to use cross cable and straight cable
Answer :
Similar device = cross cable
eg. switch to switch
PC to PC, Hub to HUB, Switch to HUB,PC to router, router to router
Unsimilar device = straight cable
eg. PC to switch, PC to HUB,Router to Switch
6. Which pins are used in CAT5 cables
Answer : pin no. 1,2,3,6
pin 1 = tx +
pin 2 = tx -
pin 3 = rx +
pin 6 = rx -
7. difference between domain and workgroup
Answer :
Domain Workgroup
a. centralized network model decentralized network
b. Domain is controlled by DC No centrailzed control
c. Centralised login Local login
d. centrailsed user database local user databased
e. Easy and centrailsed management NA
f. good for large network good for small network
8. Different types of LAN topologies
a. Bus topology = 10base2 (Thinnet)
= 10base5 (Thicknet)
b. Star topology = 10baseT (ethernet, 10 mbps)
= 100baseTx (fastethernet, 100 mbps)
= 100baseFX (fastethernet with Fibre)
= 1000baseTX (gigabit ethernet, 1000 mbps)
= 1000basefx (gigabit ethernet with fibre)
c. WAN toplogies = PSTN (Public switched telephone network)
= ISDN (Integrated switched digital network)
= Frame Relay
= Leased Line
= DSL (Digital subscriber line)
= ATM (Async Transfer Mode)
9. Explain in short about all 7 layers of OSI
Application layer = user interface and application
Presentation layer = Data conversion and transformation
session layer = keep data of diff. application seperately
transport layer = end to end connectivity using port numbers.
network layer = logical addressing like IP address.
Data link layer = Physical addressing like MAC address.
Physical layer = Physical transmission of data using 0's and 1's.
DHCP, DNS and WINS
1. What is DNS ?
Answer : It is used to resolve FQDN to IP address.
2. Types of Zone in DNS ?
Answer : Forward Lookup - it is used to resolve FQDN to IP
Reverse lookup - it is used to resolve IP to FQDN
3. Types of DNS Zone ?
Primary Zone :
Secondary Zone :
AD integrated Zone :
Stub Zone :
4. what is NSlookup ?
Answer : it is a tool used troubleshoot DNS related issues.
5 What is DHCP ?
Answer: DHCP is used to automatically provide IP address to client computers.
6. Explain DHCP 4 packets.
Discover = client sends request for IP.
Offer = DHCP server send and Offer with IP address.
Request = if clients accepts the IP it sends a request to DHCP.
Ack = DHCP server sends ack for the same.
7. What is client reservation in DHCP ?
Answer : to reserve a specific IP for a specific machine or host.
8. What is WINS ?
Answer : It is used to resolve NetBIOS Computer name to IP address.
9. Which port number DHCP uses?
Answer : DHCP uses UDP port number 67 and 68.
BASIC NETWORKING CONCEPTS
1) What is Web Server ?
Answer : Web server is a server or application server which host or stores websites.
Every web site should have a name like www.vision.com and IP address. Eg. IIS, Apache
server, etc.
2) What is mail server ?
Answer : Mail server is a software which maintains user mailboxes. eg : Exchange server
, Lotus domino, etc
3) What is mail client ?
Answer : A sofware used by client to access to mails stores on mail server. using mail
client software you can send mail and receive mail. Eg : Microsoft Outlook, Outlook
Express, Lotus notes, etc.
4) What is Proxy server ?
Answer : It is a software used for sharing of internet connection. Eg. Wingate, Winproxy,
Analog proxy, etc.
5) Port numbers for various application and services
There are total 65536 ports available. Below are the list of some well-known ports.
LDAP : 389,Kerberos : 88,DNS : 53,SMTP : 25,POP3 : 110,Telnet : 23,NNTP :
119,IMAP : 143
RPC : 135,HTTP : 80,HTTPS / SSL : 443,FTP : 21
6) What is firewall ?
Answer : It is a software used to provide security to your network by not allowing
unauthorized access to your Internal network from External users. Eg : PIX firewall,
Checkpoint firewall, etc.
1) Which protocol is used by ADS for time sync. between PC's?
Answer : SNTP (Simple network time protocol)
2) What is RPC protocol ?
Answer : RPC stands for Remote Procedure Call. It uses port number 135. RPC is an
inter-process communication technique that allows client and server software to
communicate.
3) What is COM ?
Answer : Component Object Model (COM) is Microsoft's object-oriented programming
model that defines how objects interact within a single application or between
applications.
4) What is SNMP ?
Answer : SNMP stands for Simple Network Management Protocol). This protocol is
used to monitor and manage network devices like Switches, Routers, Servers, etc. SNMP
uses port UDP port number 161 and 162.
Networking TCP layer interview questions and answers
Explain Transmission Control Protocol, TCP.
Latest answer: TCP ensures reliable and end to end delivery of segments of information.
Segments are acknowledged to the source when received by the
destination.......................
Read answer
Explain User Datagram Protocol, UDP.
Latest answer: The UDP is a connectionless, unreliable service. UDP messages can be lost
and duplicated.................
Read answer
What is TCP windowing concept?
Latest answer: TCP windowing concept is primarily used to avoid congestion in the traffic.
It controls the amount of unacknowledged data a sender can send before it gets an
acknowledgement...............
Read answer
What is TCP protocol?
Latest answer: Transmission control Protocol is used to establish communication between
nodes or networks and exchange data packets. It guarantees delivery of data packets in the
order they were sent.....................
Read answer
What is UDP protocol?
Latest answer: User Data Protocol is a communication protocol. It is normally used as an
alternative for TCP/IP. However there are a number of differences between them. UDP does
not divide data into packets.....................
Read answer
TCP vs. UDP.
Latest answer: TCP guarantees the delivery of data. UDP on the other hand, does not
guarantee delivery of data. TCP delivers messages in the order they were sent. UDP has no
ordering mechanisms....................
Basic Networking questions :-
1. What is the length of ipv6? Important Interview networking questions
Ans:- 128 bit
2. Where is the hub specified in the OSI model?
Ans:- Physical layer
3. Difference between TCP and UDP?
Ans:a) TCP is Transmission control protocol.
b) It is connection oriented.
c) Reliable
d) Uses checksum to detect errors.
UDP-
a) UDP is user datagram protocol.
b) It is connectionless.
c) Non reliable.
d) No acknowledgement.
4. What is a gateway? Networking questions
Ans:-Gateway is a device that connects two dissimilar networks. It is in application layer.
5. Name the two routing protocols?
Ans:-RIP & OSPF (intra domain routing protocol)
6. What is the advantage of OSPF protocol?
Ans:-OSPF(open shortest path first) based on link state routing protocol. It handle routing
efficiently and in timely manner.
7. What are the different layers in the OSI model? Basic Networking questions
Ans:- Different layers of OSI model:
8. What is a firewall? Basic Networking questions
Ans:-Firewall is a network that protects internet from unauthorized access. It is need for
every computer system. proxy firewall is a type of firewall.
9. Difference between intra domain and inter domain routing protocol?
Ans:-Routing within an autonomous system is referred as intra domain routing protocol and
routing between an autonomous system is called as inter domain routing protocol.
10. Name the ports used by FTP protocol?
Ans:- FTP is file transfer protocol. It copies file and transfer from one system to another
port no is 20 for connection and port 21 is for data transfer.
11. Define Network?
Ans:- A network is a collection of devices which are connected by means of physical media
links or it is connection of two or more nodes in a recursive manner by a physical link.
Basic Networking interview questions
12. What is a Link? basic networking questions
Ans:- Link is a physical medium such as coaxial cable or optical fibre that connects two or
more computers directly which form a network.
13. What is a node?
Ans:- Links are physical medium that connects two or more computers directly and the
computer it connects is called as nodes.
14. State the advantages of Distributed Processing?
Ans:- The advantages are:-
a. Security/Encapsulation
b. Distributed database
c. Faster Problem solving
d. Security by means of redundancy
e. Collaborative Processing
15. Mention the factors by which a network performance is affected?
Ans:-
a. No. of Users
b. Transmission medium type
c. Hardware
d. Software
16. Name the factors that affect the reliability of the network? basic networking
questions
a. Failure frequency
b. Network Recovery time after a failure
17. What are the key elements of protocols?
Ans:- The key elements of protocols are as follows:-
a. Syntax
It refers to the format of the data, the order in which they are represented.
b. Semantics
It refers to the meaning of each section of bits.
c. Timing
Timing refers to: When data should be sent and how fast.
18. Mention the key design issues of a computer Network?
Ans:- The Key design issues are as follows:-
a. Connectivity of the network
b. Cheap resource Sharing
c. Common Services will have support
d. Performance of the network
19. Define Bandwidth and Latency? basic networking questions
Ans:- Performance of network is measured in Bandwidth called throughput and Latency
called Delay. Network bandwidth is the number of bits which can be transmitted over the
network over a certain period of time. Latency refers to the time taken by a message to
travel from one end of network to another. It is strictly measured in terms of time.
20. Describe the situation when a switch is said to be congested?
Ans:- It is possible that a switch for an extended period of time can receives packets faster
than the shared link can accommodate and stores in its memory, then the switch will
eventually run out of buffer space, and some packets has to be dropped & is said to be
congested state.
21. Describe semantic gap?
Ans:- A useful channel includes both two things that is to understand the applications
requirements and recognize underlying technology limitations. The gap between what
applications expects or desires and what the underlying technology can provide or give is
called semantic gap.
22. Which layers are user support layers?
Ans:- User support layers are as follows:-
a. Session layer
b. Presentation layer
c. Application layer
23. What is Error Detection? What are the methods?
Ans:- During transmission data can get corrupted. In order to have a reliable
communication errors must be deducted and corrected. Error Detection uses the concept of
redundancy by means of which it adds extra bits to detect errors at the destination. The
error detection methods are as follows:-
a. Vertical Redundancy Check
b. Longitudinal Redundancy Check
c. Cyclic Redundancy Check
d. Checksum
24. What are Data Words?
Ans:- In block coding, message is divided into blocks, each of k bits, called data words. The
same data word is always encoded as the same code word.
25. What is Framing?
Ans:- The work of framing in the data link layer is to separate a message from one source
to a destination, or from other messages to other destinations, by adding a sender &
destination address. The destination address is the address of the packet where it has to go
and the sender address helps the recipient acknowledge the receipt.
26. What is Error Control ?
Ans:- Error detection and error correction is called as error control. If any frame is lost or
damaged in transmission than the receiver inform it to that particular sender and ask to
retransmit those frames by the sender. In the data link layer, error control refers primarily
to methods of error detection and retransmission.
27. What is utility of sequence number in Reliable Transmission?
Ans:- The protocol specifies that frames numbering has to be done using sequence
numbers. A field is added to the data frame section in order to hold the sequence number of
that frame. As we want to minimize the frame size which will provide unambiguous
communication. The sequence numbers can wrap around.
28. What is MAC address?
Ans:- Media Access Control (MAC) layer is the device address in the network architecture.
MAC address is unique and is usually stored in ROM on the network adapter card.
29. What is the difference between TFTP and FTP application layer protocols?
Ans:- In order to obtain files from a remote host trivial file transfer protocol is used but it
does not provide reliability or security. The File Transfer Protocol (FTP) is the standard
mechanism which is by TCP / IP to copy a file from one host to another. TCP offer services
that are reliable and secure. Two connections are established between the hosts, one for
data transfer and another for control information.
30. What are major types of networks explain it?
Ans:- Two major types-Server-based network: In this there is centralized control of network
resources and it depends on server computers for security as well as network administration
Peer-to-peer network: In this the computers can act as both sharing resources servers as
well as clients using the resources.
Subnet
31. Compare the hub vs switch
Hub Switch
Operates at Physical Layer Operates at Data Link Layer
Half-Duplex transmission mode Full-Duplex transmission mode
Ethernet devices can be connectedsend LAN devices can be connected
Less complex, less intelligent, and cheaper Intelligent and effective
Administration software support is
No software support for the administration
present
Less speed up to 100 MBPS Supports high speed in GBPS
Less efficient as there is no way to avoid collisions
More efficient as the collisions can be
when more than one nodes sends the packets at the
avoided or reduced as compared to Hub
same time
32. What is the difference between the ipconfig and the ifconfig?
ipconfig ifconfig
Internet Protocol Configuration Interface Configuration
Command used in Microsoft operating
Command used in MAC, Linux, UNIX operating
systems to view and configure network
systems to view and configure network interfaces
interfaces
Used to get the TCP/IP summary and allows to changes the DHCP and DNS settings
33. What is the firewall?
The firewall is a network security system that is used to monitor the incoming
and outgoing traffic and blocks the same based on the firewall security
policies. It acts as a wall between the internet (public network) and the
networking devices (a private network). It is either a hardware device,
software program, or a combination of both. It adds a layer of security to the
network.
Firewall
34. What are Unicasting, Anycasting, Multicasting and Broadcasting?
Unicasting: If the message is sent to a single node from the source
then it is known as unicasting. This is commonly used in networks to
establish a new connection.
Anycasting: If the message is sent to any of the nodes from the source
then it is known as anycasting. It is mainly used to get the content from any
of the servers in the Content Delivery System.
Multicasting: If the message is sent to a subset of nodes from the
source then it is known as multicasting. Used to send the same data to
multiple receivers.
Broadcasting: If the message is sent to all the nodes in a network from
a source then it is known as broadcasting. DHCP and ARP in the local
network use broadcasting.
35. What happens when you enter google.com in the web browser?
Below are the steps that are being followed:
Check the browser cache first if the content is fresh and present in
cache display the same.
If not, the browser checks if the IP of the URL is present in the cache
(browser and OS) if not then request the OS to do a DNS lookup using UDP
to get the corresponding IP address of the URL from the DNS server to
establish a new TCP connection.
A new TCP connection is set between the browser and the server using
three-way handshaking.
An HTTP request is sent to the server using the TCP connection.
The web servers running on the Servers handle the incoming HTTP
request and send the HTTP response.
The browser process the HTTP response sent by the server and may
close the TCP connection or reuse the same for future requests.
If the response data is cacheable then browsers cache the same.
Browser decodes the response and renders the content.
Conclusion
In today’s world, it is very hard to stay away from the Internet and that is
what makes networking one of the most important interview topics. As of
2021 if we check the facts, there is a total of 1.3 million kilometers of
submarine optical fiber cables set globally to connect the world to the
Internet. These cables are more than enough to revolve around the earth
more than 100 times.