Networking Interview Questions and Answers: A Comprehensive Guide

Networking Interview Questions And Answers Set – 2

Client-Server Architecture

What is meant by 3-Tier architecture?

In 3-tier Client/Server systems, the application logic (or process) resides in the middle tier, separate from the data and the user interface. This separation enhances scalability, robustness, and flexibility.

Example: TP monitor, Web.

What is meant by 2-Tier architecture?

In 2-tier Client/Server systems, the application logic is either embedded within the user interface on the client side or within the database on the server side.

Example: File servers and Database servers with stored procedures.

What is Load balancing?

Load balancing is a technique used in Client/Server systems where if the number of incoming client requests exceeds the capacity of server processes, the TP Monitor can dynamically initiate new processes to handle the load effectively.

What are called Fat clients and Fat servers?

Fat Clients: When the majority of the application logic runs on the client-side, it is referred to as a Fat client. This approach is often used for decision support systems and personal software.

Fat Servers: Conversely, if the bulk of the application logic resides on the server-side, it is called a Fat server. This architecture aims to minimize network traffic by creating more abstract service layers.

What is meant by Horizontal scaling and Vertical scaling?

Horizontal Scaling: Involves adding or removing client workstations with minimal impact on performance.

Vertical Scaling: Entails migrating to a more powerful server machine or implementing a multi-server setup.

What is a Groupware server?

Groupware servers facilitate the management of semi-structured information, including text, images, email, bulletin boards, and workflow. These Client/Server systems enable direct collaboration and communication between users.

What are the two broad classes of middleware?

  • General middleware
  • Service-specific middleware

What are the types of Servers?

  • File servers
  • Database servers
  • Transaction servers
  • Groupware servers
  • Object servers
  • Web servers

What is a File server?

File servers enable file sharing over a network. Clients send requests for file records to the file server, which then processes these requests.

What are the five major technologies used to create Client/Server applications?

  1. Database Servers
  2. TP Monitors
  3. Groupware
  4. Distributed Objects
  5. Intranets

What is Client/Server?

Client/Server refers to a model where clients and servers are distinct logical entities that interact over a network to perform tasks. Systems with diverse architectures that communicate and collaborate can also be classified as Client/Server.

List out the benefits obtained by using the Client/Server oriented TP Monitors?

  • Client/Server application development framework
  • Enhanced security through firewalls
  • High availability
  • Load balancing
  • MOM (Message Oriented Middleware) integration
  • Scalability of functions
  • Reduced system cost

Operating Systems and Databases

What are the services provided by the Operating System?

Extended services: These are additional modular software components layered on top of the base services provided by the operating system.

What is the ACID property?

ACID, coined by Andrew Reuter in 1983, stands for Atomicity, Consistency, Isolation, and Durability. It represents a set of properties that guarantee database transactions’ reliability and integrity.

What are Stored procedures?

A stored procedure is a precompiled collection of SQL statements and procedural logic stored within a server database. Treated like any other database object, stored procedures accept input parameters, enabling multiple clients to utilize them with varying data. This approach reduces network traffic and enhances performance.

Network Security

What is a wide-mouth frog?

In the context of network security, the”wide-mouth fro” refers to a simple key distribution center (KDC) authentication protocol.

Network Topology

What is a passive topology?

In passive topologies, computers on the network primarily listen and receive signals without amplifying them. A common example is the linear bus topology.

What is a region in hierarchical routing?

In hierarchical routing, routers are organized into regions. Each router possesses comprehensive routing information for destinations within its region but limited knowledge about the internal structure of other regions.

What is a virtual channel?

A virtual channel, also known as a virtual circuit, typically represents a connection between a source and a destination. Multicast connections are also possible using virtual channels.

Network Communication

Difference between communication and transmission?

Transmission: The physical movement of information, dealing with aspects like bit polarity, synchronization, and clock signals.

Communication: The meaningful exchange of information between two communication entities.

What is the difference between TFTP and FTP application layer protocols?

TFTP (Trivial File Transfer Protocol): A simple protocol allowing local hosts to retrieve files from remote hosts without ensuring reliability or security. It relies on UDP for packet delivery.

FTP (File Transfer Protocol): The standard TCP/IP protocol for secure and reliable file transfers between hosts. It utilizes two TCP connections: one for data and another for control information.

What are the advantages and disadvantages of the three types of routing tables?

The three primary types of routing tables are fixed, dynamic, and fixed central.

  • Fixed tables require manual updates for any network changes.
  • Dynamic tables adapt based on network traffic, minimizing manual intervention.
  • Fixed central tables allow a central manager to modify a single table, simplifying updates but potentially introducing delays.

Dynamic tables are generally preferred, although changes can occur without the administrator’s immediate knowledge.

What is Beaconing?

Beaconing is a self-repair mechanism used in Token Ring and FDDI networks. Stations on the network send out beacon frames to signal their status and detect potential network issues.

What does the Mount protocol do?

The Mount protocol facilitates file system access. When a client requests a file, the server responds with a file handle and the file system’s name where the requested file is located.

Data Compression and Encoding

What are Digrams and Trigrams?

Digrams: The most frequent two-letter combinations in a language (e.g.,”th””in””e”).

Trigrams: The most common three-letter combinations (e.g.,”the””ing””an”).

Routing Protocols

What is the HELLO protocol used for?

The HELLO protocol determines optimal routing paths based on time instead of distance. It serves as an alternative to the Routing Information Protocol (RIP).

TCP/IP Protocol Suite

What is the minimum and maximum length of the header in the TCP segment and IP datagram?

Both TCP segment and IP datagram headers have a minimum length of 20 bytes and can extend up to 60 bytes.

What do you mean by”triple ” in Networks?

  • X.3: Describes PAD functions.
  • X.28: Defines the protocol between a terminal and a PAD.
  • X.29: Specifies the protocol between a PAD and the network.

Network Cables and Signals

What is attenuation?

Attenuation is the weakening or loss of signal strength as it travels over a network cable.

What is a Protocol Data Unit (PDU)?

At the LLC (Logical Link Control) layer, the data unit is called a PDU. It consists of four fields:

  1. Destination Service Access Point (DSAP)
  2. Source Service Access Point (SSAP)
  3. Control field
  4. Information field

What are the data units at different layers of the TCP/IP protocol suite?

  • Application Layer: Message
  • Transport Layer: Segment or User Datagram
  • Network Layer: Datagram
  • Data Link Layer: Frame
  • Physical Layer: Signals

What is the difference between ARP and RARP?

ARP (Address Resolution Protocol): Resolves a 32-bit IP address to a 48-bit physical (MAC) address.

RARP (Reverse Address Resolution Protocol): Enables a host to determine its IP address when only its physical address is known.

What is a MAC address?

A MAC (Media Access Control) address is a unique identifier assigned to a network interface card (NIC). It operates at the Data Link Layer of the OSI model.

Network Applications

What is terminal emulation, and in which layer does it come?

Terminal emulation, often using Telnet, allows a user to access and interact with a remote computer as if directly connected. It operates at the Application Layer.

Transmission Media

What are the types of Transmission media?


Signals are usually transmitted over some transmission media that are broadly classified in to two categories:-

Guided Media:

These are those that provide a conduit from one device to another that include twisted-pair, coaxial cable and fiber-optic cable. A signal traveling along any of these media is directed and is contained by the physical limits of the medium. Twisted-pair and coaxial cable use metallic that accept and transport signals in the form of electrical current. Optical fiber is a glass or plastic cable that accepts and transports signals in the form of light.
Unguided Media:

This is the wireless media that transport electromagnetic waves without using a physical conductor. Signals are broadcast either through air. This is done through radio communication, satellite communication and cellular telephony. 

What are major types of networks and explain?
Server-based network.
Peer-to-peer network.

Peer-to-peer network, computers can act as both servers sharing resources and as clients using the resources.
Server-based networks provide centralized control of network resources and rely on server computers to provide security and network administration.