<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Networking - Wikitechy</title>
	<atom:link href="https://www.wikitechy.com/interview-questions/category/networking/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.wikitechy.com/interview-questions/category/networking/</link>
	<description>Interview Questions</description>
	<lastBuildDate>Thu, 21 Mar 2024 08:51:57 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.wikitechy.com/interview-questions/wp-content/uploads/2025/10/cropped-wikitechy-icon-32x32.png</url>
	<title>Networking - Wikitechy</title>
	<link>https://www.wikitechy.com/interview-questions/category/networking/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Networking Projects</title>
		<link>https://www.wikitechy.com/interview-questions/networking/networking-projects/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/networking-projects/#respond</comments>
		
		<dc:creator><![CDATA[webmaster]]></dc:creator>
		<pubDate>Thu, 11 Jan 2024 10:50:30 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=10458</guid>

					<description><![CDATA[1. PROJECT NAME: Ryan Network Design and Implementation with Wireshark Analysis Duration                                : 4 months Tools Used                             : Wireshark Client                                      : Hyderabad Project Description: In this project, [&#8230;]]]></description>
										<content:encoded><![CDATA[<h2 id="1-project-name-ryan-network-design-and-implementation-with-wireshark-analysis"><strong>1. PROJECT NAME: </strong><strong>Ryan </strong><strong>Network Design and Implementation with Wireshark Analysis</strong></h2>
<p style="text-align: justify;"><strong>Duration </strong><strong>                               : </strong>4 months</p>
<p style="text-align: justify;"><strong>Tools Used                             </strong><strong>:</strong> Wireshark</p>
<p style="text-align: justify;"><strong>Client</strong><strong>                                      : </strong>Hyderabad</p>
<p style="text-align: justify;"><strong>Project Description:</strong></p>
<p style="text-align: justify;">In this project, I led the end-to-end design and implementation of a network infrastructure for a medium-sized enterprise, focusing on optimizing performance, ensuring security, and implementing efficient traffic management. Wireshark, a network protocol analyzer, was extensively utilized for real-time monitoring, packet analysis, and troubleshooting.</p>
<p style="text-align: justify;"><strong>Roles and Responsibilities :</strong></p>
<ul style="text-align: justify;">
<li>Conducted a thorough analysis of the organization&#8217;s requirements to create a scalable and robust network architecture.</li>
<li>Deployed Wireshark for continuous real-time monitoring and analysis of network traffic.</li>
<li>Implemented best practices for efficient routing and switching to minimize packet loss and ensure optimal data transfer.</li>
<li>Reduced network downtime by 20% through proactive monitoring and prompt issue resolution.</li>
<li>Improved network performance, resulting in a 15% increase in overall data transfer speeds.</li>
<li>Enhanced security posture, leading to successful mitigation of potential threats identified through Wireshark analysis.</li>
</ul>
<h2 id="2-project-name-rebel-secure-campus-network-design-and-implementation"><strong>2. PROJECT NAME: </strong><strong>Rebel </strong><strong>Secure Campus Network Design and Implementation</strong></h2>
<p style="text-align: justify;"><strong>Duration </strong><strong>                               : </strong>4 months</p>
<p style="text-align: justify;"><strong>Tools Used                             </strong><strong>:</strong> Wireshark &amp; Putty</p>
<p style="text-align: justify;"><strong>Client</strong><strong>                                      : </strong>Banglore</p>
<p style="text-align: justify;"><strong>Project Description:</strong></p>
<p style="text-align: justify;">The goal of this project is to design and implement a secure and resilient campus network infrastructure for Generous client. The network will cater to the diverse needs of faculty, staff, students, and guests, ensuring reliable connectivity, scalability, and robust security measures. The implementation will include wired and wireless networks, incorporating the latest technologies and best practices to create a modern and secure educational environment.</p>
<p style="text-align: justify;"><strong>Roles and Responsibilities :</strong></p>
<ul style="text-align: justify;">
<li>Design and implement Virtual LANs (VLANs) to logically segment the network based on user roles and functions.</li>
<li>Implemented proper VLAN configurations for faculty, staff, students, and guest networks to enhance network security.</li>
<li>Implemented best practices for efficient routing and switching to minimize packet loss and ensure optimal data transfer.</li>
<li>Design and implement Virtual LANs (VLANs) to logically segment the network based on user roles and functions.</li>
<li>Implemented proper VLAN configurations for faculty, staff, students, and guest networks to enhance network security.</li>
</ul>
<h2 id="3-project-name-royal-network-firewall-ids-implementation"><strong>3. PROJECT NAME: </strong><strong>Royal </strong><strong>Network &amp; Firewall IDS Implementation</strong></h2>
<p style="text-align: justify;"><strong>Duration </strong><strong>                               : </strong>4 months</p>
<p style="text-align: justify;"><strong>Tools Used                             </strong><strong>:</strong> Maltrail IDS</p>
<p style="text-align: justify;"><strong>Client</strong><strong>                                      : </strong>Noida</p>
<p style="text-align: justify;"><strong>Project Description:</strong></p>
<p style="text-align: justify;">The objective of this project is to design, deploy, and manage a comprehensive with integrated Intrusion Detection System (IDS) capabilities. The Firewall with IDS will enhance the organization&#8217;s security posture by actively monitoring and responding to potential security threats. The implementation will focus on real-time threat detection, analysis, and mitigation through the effective use of firewall policies and intrusion detection signatures.</p>
<p style="text-align: justify;"><strong>Roles and Responsibilities :</strong></p>
<ul style="text-align: justify;">
<li>Evaluated and select a Firewall solution that aligns with the organization&#8217;s security requirements.</li>
<li>Deployed the firewall at the network perimeter to inspect and control incoming and outgoing traffic.</li>
<li>Integrated an IDS module into the Firewall to enhance threat detection capabilities.</li>
<li>Configured and fine-tune intrusion detection signatures to identify known and emerging threats.</li>
<li>Proactive threat detection and response, reducing the risk of security incidents.</li>
<li>Improved visibility into network traffic and security events for effective incident management.</li>
</ul>
<h2 id="4-project-name-ratna-network-security-enhancement-with-bettercap-implementation"><strong>4. PROJECT NAME: </strong><strong>Ratna </strong><strong>Network Security Enhancement with Bettercap Implementation</strong></h2>
<p style="text-align: justify;"><strong>Duration </strong><strong>                               : </strong>4 months</p>
<p style="text-align: justify;"><strong>Tools Used                             </strong><strong>:</strong> LinuxOS &amp; BetterCap</p>
<p style="text-align: justify;"><strong>Client</strong><strong>                                      : </strong>Pune</p>
<p style="text-align: justify;"><strong>Project Description:</strong></p>
<p style="text-align: justify;">The aim of this project is to leverage Bettercap, a powerful network penetration testing and security tool, to enhance the security posture of an organization&#8217;s network. This project involves conducting comprehensive security assessments, identifying vulnerabilities, and implementing remediation strategies to fortify the network against potential cyber threats.</p>
<p style="text-align: justify;"><strong>Roles and Responsibilities :</strong></p>
<ul style="text-align: justify;">
<li>Used Bettercap for packet sniffing to capture and analyze network traffic.</li>
<li>Identify any unencrypted or insecure protocols, and propose solutions to secure communication channels.</li>
<li>Created detailed network maps to visualize the topology, identify hosts, and understand the communication flows.</li>
<li>Utilized Bettercap to conduct an in-depth discovery of the organization&#8217;s network infrastructure.</li>
<li>Employ Bettercap to simulate various Man-in-the-Middle attacks, such as ARP spoofing and DNS spoofing.</li>
<li>Evaluated the network&#8217;s resilience to these attacks and identify potential security weaknesses.</li>
</ul>
<h2 id="5-project-name-tcpl-wireless-network-security-assessment" style="text-align: justify;"><strong>5. PROJECT NAME: </strong><strong>TCPL </strong><strong>Wireless Network Security Assessment</strong></h2>
<p style="text-align: justify;"><strong>Duration </strong><strong>                               : </strong>4 months</p>
<p style="text-align: justify;"><strong>Tools Used                            </strong><strong>:</strong> LinuxOS &amp; Airodump-ng</p>
<p style="text-align: justify;"><strong>Client</strong><strong>                                     : </strong>Chennai</p>
<p style="text-align: justify;"><strong>Project Description:</strong></p>
<p style="text-align: justify;">The goal of this project is to conduct a thorough assessment of the wireless network security infrastructure within an organization. By employing industry best practices and leveraging specialized tools, the project aims to identify vulnerabilities, assess the overall security posture, and recommend enhancements to fortify the wireless network against potential threats.</p>
<p style="text-align: justify;"><strong>Roles and Responsibilities :</strong></p>
<ul style="text-align: justify;">
<li>Perform a comprehensive discovery of wireless networks and devices.</li>
<li>Identify potential security risks and vulnerabilities.</li>
<li>Utilize tool such as Airodump-ng to perform a comprehensive discovery of all wireless networks within the organization.</li>
<li>Identify hidden or unauthorized networks and assess their potential impact on the security landscape.</li>
<li>Assess the security configurations of wireless client devices.</li>
<li>Provide recommendations for securing laptops, smartphones, and other wireless-enabled devices to minimize security risks.</li>
<li>Employ Bettercap to simulate various Man-in-the-Middle attacks, such as ARP spoofing and DNS spoofing.</li>
<li>Evaluated the network&#8217;s resilience to these attacks and identify potential security weaknesses.</li>
</ul>
<h2 id="6-project-name-smokin-enhanced-network-security-with-implementation-of-bettercap"><strong>6. PROJECT NAME: </strong><strong>Smokin </strong><strong>Enhanced Network Security with Implementation of Bettercap</strong></h2>
<p style="text-align: justify;"><strong>Duration </strong><strong>                               : </strong>4 months</p>
<p style="text-align: justify;"><strong>Tools Used                             </strong><strong>:</strong> BetterCap &amp; Arp Spoof</p>
<p style="text-align: justify;"><strong>Client</strong><strong>                                      : </strong>Chennai</p>
<p style="text-align: justify;"><strong>Project Description:</strong></p>
<p style="text-align: justify;">The aim of this project is to leverage Bettercap, a powerful network penetration testing and security tool, to enhance the security posture of an organization&#8217;s network. This project involves conducting comprehensive security assessments, identifying vulnerabilities, and implementing remediation strategies to fortify the network against potential cyber threats.</p>
<p style="text-align: justify;"><strong>Roles and Responsibilities :</strong></p>
<ul style="text-align: justify;">
<li>Used Bettercap for packet sniffing to capture and analyze network traffic.</li>
<li>Identify any unencrypted or insecure protocols, and propose solutions to secure communication channels.</li>
<li>Created detailed network maps to visualize the topology, identify hosts, and understand the communication flows.</li>
<li>Utilized Bettercap to conduct an in-depth discovery of the organization&#8217;s network infrastructure.</li>
<li>Employ Bettercap to simulate various Man-in-the-Middle attacks, such as ARP spoofing and DNS spoofing.</li>
<li>Evaluated the network&#8217;s resilience to these attacks and identify potential security weaknesses.</li>
</ul>
<h2 id="7-project-name-rain-network-analysis-with-wireshark"><strong>7. PROJECT NAME: </strong><strong>RAIN </strong><strong>Network Analysis with Wireshark</strong></h2>
<p style="text-align: justify;"><strong>Duration </strong><strong>                               : </strong>4 months</p>
<p style="text-align: justify;"><strong>Tools Used                             </strong><strong>:</strong> Wireshark</p>
<p style="text-align: justify;"><strong>Client</strong><strong>                                     : </strong>Bangalore</p>
<p style="text-align: justify;"><strong>Project Description:</strong></p>
<p style="text-align: justify;">In this project, I led the end-to-end design and implementation of a network infrastructure for a medium-sized enterprise, focusing on optimizing performance, ensuring security, and implementing efficient traffic management. Wireshark, a network protocol analyzer, was extensively utilized for real-time monitoring, packet analysis, and troubleshooting.</p>
<p style="text-align: justify;"><strong>Roles and Responsibilities :</strong></p>
<ul style="text-align: justify;">
<li>Conducted a thorough analysis of the organization&#8217;s requirements to create a scalable and robust network architecture.</li>
<li>Deployed Wireshark for continuous real-time monitoring and analysis of network traffic.</li>
<li>Implemented best practices for efficient routing and switching to minimize packet loss and ensure optimal data transfer.</li>
<li>Reduced network downtime by 20% through proactive monitoring and prompt issue resolution.</li>
<li>Improved network performance, resulting in a 15% increase in overall data transfer speeds.</li>
<li>Enhanced security posture, leading to successful mitigation of potential threats identified through Wireshark analysis.</li>
</ul>
<h2 id="8-project-name-acs-encrypted-network-design-and-implementation"><strong>8. PROJECT NAME: ACS Encrypted Network Design and Implementation</strong></h2>
<p style="text-align: justify;"><strong>Duration </strong><strong>                               : </strong>4 months</p>
<p style="text-align: justify;"><strong>Tools Used                     </strong><strong>:</strong> Wireshark &amp; Putty</p>
<p style="text-align: justify;"><strong>Client</strong><strong>                                       : </strong>Coimbatore</p>
<p style="text-align: justify;"><strong>Project Description:</strong></p>
<p style="text-align: justify;">The goal of this project is to design and implement a secure and resilient campus network infrastructure for Generous client. The network will cater to the diverse needs of faculty, staff, students, and guests, ensuring reliable connectivity, scalability, and robust security measures. The implementation will include wired and wireless networks, incorporating the latest technologies and best practices to create a modern and secure educational environment.</p>
<p style="text-align: justify;"><strong>Roles and Responsibilities :</strong></p>
<ul style="text-align: justify;">
<li>Design and implement Virtual LANs (VLANs) to logically segment the network based on user roles and functions.</li>
<li>Implemented proper VLAN configurations for faculty, staff, students, and guest networks to enhance network security.</li>
<li>Implemented best practices for efficient routing and switching to minimize packet loss and ensure optimal data transfer.</li>
<li>Design and implement Virtual LANs (VLANs) to logically segment the network based on user roles and functions.</li>
<li>Implemented proper VLAN configurations for faculty, staff, students, and guest networks to enhance network security.</li>
</ul>
<h2 id="9-project-name-aeh-network-security-with-firewall-ids-ips-implementation"><strong>9. PROJECT NAME: AEH Network Security with Firewall IDS/IPS Implementation</strong></h2>
<p style="text-align: justify;"><strong>Duration </strong><strong>                               : </strong>4 months</p>
<p style="text-align: justify;"><strong>Tools Used                     </strong><strong>:</strong> Maltrail IDS</p>
<p style="text-align: justify;"><strong>Client</strong><strong>                                       : </strong>Salem</p>
<p style="text-align: justify;"><strong>Project Description:</strong></p>
<p style="text-align: justify;">The objective of this project is to design, deploy, and manage a comprehensive with integrated Intrusion Detection System (IDS) capabilities. The Firewall with IDS will enhance the organization&#8217;s security posture by actively monitoring and responding to potential security threats. The implementation will focus on real-time threat detection, analysis, and mitigation through the effective use of firewall policies and intrusion detection signatures.</p>
<p style="text-align: justify;"><strong>Roles and Responsibilities :</strong></p>
<ul style="text-align: justify;">
<li>Evaluated and select a Firewall solution that aligns with the organization&#8217;s security requirements.</li>
<li>Deployed the firewall at the network perimeter to inspect and control incoming and outgoing traffic.</li>
<li>Integrated an IDS module into the Firewall to enhance threat detection capabilities.</li>
<li>Configured and fine-tune intrusion detection signatures to identify known and emerging threats.</li>
<li>Proactive threat detection and response, reducing the risk of security incidents.</li>
<li>Improved visibility into network traffic and security events for effective incident management.</li>
</ul>
<h2 id="10-project-name-thilak-network-security-enhancement-with-threat-modeling"><strong>10.PROJECT NAME: THILAK Network Security Enhancement with Threat Modeling</strong></h2>
<p style="text-align: justify;"><strong>Duration </strong><strong>                               : </strong>4 months</p>
<p style="text-align: justify;"><strong>Tools Used                     </strong><strong>:</strong> WireShark ,Burp Suite, and Nmap</p>
<p style="text-align: justify;"><strong>Client</strong><strong>                                       : </strong>Hyderabad</p>
<p style="text-align: justify;"><strong>Project Description:</strong></p>
<p style="text-align: justify;">By adopting a proactive approach through threat modeling. By identifying and addressing potential threats early in the development lifecycle, the project seeks to minimize the risk of security breaches and ensure the resilience of web applications against evolving cyber threats.</p>
<p style="text-align: justify;"><strong>Roles and Responsibilities :</strong></p>
<ul style="text-align: justify;">
<li>Employed tools like Burp Suite for automated scanning and Nmap for network reconnaissance.</li>
<li>Conducted manual penetration testing to identify vulnerabilities not captured by automated tools.</li>
<li>Identify any unencrypted or insecure protocols, and propose solutions to secure communication channels.</li>
<li>Created detailed network maps to visualize the topology, identify hosts, and understand the communication flows.</li>
<li>Integrated security controls such as input validation, output encoding, and session management to mitigate identified threats..</li>
<li>Documented the threat modeling process, identified vulnerabilities, and implemented security controls..</li>
</ul>
<h2 id="11-project-name-sa-network-encryption-and-data-privacy-enhancement"><strong>11. PROJECT NAME: SA Network Encryption and Data Privacy Enhancement</strong></h2>
<p style="text-align: justify;"><strong>Duration </strong><strong>                               : </strong>4 months</p>
<p style="text-align: justify;"><strong>Tools Used                     </strong><strong>:</strong> SSL/TLS, Wireshark</p>
<p style="text-align: justify;"><strong>Client</strong><strong>                                       : </strong>Mumbai</p>
<p style="text-align: justify;"><strong>Project Description:</strong></p>
<p style="text-align: justify;">By adopting a proactive approach through threat modeling. By identifying and addressing potential threats early in the development lifecycle, the project seeks to minimize the risk of security breaches and ensure the resilience of web applications against evolving cyber threats.</p>
<p style="text-align: justify;"><strong>Roles and Responsibilities :</strong></p>
<ul style="text-align: justify;">
<li>Employed tools like Burp Suite for automated scanning and Nmap for network reconnaissance.</li>
<li>Conducted manual penetration testing to identify vulnerabilities not captured by automated tools.</li>
<li>Identify any unencrypted or insecure protocols, and propose solutions to secure communication channels.</li>
<li>Created detailed network maps to visualize the topology, identify hosts, and understand the communication flows.</li>
<li>Integrated security controls such as input validation, output encoding, and session management to mitigate identified threats..</li>
<li>Documented the threat modeling process, identified vulnerabilities, and implemented security controls.</li>
</ul>
<p>&nbsp;</p>
<h2 id="12-project-name-ags-firewall-rule-review-and-optimization"><strong>12.PROJECT NAME: AGS Firewall Rule Review and Optimization</strong></h2>
<p style="text-align: justify;"><strong>Duration </strong><strong>                               : </strong>4 months</p>
<p style="text-align: justify;"><strong>Tools Used                     </strong><strong>:</strong> Nmap, Windows DFW</p>
<p style="text-align: justify;"><strong>Client</strong><strong>                                       : </strong>Coimbatore</p>
<p style="text-align: justify;"><strong>Project Description:</strong></p>
<p style="text-align: justify;">By adopting a proactive approach through threat modeling. By identifying and addressing potential threats early in the development lifecycle, the project seeks to minimize the risk of security breaches and ensure the resilience of web applications against evolving cyber threats.</p>
<p style="text-align: justify;"><strong>Roles and Responsibilities :</strong></p>
<ul style="text-align: justify;">
<li>Conduct a comprehensive review of existing firewall rules.</li>
<li>Optimize rules to align with security best practices and business requirements.</li>
<li>Conducted manual penetration testing to identify vulnerabilities not captured by automated tools.</li>
<li>Conduct a comprehensive review of existing firewall rules.</li>
<li>Optimize rules to align with security best practices and business requirements.</li>
<li>Created detailed network maps to visualize the topology, identify hosts, and understand the communication flows.</li>
</ul>
<h2 id="13-project-name-air-force-network-anomaly-detection-system-implementation" style="text-align: justify;"><strong>13.PROJECT NAME: AIR Force Network Anomaly Detection System Implementation</strong></h2>
<p style="text-align: justify;"><strong>Duration </strong><strong>                               : </strong>4 months</p>
<p style="text-align: justify;"><strong>Tools Used                     </strong><strong>:</strong> Maltrail IDS/IPS</p>
<p style="text-align: justify;"><strong>Client</strong><strong>                                       : </strong>Chennai</p>
<p style="text-align: justify;"><strong>Project Description:</strong></p>
<p style="text-align: justify;">This project involves implementing a robust network anomaly detection system. IDS and Wireshark for real-time network monitoring, integrate Elastic Stack for centralized logging and analysis, and establish proactive measures to detect and respond to abnormal network behavior.</p>
<p style="text-align: justify;"><strong>Roles and Responsibilities :</strong></p>
<ul style="text-align: justify;">
<li>Monitored and analyzed Maltrail alerts and events to identify potential security incidents.</li>
<li>Investigate anomalies and coordinate incident response efforts.</li>
<li>Monitor and manage network infrastructure in alignment with Maltrail&#8217;s detection capabilities.</li>
<li>Lead incident response efforts based on Maltrail alerts, conducting in-depth analysis to understand the nature and scope of security incidents.</li>
<li>Document incident response procedures and findings for future reference.</li>
</ul>
<h2 id="14-project-name-pgn-encrypted-network-design-and-implementation"><strong>14.PROJECT NAME: PGN Encrypted Network Design and Implementation</strong></h2>
<p style="text-align: justify;"><strong>Duration </strong><strong>                               : </strong>4 months</p>
<p style="text-align: justify;"><strong>Tools Used                     </strong><strong>:</strong> Wireshark &amp; Putty</p>
<p style="text-align: justify;"><strong>Client</strong><strong>                                       : </strong>Coimbatore</p>
<p style="text-align: justify;"><strong>Project Description:</strong></p>
<p style="text-align: justify;">The goal of this project is to design and implement a secure and resilient campus network infrastructure for Generous client. The network will cater to the diverse needs of faculty, staff, students, and guests, ensuring reliable connectivity, scalability, and robust security measures. The implementation will include wired and wireless networks, incorporating the latest technologies and best practices to create a modern and secure educational environment.</p>
<p style="text-align: justify;"><strong>Roles and Responsibilities :</strong></p>
<ul style="text-align: justify;">
<li style="text-align: justify;">Design and implement Virtual LANs (VLANs) to logically segment the network based on user roles and functions.</li>
<li style="text-align: justify;">Implemented proper VLAN configurations for faculty, staff, students, and guest networks to enhance network security.</li>
<li style="text-align: justify;">Implemented best practices for efficient routing and switching to minimize packet loss and ensure optimal data transfer.</li>
<li>Design and implement Virtual LANs (VLANs) to logically segment the network based on user roles and functions.</li>
<li>Implemented proper VLAN configurations for faculty, staff, students, and guest networks to enhance network security.</li>
</ul>
<p style="text-align: justify;"><strong> </strong></p>
<h2 id="15-project-name-flurys-network-intrusion-prevention-system-ips-deployment" style="text-align: justify;"><strong>15.PROJECT NAME: </strong><strong>Flurys </strong><strong>Network Intrusion Prevention System (IPS) Deployment</strong></h2>
<p style="text-align: justify;"><strong>Duration </strong><strong>                               : </strong>4 months</p>
<p style="text-align: justify;"><strong>Tools Used                     </strong><strong>:</strong> Maltrail IDS/IPS</p>
<p style="text-align: justify;"><strong>Client</strong><strong>                                       : </strong>Chennai</p>
<p style="text-align: justify;"><strong>Project Description:</strong></p>
<p style="text-align: justify;">This project involves implementing a robust network anomaly detection system. IDS and Wireshark for real-time network monitoring, integrate Elastic Stack for centralized logging and analysis, and establish proactive measures to detect and respond to abnormal network behavior.</p>
<p style="text-align: justify;"><strong>Roles and Responsibilities :</strong></p>
<ul>
<li style="text-align: justify;">Conduct in-depth threat analysis and design rulesets for Snort and Suricata.</li>
<li style="text-align: justify;">Collaborate with network administrators to integrate IPS solutions seamlessly.</li>
<li style="text-align: justify;">Monitored and analyzed Maltrail alerts and events to identify potential security incidents.</li>
<li style="text-align: justify;">Investigate anomalies and coordinate incident response efforts.</li>
</ul>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/networking-projects/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What are the criteria to check the network reliability ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-are-the-criteria-to-check-the-network-reliability/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-are-the-criteria-to-check-the-network-reliability/#respond</comments>
		
		<dc:creator><![CDATA[webmaster]]></dc:creator>
		<pubDate>Thu, 11 Aug 2022 11:11:02 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[how to check network reliability]]></category>
		<category><![CDATA[importance of network reliability]]></category>
		<category><![CDATA[network criteria]]></category>
		<category><![CDATA[Network reliability]]></category>
		<category><![CDATA[network reliability example]]></category>
		<category><![CDATA[what are the criteria to check the network reliability]]></category>
		<category><![CDATA[what are the criteria to check the network reliability in dcn]]></category>
		<category><![CDATA[what are the types of mode available in network]]></category>
		<category><![CDATA[what is link in computer network]]></category>
		<category><![CDATA[what is network reliability]]></category>
		<category><![CDATA[which are the different factors that affect the security of a network]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=4659</guid>

					<description><![CDATA[It is the ability of the network to carry out the desired operation through a network such as communication through a network. In network functionality it plays a significant role. The network monitoring systems and devices are the essential requirements for making the network reliable. The network devices ensure that data should reach the appropriate [&#8230;]]]></description>
										<content:encoded><![CDATA[<ul>
<li style="text-align: justify;">It is the ability of the network to carry out the desired operation through a network such as communication through a network.</li>
<li style="text-align: justify;">In network functionality it plays a significant role.</li>
<li style="text-align: justify;">The network monitoring systems and devices are the essential requirements for making the network reliable.</li>
<li style="text-align: justify;">The network devices ensure that data should reach the appropriate destination while network monitoring system identifies the problems that are occurred in the network.</li>
<li style="text-align: justify;">The reliability of a network can be measured by three following factors, they are:</li>
</ul>
<p style="text-align: justify;"><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-4660 aligncenter" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/what-is-network-reliability.png" alt="" width="1098" height="851" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/what-is-network-reliability.png 1098w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/what-is-network-reliability-300x233.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/what-is-network-reliability-1024x794.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/what-is-network-reliability-768x595.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/what-is-network-reliability-390x302.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/what-is-network-reliability-820x636.png 820w" sizes="(max-width: 1098px) 100vw, 1098px" /></p>
<h2 id="downtime" style="text-align: justify;">Downtime</h2>
<ul>
<li style="text-align: justify;">It is defined as the required time to recover.</li>
</ul>
<h2 id="failure-frequency" style="text-align: justify;">Failure Frequency</h2>
<ul>
<li style="text-align: justify;">It is defined as the frequency when it fails to work the way it is intended.</li>
</ul>
<h2 id="catastrophe" style="text-align: justify;">Catastrophe</h2>
<ul>
<li style="text-align: justify;">It indicates that the network has been attacked by some unexpected event such as earthquake, fire.</li>
</ul>
<p style="text-align: justify;">
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-are-the-criteria-to-check-the-network-reliability/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Computer Networking ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-computer-networking/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-computer-networking/#respond</comments>
		
		<dc:creator><![CDATA[webmaster]]></dc:creator>
		<pubDate>Thu, 11 Aug 2022 10:55:17 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[advantages of computer networking]]></category>
		<category><![CDATA[computer network example]]></category>
		<category><![CDATA[computer network is]]></category>
		<category><![CDATA[computer networking]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[network in computer]]></category>
		<category><![CDATA[networking]]></category>
		<category><![CDATA[networking computer]]></category>
		<category><![CDATA[networking in computer]]></category>
		<category><![CDATA[types of computer networking]]></category>
		<category><![CDATA[types of network]]></category>
		<category><![CDATA[types of networking]]></category>
		<category><![CDATA[types of networks]]></category>
		<category><![CDATA[uses of computer]]></category>
		<category><![CDATA[uses of computer network]]></category>
		<category><![CDATA[what is a computer network]]></category>
		<category><![CDATA[what is a network]]></category>
		<category><![CDATA[what is a network computer]]></category>
		<category><![CDATA[what is a network in computer]]></category>
		<category><![CDATA[what is computer network]]></category>
		<category><![CDATA[what is network]]></category>
		<category><![CDATA[what is networking]]></category>
		<category><![CDATA[what is networking and example]]></category>
		<category><![CDATA[what network]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=4656</guid>

					<description><![CDATA[A network is a set of devices that are connected either with cable or wireless connection. In network two or more networks are connected by one or more nodes or two or more nodes are connected by a physical link. It is a collection of devices connected to each other to allow the sharing of data. [&#8230;]]]></description>
										<content:encoded><![CDATA[<ul>
<li style="text-align: justify;">A network is a set of devices that are connected either with cable or wireless connection.</li>
<li style="text-align: justify;">In network two or more networks are connected by one or more nodes or two or more nodes are connected by a physical link.</li>
<li style="text-align: justify;">It is a collection of devices connected to each other to allow the sharing of data.</li>
<li style="text-align: justify;">For example, network is an internet, It connects the millions of peoples across the world.</li>
<li style="text-align: justify;">A network is mainly consisting of four types Local Area Network (LAN), Personal Area Network (PAN), Metropolitan Area Network (MAN), Wide Area Network (WAN).</li>
</ul>
<p style="text-align: justify;"><img decoding="async" class="alignnone size-full wp-image-4657" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/what-is-network.png" alt="" width="1234" height="913" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/what-is-network.png 1234w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/what-is-network-300x222.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/what-is-network-1024x758.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/what-is-network-768x568.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/what-is-network-390x289.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/what-is-network-820x607.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/what-is-network-1180x873.png 1180w" sizes="(max-width: 1234px) 100vw, 1234px" /></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-computer-networking/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Networking operating systems ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-networking-operating-systems/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-networking-operating-systems/#respond</comments>
		
		<dc:creator><![CDATA[webmaster]]></dc:creator>
		<pubDate>Thu, 11 Aug 2022 10:13:56 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[components of network operating system]]></category>
		<category><![CDATA[function of network operating system]]></category>
		<category><![CDATA[network operating system]]></category>
		<category><![CDATA[peer to peer network operating system]]></category>
		<category><![CDATA[types of network operating system]]></category>
		<category><![CDATA[what are the features of network operating system]]></category>
		<category><![CDATA[What is a Network Operating System ?]]></category>
		<category><![CDATA[What is a Network Operating System (NOS) ?]]></category>
		<category><![CDATA[what is the importance of network operating system]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=4652</guid>

					<description><![CDATA[It is an operating system that interface between the computer hardware and the user. Operating system includes the software and associated protocols to communicate with other autonomous computers via network cost-effectively and conveniently. Network Operating System resides on the top of the individual machines and individual machines are part of the Network have their operating [&#8230;]]]></description>
										<content:encoded><![CDATA[<ul>
<li style="text-align: justify;">It is an operating system that interface between the computer hardware and the user.</li>
<li style="text-align: justify;">Operating system includes the software and associated protocols to communicate with other autonomous computers via network cost-effectively and conveniently.</li>
<li style="text-align: justify;">Network Operating System resides on the top of the individual machines and individual machines are part of the Network have their operating system.</li>
<li style="text-align: justify;">Individual machines have their Operating System to access resources from other computers and they have to log into another machine using the correct password.</li>
<li style="text-align: justify;">This kind of Operating System presents numerous backup offerings and net offerings.</li>
<li style="text-align: justify;">It presents numerous functions inclusive of computerized hardware detection, guide for processors and guide multiprocessing of numerous.</li>
<li style="text-align: justify;">Network operating systems can be specialized serve as two types, they are Peer to Peer System and Client-Server System.</li>
<li style="text-align: justify;">Peer to Peer network operating system allow sharing resources and files with small-sized networks and having fewer resources and used on LAN.</li>
<li style="text-align: justify;">Client-server network operating system provide users access to resources through the central server and it is too expensive to maintain and implement.</li>
</ul>
<p style="text-align: justify;"><img decoding="async" class="alignnone size-full wp-image-4653" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-operating-system.png" alt="" width="989" height="889" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-operating-system.png 989w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-operating-system-300x270.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-operating-system-768x690.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-operating-system-390x351.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-operating-system-820x737.png 820w" sizes="(max-width: 989px) 100vw, 989px" /></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-networking-operating-systems/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Networking layer ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-networking-layer/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-networking-layer/#respond</comments>
		
		<dc:creator><![CDATA[webmaster]]></dc:creator>
		<pubDate>Thu, 11 Aug 2022 09:58:16 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[network layer]]></category>
		<category><![CDATA[network layer example]]></category>
		<category><![CDATA[network layer function]]></category>
		<category><![CDATA[network layer in computer networks]]></category>
		<category><![CDATA[network layer introduction]]></category>
		<category><![CDATA[network layer protocols]]></category>
		<category><![CDATA[network layer services]]></category>
		<category><![CDATA[three main functions of network layer]]></category>
		<category><![CDATA[what is network layer]]></category>
		<category><![CDATA[what is network layer in osi model]]></category>
		<category><![CDATA[what is osi model]]></category>
		<category><![CDATA[what is the network layer]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=4649</guid>

					<description><![CDATA[At OSI model Network Layer is the third layer. It handles the service requests from the transport layer and forward to the data link layer. It translates the logical address into physical address. It manages the traffic problems such as routing, switching and controls of data pockets and determines the route from the source to the [&#8230;]]]></description>
										<content:encoded><![CDATA[<ul>
<li style="text-align: justify;">At OSI model Network Layer is the third layer.</li>
<li style="text-align: justify;">It handles the service requests from the transport layer and forward to the data link layer.</li>
<li style="text-align: justify;">It translates the logical address into physical address.</li>
<li style="text-align: justify;">It manages the traffic problems such as routing, switching and controls of data pockets and determines the route from the source to the destination.</li>
<li style="text-align: justify;">Network Layers main role is to move the packets from sending host to the receiving host.</li>
<li style="text-align: justify;">The main functions performed by network layers are Routing, logical Addressing, Internetworking, Fragmentation.</li>
<li style="text-align: justify;">In Network Layer if packet reaches the router’s input link, the router will move the packets to the router&#8217;s output link.</li>
<li style="text-align: justify;">Logical addressing is also used to distinguish between destination and source system.</li>
<li style="text-align: justify;">In Network Layer Internetworking is the main role that provides the logical connection between different types of networks.</li>
<li style="text-align: justify;">Fragmentation is a process of breaking the packets into the smallest individual data units that travel through different networks.</li>
</ul>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4650" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-layer.png" alt="" width="1288" height="883" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-layer.png 1288w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-layer-300x206.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-layer-1024x702.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-layer-768x527.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-layer-390x267.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-layer-820x562.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-layer-1180x809.png 1180w" sizes="(max-width: 1288px) 100vw, 1288px" /></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-networking-layer/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Network Hub ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-network-hub/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-network-hub/#respond</comments>
		
		<dc:creator><![CDATA[webmaster]]></dc:creator>
		<pubDate>Thu, 11 Aug 2022 09:49:44 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[diagram of hub and switch]]></category>
		<category><![CDATA[diagram of hub in computer network]]></category>
		<category><![CDATA[function of hub in networking]]></category>
		<category><![CDATA[hub is a term used with]]></category>
		<category><![CDATA[network devices]]></category>
		<category><![CDATA[network hub vs switch]]></category>
		<category><![CDATA[switch in networking]]></category>
		<category><![CDATA[types of hub in computer network]]></category>
		<category><![CDATA[what is a hub in business]]></category>
		<category><![CDATA[what is hub]]></category>
		<category><![CDATA[what is hub in networking]]></category>
		<category><![CDATA[what is hub in networking and how it works]]></category>
		<category><![CDATA[what is hub in networking and its types]]></category>
		<category><![CDATA[what is hub switch and router in networking]]></category>
		<category><![CDATA[what is intelligent hub in networking]]></category>
		<category><![CDATA[what is networking hub]]></category>
		<category><![CDATA[what is the difference between a hub and a switch in networking]]></category>
		<category><![CDATA[what is the full form of hub in networking]]></category>
		<category><![CDATA[what is the function of hub in networking]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=4646</guid>

					<description><![CDATA[In Network hub is a common connection point, which is used for connection of devices. For all devices hub works as a central connection that are connected through a hub and it has a numerous port. It is able to see by all the segments of the network due to a packet is copied to [&#8230;]]]></description>
										<content:encoded><![CDATA[<ul>
<li style="text-align: justify;">In Network hub is a common connection point, which is used for connection of devices.</li>
<li style="text-align: justify;">For all devices hub works as a central connection that are connected through a hub and it has a numerous port.</li>
<li style="text-align: justify;">It is able to see by all the segments of the network due to a packet is copied to the other ports, if a packet reaches at one port.</li>
<li style="text-align: justify;">A network hub has no routing intelligence or tables which is used to send information and broadcast all network data across each and every connection.</li>
<li style="text-align: justify;">Most of the hubs can recognize network errors or troubles like collisions.</li>
<li style="text-align: justify;">Broadcasting all information to the several ports can be cause bottlenecks and a security risk.</li>
<li style="text-align: justify;">Compared to a switch or router, network hubs were popular in the past time as they were cheaper.</li>
<li style="text-align: justify;">There are three various types of hubs, they are Passive hub, Active hub, Intelligent hub.</li>
<li style="text-align: justify;">Passive hub is the connection point for wires that helps to make the physical network and it is capable of determining the faulty hardware and bugs.</li>
<li style="text-align: justify;">Active hub able to monitor the data sent to the connected devices and plays an important role between the connected devices with the help of store technology, where it checks the data to be sent and decides which packet to send first.</li>
<li style="text-align: justify;">In Network intelligent hub have some kinds of management software that help to analyze the problem and resolve them.</li>
</ul>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4647" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-hub.png" alt="" width="1239" height="575" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-hub.png 1239w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-hub-300x139.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-hub-1024x475.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-hub-768x356.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-hub-390x181.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-hub-820x381.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-hub-1180x548.png 1180w" sizes="(max-width: 1239px) 100vw, 1239px" /></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-network-hub/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Networking Rack ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-networking-rack/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-networking-rack/#respond</comments>
		
		<dc:creator><![CDATA[webmaster]]></dc:creator>
		<pubDate>Thu, 11 Aug 2022 09:41:47 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Basic Info on Network Racks]]></category>
		<category><![CDATA[ceiling mount network rack]]></category>
		<category><![CDATA[how to install network rack]]></category>
		<category><![CDATA[network rack]]></category>
		<category><![CDATA[network rack components]]></category>
		<category><![CDATA[network rack vs server rack]]></category>
		<category><![CDATA[Network Racks Explained]]></category>
		<category><![CDATA[types of server racks]]></category>
		<category><![CDATA[what is a rack computer]]></category>
		<category><![CDATA[what is a server rack networking]]></category>
		<category><![CDATA[What is a server rack?]]></category>
		<category><![CDATA[What is rack ?]]></category>
		<category><![CDATA[what is rack in networking]]></category>
		<category><![CDATA[what is racks]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=4643</guid>

					<description><![CDATA[It is a metal frame chassis that holds, organizes, stacks, protects and secures various computer network and server hardware devices. The rack works by securing technology with bolts, brackets and other rack hardware to keep this equipment in specific place. We can also mount this equipment using certain types of shelves and rails, such as [&#8230;]]]></description>
										<content:encoded><![CDATA[<ul>
<li style="text-align: justify;">It is a metal frame chassis that holds, organizes, stacks, protects and secures various computer network and server hardware devices.</li>
<li style="text-align: justify;">The rack works by securing technology with bolts, brackets and other rack hardware to keep this equipment in specific place.</li>
<li style="text-align: justify;">We can also mount this equipment using certain types of shelves and rails, such as switch shelves and switch rails.</li>
<li style="text-align: justify;">Network equipment is really like an umbrella term and encapsulates various kinds of technology.</li>
<li style="text-align: justify;">In this rack various devices can house a lot of different types of equipment, they are</li>
</ul>
<h2 id="switches" style="text-align: justify;">Switches</h2>
<ul style="text-align: justify;">
<li>In Local Area Network (LAN) multi-port, high-speed devices that receive data and redirect them to the correct destination.</li>
<li>Using switch only information can go across a single network.</li>
</ul>
<h2 id="routers" style="text-align: justify;">Routers</h2>
<ul style="text-align: justify;">
<li>Routers can receive and forward information, Similar to switches but they can carry data multiple networks.</li>
<li>This is why, different networks and devices can access the Internet using one single router.</li>
</ul>
<h2 id="modems" style="text-align: justify;"> Modems</h2>
<ul style="text-align: justify;">
<li>Actually, modem connects the source of your internet to your router and it is typically done using an ethernet cord.</li>
</ul>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4644 aligncenter" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-rack.png" alt="" width="1031" height="970" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-rack.png 1031w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-rack-300x282.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-rack-1024x963.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-rack-768x723.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-rack-390x367.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-rack-820x771.png 820w" sizes="(max-width: 1031px) 100vw, 1031px" /></p>
<p style="text-align: justify;">
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-networking-rack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Networking Gateway ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-networking-gateway/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-networking-gateway/#respond</comments>
		
		<dc:creator><![CDATA[webmaster]]></dc:creator>
		<pubDate>Thu, 11 Aug 2022 08:57:46 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[difference between router and gateway]]></category>
		<category><![CDATA[example of gateway in networking]]></category>
		<category><![CDATA[network gateway device]]></category>
		<category><![CDATA[types of gateway in computer network]]></category>
		<category><![CDATA[what are gateways in computer network]]></category>
		<category><![CDATA[what is a gateway]]></category>
		<category><![CDATA[what is a network gateway]]></category>
		<category><![CDATA[what is border gateway protocol in networking]]></category>
		<category><![CDATA[what is default gateway in networking]]></category>
		<category><![CDATA[what is gateway in networking]]></category>
		<category><![CDATA[what is gateway in networking and how it works]]></category>
		<category><![CDATA[what is gateway ip]]></category>
		<category><![CDATA[what is gateway ip in networking]]></category>
		<category><![CDATA[what is gateway setting in networking]]></category>
		<category><![CDATA[what is meant by gateway in networking]]></category>
		<category><![CDATA[what is the function of gateway in networking]]></category>
		<category><![CDATA[what is the role of gateway in computer network]]></category>
		<category><![CDATA[what is the use of gateway in networking]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=4640</guid>

					<description><![CDATA[A network node forms a passage between the internet and router with different transmission protocols. In higher-level companies, the computer systems that deal with the traffic between enterprise networks are named gateway nodes. It manages all data that inflows or outflows from that network, and it is located at the boundary of a network. In [&#8230;]]]></description>
										<content:encoded><![CDATA[<ul>
<li style="text-align: justify;">A network node forms a passage between the internet and router with different transmission protocols.</li>
<li style="text-align: justify;">In higher-level companies, the computer systems that deal with the traffic between enterprise networks are named gateway nodes.</li>
<li style="text-align: justify;">It manages all data that inflows or outflows from that network, and it is located at the boundary of a network.</li>
<li style="text-align: justify;">In two different networks, the gateway operates as a protocol converter, providing compatibility between the different protocols used.</li>
<li style="text-align: justify;">There are two categories of gateways in Network, they are Unidirectional gateways and Bidirectional gateways.</li>
<li style="text-align: justify;">Unidirectional gateways can be used as archiving tools and allow data to flow in only one direction. Changes in the source node are replicated in the destination node, but not vice versa.</li>
<li style="text-align: justify;">A bidirectional gateway is used as a synchronization tool and allows data to flow in both directions.</li>
</ul>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4641 aligncenter" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-gateway.png" alt="" width="929" height="752" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-gateway.png 929w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-gateway-300x243.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-gateway-768x622.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-gateway-390x316.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-gateway-820x664.png 820w" sizes="(max-width: 929px) 100vw, 929px" /></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-networking-gateway/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Network topology ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-network-topology/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-network-topology/#respond</comments>
		
		<dc:creator><![CDATA[webmaster]]></dc:creator>
		<pubDate>Wed, 10 Aug 2022 12:09:07 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[bus network topology]]></category>
		<category><![CDATA[bus topology]]></category>
		<category><![CDATA[computer network topologies]]></category>
		<category><![CDATA[define network topology]]></category>
		<category><![CDATA[mesh network topology]]></category>
		<category><![CDATA[network physical topology]]></category>
		<category><![CDATA[network topology]]></category>
		<category><![CDATA[network topology definition]]></category>
		<category><![CDATA[network topology diagram]]></category>
		<category><![CDATA[network topology types]]></category>
		<category><![CDATA[star network topologies]]></category>
		<category><![CDATA[star network topology]]></category>
		<category><![CDATA[tree network topology]]></category>
		<category><![CDATA[types of network topology]]></category>
		<category><![CDATA[what are the 5 network topologies]]></category>
		<category><![CDATA[what is network topology]]></category>
		<category><![CDATA[what is network topology and its types]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=4631</guid>

					<description><![CDATA[It is the arrangement with which computer network devices or systems are connected to each other. The topologies divided into two types they are physical and logical topology. It can be also simply defined as a schematic description of a network’s elements’ arrangement. Physical network topology illustrates the physical connections within your network while logical network [&#8230;]]]></description>
										<content:encoded><![CDATA[<ul>
<li style="text-align: justify;">It is the arrangement with which computer network devices or systems are connected to each other.</li>
<li style="text-align: justify;">The topologies divided into two types they are physical and logical topology.</li>
<li style="text-align: justify;">It can be also simply defined as a schematic description of a network’s elements’ arrangement.</li>
<li style="text-align: justify;">Physical network topology illustrates the physical connections within your network while logical network topology illustrates how data flows between your network’s devices, such as its computers and cables.</li>
<li style="text-align: justify;">Visual diagrams can be used to represent physical and logical topologies, depending on your needs—either can be useful for understanding your network and its layout.</li>
<li style="text-align: justify;">There are several types of network topology, they are</li>
</ul>
<ol style="text-align: justify;">
<li style="list-style-type: none;">
<ol>
<li>Bus topology</li>
<li>Ring topology</li>
<li>Tree topology</li>
<li>Star topology</li>
<li>Mesh topology</li>
<li>Hybrid topology</li>
</ol>
</li>
</ol>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4632" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/types-of-network-topology.png" alt="" width="1446" height="398" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/types-of-network-topology.png 1446w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/types-of-network-topology-300x83.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/types-of-network-topology-1024x282.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/types-of-network-topology-768x211.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/types-of-network-topology-390x107.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/types-of-network-topology-820x226.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/types-of-network-topology-1180x325.png 1180w" sizes="(max-width: 1446px) 100vw, 1446px" /></p>
<h2 id="bus-topology" style="text-align: justify;">Bus topology</h2>
<ul style="text-align: justify;">
<li>In network it consists of one continuous length of cable that is shared by all the nodes.</li>
<li>At each end it has a terminating resistor that absorbs the signal when it reaches the end of line.</li>
</ul>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="size-full wp-image-4633 aligncenter" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/bus-topology.png" alt="" width="1155" height="522" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/bus-topology.png 1155w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/bus-topology-300x136.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/bus-topology-1024x463.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/bus-topology-768x347.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/bus-topology-390x176.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/bus-topology-820x371.png 820w" sizes="(max-width: 1155px) 100vw, 1155px" /></p>
<h2 id="ring-topology" style="text-align: justify;">Ring topology</h2>
<ul style="text-align: justify;">
<li>In this topology each node has two neighboring nodes.</li>
<li>From one neighboring data packet is received and transmitted to the next.</li>
<li>The data travels like ring structure in one direction so that it is called as ring topology.</li>
</ul>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4634" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/ring-topology.png" alt="" width="1153" height="739" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/ring-topology.png 1153w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/ring-topology-300x192.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/ring-topology-1024x656.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/ring-topology-768x492.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/ring-topology-390x250.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/ring-topology-820x526.png 820w" sizes="(max-width: 1153px) 100vw, 1153px" /></p>
<h2 id="star-topology" style="text-align: justify;">Star topology</h2>
<ul style="text-align: justify;">
<li>Directly each node connected to a central network hub or concentrator.</li>
<li>Before continuing data passes through hub or concentrator.</li>
<li>All functions of network control and managed by hub or concentrator.</li>
</ul>
<p style="text-align: justify;">     <img loading="lazy" decoding="async" class="alignnone size-full wp-image-4635" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/star-topology.png" alt="" width="1152" height="859" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/star-topology.png 1152w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/star-topology-300x225.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/star-topology-1024x764.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/star-topology-768x573.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/star-topology-240x180.png 240w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/star-topology-390x291.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/star-topology-820x611.png 820w" sizes="(max-width: 1152px) 100vw, 1152px" /></p>
<h2 id="tree-topology" style="text-align: justify;">Tree topology</h2>
<ul style="text-align: justify;">
<li>This type topology combines the characteristics of linear Star and Bus topology. It inverted like tree structure.</li>
<li>It consists of groups of star-configured workstations connected to a linear bus backbone cable.</li>
</ul>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="size-full wp-image-4636 aligncenter" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/tree-topology.png" alt="" width="1150" height="634" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/tree-topology.png 1150w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/tree-topology-300x165.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/tree-topology-1024x565.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/tree-topology-768x423.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/tree-topology-390x215.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/tree-topology-820x452.png 820w" sizes="(max-width: 1150px) 100vw, 1150px" /></p>
<h2 id="mesh-topology" style="text-align: justify;">Mesh topology</h2>
<ul style="text-align: justify;">
<li>In mesh topology each computer is connected to another computer through network.</li>
<li>This topology has hosts which are in point-to-point connection to few hosts only or hosts in point-to-point connection with every other host.</li>
</ul>
<p style="text-align: justify;">      <img loading="lazy" decoding="async" class="alignnone size-full wp-image-4637" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/mesh-topology.png" alt="" width="1135" height="744" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/mesh-topology.png 1135w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/mesh-topology-300x197.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/mesh-topology-1024x671.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/mesh-topology-768x503.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/mesh-topology-390x256.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/mesh-topology-820x538.png 820w" sizes="(max-width: 1135px) 100vw, 1135px" /></p>
<h2 id="hybrid-topology" style="text-align: justify;">Hybrid topology</h2>
<ul style="text-align: justify;">
<li>It is an integration of two or more different topologies to form a resultant topology.</li>
<li>Hybrid topology inherits demerits and merits of all incorporating topologies.</li>
<li>The combining topologies may contain attributes of Ring, Star, Daisy-chain and Bus topologies.</li>
</ul>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="size-full wp-image-4638 aligncenter" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/hybrid-topology.png" alt="" width="1122" height="837" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/hybrid-topology.png 1122w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/hybrid-topology-300x225.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/hybrid-topology-1024x764.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/hybrid-topology-768x573.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/hybrid-topology-240x180.png 240w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/hybrid-topology-390x291.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/hybrid-topology-820x612.png 820w" sizes="(max-width: 1122px) 100vw, 1122px" /></p>
<p style="text-align: justify;">
<p style="text-align: justify;">
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-network-topology/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is RIP ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-rip/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-rip/#respond</comments>
		
		<dc:creator><![CDATA[webmaster]]></dc:creator>
		<pubDate>Tue, 09 Aug 2022 12:45:54 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[how rip works]]></category>
		<category><![CDATA[how routing information protocol works]]></category>
		<category><![CDATA[rip and ospf in computer networks]]></category>
		<category><![CDATA[rip computer networking]]></category>
		<category><![CDATA[rip protocol]]></category>
		<category><![CDATA[Routing information protocol]]></category>
		<category><![CDATA[what is eigrp in networking]]></category>
		<category><![CDATA[what is ospf in networking]]></category>
		<category><![CDATA[what is rip]]></category>
		<category><![CDATA[what is rip protocol and how it works]]></category>
		<category><![CDATA[what is routing information protocol]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=4627</guid>

					<description><![CDATA[RIP- Routing Information Protocol. RIP is dynamic routing protocol that uses hop count as a routing metric to find the best path between the designation and the source network. It works on the network layer of the OSI model and a distance-vector routing protocol that has an AD value of 120. Routing Information Protocol uses [&#8230;]]]></description>
										<content:encoded><![CDATA[<ul>
<li style="text-align: justify;">RIP- Routing Information Protocol.</li>
<li style="text-align: justify;">RIP is dynamic routing protocol that uses hop count as a routing metric to find the best path between the designation and the source network.</li>
<li style="text-align: justify;">It works on the network layer of the OSI model and a distance-vector routing protocol that has an AD value of 120.</li>
<li style="text-align: justify;">Routing Information Protocol uses port number 250.</li>
<li style="text-align: justify;">It updates of the network are exchanged periodically and routing information are always broadcast.</li>
<li style="text-align: justify;">Routers always trust routing information received from neighbor routers; hence it is known as Routing on<em> </em></li>
<li style="text-align: justify;">There are three types of version routing information protocol they are, RIP version1, RIP version2, RIPng.</li>
<li style="text-align: justify;">RIP Version1 is also known as classful routing protocol because it doesn’t support authentication of updated messages.</li>
<li style="text-align: justify;">RIP Version2 is also known as classless routing protocol it sends information of subnet mask in its routing update.</li>
<li style="text-align: justify;">RIPng is classless updates are sent.</li>
</ul>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4628 aligncenter" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/routing-information-protocol.png" alt="" width="1333" height="636" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/routing-information-protocol.png 1333w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/routing-information-protocol-300x143.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/routing-information-protocol-1024x489.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/routing-information-protocol-768x366.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/routing-information-protocol-390x186.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/routing-information-protocol-820x391.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/routing-information-protocol-1180x563.png 1180w" sizes="(max-width: 1333px) 100vw, 1333px" /></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-rip/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is NIC ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-nic/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-nic/#respond</comments>
		
		<dc:creator><![CDATA[webmaster]]></dc:creator>
		<pubDate>Tue, 09 Aug 2022 12:12:52 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[full form of nic in computer]]></category>
		<category><![CDATA[network card]]></category>
		<category><![CDATA[network cards]]></category>
		<category><![CDATA[network interface card]]></category>
		<category><![CDATA[Network Interface Card (NIC)]]></category>
		<category><![CDATA[Network Interface Card Types & Function]]></category>
		<category><![CDATA[nic card]]></category>
		<category><![CDATA[nic full form in computer]]></category>
		<category><![CDATA[nic means]]></category>
		<category><![CDATA[nic stands for]]></category>
		<category><![CDATA[nics in networking]]></category>
		<category><![CDATA[What is a network interface card (NIC)?]]></category>
		<category><![CDATA[What is a NIC Card (Network Interface Card)?]]></category>
		<category><![CDATA[What is network interface card (NIC)?]]></category>
		<category><![CDATA[which is the most commonly used network card]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=4624</guid>

					<description><![CDATA[NIC- Network Interface Card. It is a hardware component that is present on the computer. It is used to connect different networking devicessuch as servers and computers to share data over the connected network. It provides functionality such as support for Direct Memory Access (DMA) interfaces, I/O interrupt, data transmission and partioning. Through network NIC is [&#8230;]]]></description>
										<content:encoded><![CDATA[<ul>
<li style="text-align: justify;">NIC- Network Interface Card.</li>
<li style="text-align: justify;">It is a hardware component that is present on the computer.</li>
<li style="text-align: justify;">It is used to connect <strong>different networking devices</strong>such as servers and computers to share data over the connected network.</li>
<li style="text-align: justify;">It provides functionality such as support for Direct Memory Access (DMA) interfaces, I/O interrupt, data transmission and partioning.</li>
<li style="text-align: justify;">Through network NIC is important for us to establish a wired or wireless connection.</li>
<li style="text-align: justify;">Network Interface Card is also known as <strong>Network Adapter, Connection card</strong><strong>, </strong><strong>Network Interface Controller, Ethernet card and Local Area Network adapter.</strong></li>
<li style="text-align: justify;">Network Interface Card is used to convert data into digital signal.</li>
<li style="text-align: justify;">Network Interface Card uses the network layer to transmit data packets and the physical layer to transmit signals in Open System Interconnections (OSI).</li>
<li style="text-align: justify;">It offers both Wireless and Wire data communication techniques.</li>
</ul>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4625" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/network-interface-card.png" alt="" width="1358" height="672" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/network-interface-card.png 1358w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/network-interface-card-300x148.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/network-interface-card-1024x507.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/network-interface-card-768x380.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/network-interface-card-390x193.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/network-interface-card-820x406.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/network-interface-card-1180x584.png 1180w" sizes="(max-width: 1358px) 100vw, 1358px" /></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-nic/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is bandwidth ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-bandwidth/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-bandwidth/#respond</comments>
		
		<dc:creator><![CDATA[webmaster]]></dc:creator>
		<pubDate>Tue, 09 Aug 2022 12:05:11 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[bandwidth]]></category>
		<category><![CDATA[bandwidth definition]]></category>
		<category><![CDATA[bandwidth example]]></category>
		<category><![CDATA[bandwidth internet]]></category>
		<category><![CDATA[bandwidth meaning]]></category>
		<category><![CDATA[bandwidth network]]></category>
		<category><![CDATA[define bandwidth]]></category>
		<category><![CDATA[definition bandwidth]]></category>
		<category><![CDATA[internet bandwidth]]></category>
		<category><![CDATA[network bandwidth]]></category>
		<category><![CDATA[types of bandwidth]]></category>
		<category><![CDATA[what is bandwidth]]></category>
		<category><![CDATA[what is bandwidth in networking]]></category>
		<category><![CDATA[what is bandwidth in wifi]]></category>
		<category><![CDATA[what is network bandwidth]]></category>
		<category><![CDATA[What is network bandwidth and how is it measured?]]></category>
		<category><![CDATA[what is the meaning of bandwidth in network?]]></category>
		<category><![CDATA[what is the network bandwidth]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=4621</guid>

					<description><![CDATA[It is used to measure the maximum capacity of a wired or wireless communications link to transmit data over a network connection in a given amount of time. Every signal has a limit of lower range frequency and upper range frequency. Bandwidth is typically represented in the number of bits, kilobits, gigabits or megabits that [&#8230;]]]></description>
										<content:encoded><![CDATA[<ul>
<li style="text-align: justify;">It is used to measure the maximum capacity of a wired or wireless communications link to transmit data over a network connection in a given amount of time.</li>
<li style="text-align: justify;">Every signal has a limit of lower range frequency and upper range frequency.</li>
<li style="text-align: justify;">Bandwidth is typically represented in the number of bits, kilobits, gigabits or megabits that can be transmitted in 1 second.</li>
<li style="text-align: justify;">It is typically done using firmware or software and a network interface.</li>
<li style="text-align: justify;">Bandwidth commonly measures utilities include the Test TCP utility (TTCP) and PRTG Network Monitor.</li>
<li style="text-align: justify;">In this utilities TTCP measures throughput on an IP network between two hosts and PRTG can measure traffic between different interfaces then provides a graphical interface and charts for measuring bandwidth trends over longer periods of time.</li>
<li style="text-align: justify;">To measure the bandwidth by the total traffic sent and received across a specific period of time is counted.</li>
<li style="text-align: justify;">It is usually measured in bits transferred per second through a link or path.</li>
<li style="text-align: justify;">There are common units bandwidth are as follows Bits Per Second(BPS), Megabits Per Second (MBPS), Gigabits Per Second (GBPS).</li>
</ul>
<p style="text-align: justify;">  <img loading="lazy" decoding="async" class="alignnone size-full wp-image-4622" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/what-is-bandwidth.png" alt="" width="1182" height="720" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/what-is-bandwidth.png 1182w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/what-is-bandwidth-300x183.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/what-is-bandwidth-1024x624.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/what-is-bandwidth-768x468.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/what-is-bandwidth-390x238.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/what-is-bandwidth-820x499.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/what-is-bandwidth-1180x719.png 1180w" sizes="(max-width: 1182px) 100vw, 1182px" /></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-bandwidth/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is DNS ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-dns/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-dns/#respond</comments>
		
		<dc:creator><![CDATA[webmaster]]></dc:creator>
		<pubDate>Tue, 09 Aug 2022 11:48:11 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[dns example]]></category>
		<category><![CDATA[dns full form dns server]]></category>
		<category><![CDATA[Domain Name System]]></category>
		<category><![CDATA[how a dns server works]]></category>
		<category><![CDATA[what dns server what is a dns server]]></category>
		<category><![CDATA[what is a dns]]></category>
		<category><![CDATA[what is dns]]></category>
		<category><![CDATA[what is dns and how it works]]></category>
		<category><![CDATA[what is dns in computer network]]></category>
		<category><![CDATA[what is dns settings]]></category>
		<category><![CDATA[what is the dns server]]></category>
		<category><![CDATA[what the dns]]></category>
		<category><![CDATA[what's my dns what is dns server]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=4618</guid>

					<description><![CDATA[DNS- Domain Name Server. In 1983 Domain Name Server was introduced by Paul Mockapetris and Jon Postell. Through internet it is a naming system for all the resources which includes physical nodes and applications. It is used to locate the resource through network easily. Domain Name Serveris an internet which maps the domain names to [&#8230;]]]></description>
										<content:encoded><![CDATA[<ul>
<li style="text-align: justify;">DNS- Domain Name Server.</li>
<li style="text-align: justify;">In 1983 Domain Name Server was introduced by Paul Mockapetris and Jon Postell.</li>
<li style="text-align: justify;">Through internet it is a naming system for all the resources which includes physical nodes and applications.</li>
<li style="text-align: justify;">It is used to locate the resource through network easily.</li>
<li style="text-align: justify;">Domain Name Serveris an internet which maps the domain names to their associated IP addresses.</li>
<li style="text-align: justify;">Without Domain Name Server, users must know the IP address of the web page that you wanted to access.</li>
<li style="text-align: justify;">If we want to visit particular website, then the user will type the website into the address bar of the web browser.</li>
<li style="text-align: justify;">Once the domain name is entered, then the domain system will translate the domain name into the IP address which can be easily interpreted by the computer.</li>
<li style="text-align: justify;">The computer can locate the web page requested by the user, by using the IP address.</li>
<li style="text-align: justify;">In Domain Name Server there are four servers work with each other to get the correct IP address to the client.</li>
<li style="text-align: justify;">They are DNS recursor, Root nameservers, TLD nameservers, Authoritative nameservers.</li>
<li style="text-align: justify;">DNS recursor also known as DNS resolver which receives the query from the DNS client and communicates with other DNS servers to find the right IP address.</li>
<li style="text-align: justify;">Root nameservers answers requests by sending back a list of the authoritative nameservers that go with the correct Top-level Domain.</li>
<li style="text-align: justify;">Top-level Domain nameserver keeps the IP address of the second-level domain contained within the TLD name then it releases the website’s IP address and sends the query to the domain’s nameserver.</li>
<li style="text-align: justify;">Authoritative nameserver gives you the real answer to your Domain Name Server query.</li>
</ul>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4619" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/domain-name-server.png" alt="" width="1417" height="714" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/domain-name-server.png 1417w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/domain-name-server-300x151.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/domain-name-server-1024x516.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/domain-name-server-768x387.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/domain-name-server-390x197.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/domain-name-server-820x413.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/domain-name-server-1180x595.png 1180w" sizes="(max-width: 1417px) 100vw, 1417px" /></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-dns/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Network Security ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-network-security/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-network-security/#respond</comments>
		
		<dc:creator><![CDATA[webmaster]]></dc:creator>
		<pubDate>Tue, 09 Aug 2022 11:36:23 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[examples of network security]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[network security notes]]></category>
		<category><![CDATA[types of network security]]></category>
		<category><![CDATA[What Is Network Security ?]]></category>
		<category><![CDATA[what is network security and why is network security necessary]]></category>
		<category><![CDATA[what is network security architecture]]></category>
		<category><![CDATA[what is network security group]]></category>
		<category><![CDATA[what is network security group in azure]]></category>
		<category><![CDATA[what is network security in computer network]]></category>
		<category><![CDATA[what is network security in cryptography]]></category>
		<category><![CDATA[what is network security key]]></category>
		<category><![CDATA[what is network security key for hotspot]]></category>
		<category><![CDATA[what is network security key for hp printer]]></category>
		<category><![CDATA[what is network security key in laptop]]></category>
		<category><![CDATA[what is network security key on router]]></category>
		<category><![CDATA[what is network security policy]]></category>
		<category><![CDATA[what is network security threats]]></category>
		<category><![CDATA[whats is network security key]]></category>
		<category><![CDATA[why is network security important]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=4615</guid>

					<description><![CDATA[It is the security provided to a network from unauthorized access and risks. The duty of network administrators is to adopt preventive measures to protect their networks from potential security threats. Computer networks are involved in regular communication and transactions within the individuals, government, or business require security. The simple way of protecting a network [&#8230;]]]></description>
										<content:encoded><![CDATA[<ul>
<li>It is the security provided to a network from unauthorized access and risks.</li>
<li>The duty of network administrators is to adopt preventive measures to protect their networks from potential security threats.</li>
<li>Computer networks are involved in regular communication and transactions within the individuals, government, or business require security.</li>
<li>The simple way of protecting a network resource is by assigning it a unique name and a corresponding password.</li>
<li>There are three types of network security, they are:
<ul>
<li>Access Control</li>
<li>Antivirus and Anti-malware Software</li>
<li>Cloud Security</li>
</ul>
</li>
</ul>
<p><img loading="lazy" decoding="async" class="size-full wp-image-4616 aligncenter" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/network-security.png" alt="" width="1243" height="825" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/network-security.png 1243w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/network-security-300x199.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/network-security-1024x680.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/network-security-768x510.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/network-security-390x259.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/network-security-820x544.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/network-security-1180x783.png 1180w" sizes="(max-width: 1243px) 100vw, 1243px" /></p>
<h2 id="access-control">Access Control</h2>
<ul>
<li>Not every person having complete allowance to accessibility the network or its data.</li>
<li>Network Access Control ensures that only a handful of authorized personnel must be able to work with allowed number of resources.</li>
</ul>
<h2 id="antivirus-and-anti-malware-software">Antivirus and Anti-malware Software</h2>
<ul>
<li>Antivirus is the network security that ensures any malicious software does not enter the network and jeopardize the security of the data.</li>
<li>Malicious software like Trojans, Worms, Viruses are handled by the same.</li>
<li>This ensure that not only the entry of the malware is protected but also that the system is well equipped to fight once it has entered.</li>
</ul>
<h2 id="cloud-security">Cloud Security</h2>
<ul>
<li>Using internet many organizations are joining hands wuth the cloud security technology where a large amount of important data is stored.</li>
<li>Cloud Security is very vulnerable to the mal practices that few unauthorized dealers might pertain.</li>
<li>Many businesses embrace using Software as a Service (SaaS) application for providing some of its employees the allowance of accessing the data stored over the cloud.</li>
</ul>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-network-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is APIPA ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-apipa/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-apipa/#respond</comments>
		
		<dc:creator><![CDATA[webmaster]]></dc:creator>
		<pubDate>Tue, 09 Aug 2022 11:26:18 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[169 254 apipa]]></category>
		<category><![CDATA[apipa resolution]]></category>
		<category><![CDATA[apipa troubleshooting]]></category>
		<category><![CDATA[apipa vs dhcp]]></category>
		<category><![CDATA[Definition of APIPA]]></category>
		<category><![CDATA[is apipa routable]]></category>
		<category><![CDATA[What is APIPA ?]]></category>
		<category><![CDATA[what is apipa 169 ip address]]></category>
		<category><![CDATA[what is apipa address]]></category>
		<category><![CDATA[what is apipa address range]]></category>
		<category><![CDATA[what is apipa and how is it configured]]></category>
		<category><![CDATA[what is apipa how would you recognize it]]></category>
		<category><![CDATA[what is apipa in packet tracer]]></category>
		<category><![CDATA[what is apipa ip address]]></category>
		<category><![CDATA[what is apipa range]]></category>
		<category><![CDATA[What is Automatic Private IP Addressing (APIPA) ?]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=4611</guid>

					<description><![CDATA[APIPA- Automatic Private IP Addressing. It is a feature or characteristic in operating systems like windows which enables computers to self-configure an IP address and subnet mask automatically when their Dynamic Host Configuration Protocol (DHCP) server isn’t reachable. APIPAs IP address is (169.254.0.1 to 169.254.255.254) having 65,534 usable IP addresses, with the subnet mask of [&#8230;]]]></description>
										<content:encoded><![CDATA[<ul>
<li style="text-align: justify;">APIPA- Automatic Private IP Addressing.</li>
<li style="text-align: justify;">It is a feature or characteristic in operating systems like windows which enables computers to self-configure an IP address and subnet mask automatically when their Dynamic Host Configuration Protocol (DHCP) server isn’t reachable.</li>
<li style="text-align: justify;">APIPAs IP address is <strong>(169.254.0.1 to 169.254.255.254)</strong> having 65,534 usable IP addresses, with the subnet mask of 255.255.0.0.</li>
<li style="text-align: justify;">Internet Engineering Task Force (IETF) has initially reserved the IPV4 address block <strong>254.0.0/16 (169.254.0.0 – 169.254.255.255)</strong> for link-local addressing.</li>
<li style="text-align: justify;">From DHCP server the link-local addresses are allocated to interface in nature such that communication will be established while not getting a response.</li>
<li style="text-align: justify;">Then Microsoft refers to this address autoconfiguration method as Automatic Private IP Addressing (APIPA).</li>
<li style="text-align: justify;">The Automatic Private IP Address (APIPA) provides the configuration to check for the presence of a DHCP server in every five minutes, stated by Microsoft).</li>
<li style="text-align: justify;">At network configuration area if APIPA detects a DHCP server, it stops and let run the DHCP server that replaces APIPA with dynamically allocated addresses.</li>
</ul>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4613 aligncenter" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/automatic-private-ip-address.png" alt="" width="885" height="664" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/automatic-private-ip-address.png 885w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/automatic-private-ip-address-300x225.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/automatic-private-ip-address-768x576.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/automatic-private-ip-address-240x180.png 240w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/automatic-private-ip-address-390x293.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/automatic-private-ip-address-820x615.png 820w" sizes="(max-width: 885px) 100vw, 885px" /></p>
<p style="text-align: justify;">
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-apipa/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What are the types of networking ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-are-the-types-of-networking/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-are-the-types-of-networking/#respond</comments>
		
		<dc:creator><![CDATA[webmaster]]></dc:creator>
		<pubDate>Tue, 09 Aug 2022 10:56:41 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[types of computer networking]]></category>
		<category><![CDATA[types of network]]></category>
		<category><![CDATA[types of network topology]]></category>
		<category><![CDATA[what are the 4 types of networks]]></category>
		<category><![CDATA[what are the 4 types of switches in networking]]></category>
		<category><![CDATA[what are the different types of networking]]></category>
		<category><![CDATA[what are the four types of cloud networking]]></category>
		<category><![CDATA[what are the types of networking]]></category>
		<category><![CDATA[what are the types of networking according to management method]]></category>
		<category><![CDATA[what are the types of networking according to range / area]]></category>
		<category><![CDATA[what are the types of networking cables]]></category>
		<category><![CDATA[what are the types of networking devices]]></category>
		<category><![CDATA[what are the types of networking models]]></category>
		<category><![CDATA[what are the types of networking protocols]]></category>
		<category><![CDATA[what is computer networking]]></category>
		<category><![CDATA[what is networking]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=4603</guid>

					<description><![CDATA[Network is a group of computers linked to each other that enables the computer to communicate with another computer and share their data, applications and resources. By their size network can be categorized. Network is mainly consisting of four types, they are LAN- Local Area Network PAN- Personal Area Network MAN- Metropolitan Area Network WAN- Wide [&#8230;]]]></description>
										<content:encoded><![CDATA[<ul>
<li style="text-align: justify;">Network is a group of computers linked to each other that enables the computer to communicate with another computer and share their data, applications and resources.</li>
<li style="text-align: justify;">By their size network can be categorized.</li>
<li style="text-align: justify;">Network is mainly consisting of four types, they are
<ul>
<li>LAN- Local Area Network</li>
<li>PAN- Personal Area Network</li>
<li>MAN- Metropolitan Area Network</li>
<li>WAN- Wide Area Network</li>
</ul>
</li>
</ul>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4604" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/types-of-networking.png" alt="" width="1086" height="542" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/types-of-networking.png 1086w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/types-of-networking-300x150.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/types-of-networking-1024x511.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/types-of-networking-768x383.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/types-of-networking-390x195.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/types-of-networking-820x409.png 820w" sizes="(max-width: 1086px) 100vw, 1086px" /></p>
<h2 id="lan-local-area-network" style="text-align: justify;">LAN-Local Area Network</h2>
<ul style="text-align: justify;">
<li>LAN is a group of computers connected to each other in a small area such as house, office, buildings.</li>
<li>Local Area Network is used for connecting two or more personal computers through a communication medium such as coaxial cable, twisted pair, etc.</li>
<li>Its cost is less as it is built with inexpensive hardware such as network adapters, hubs, and ethernet cables.</li>
<li>In LAN data is transferred at an extremely faster rate and provides higher security.</li>
</ul>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4608" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/local-area-network.jpeg" alt="" width="825" height="504" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/local-area-network.jpeg 825w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/local-area-network-300x183.jpeg 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/local-area-network-768x469.jpeg 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/local-area-network-390x238.jpeg 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/local-area-network-820x501.jpeg 820w" sizes="(max-width: 825px) 100vw, 825px" /></p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4606" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/wan-network.png" alt="" width="1603" height="670" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/wan-network.png 1603w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/wan-network-300x125.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/wan-network-1024x428.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/wan-network-768x321.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/wan-network-1536x642.png 1536w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/wan-network-390x163.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/wan-network-820x343.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/wan-network-1180x493.png 1180w" sizes="(max-width: 1603px) 100vw, 1603px" /></p>
<h2 id="pan-personal-area-network" style="text-align: justify;">PAN-Personal Area Network</h2>
<ul style="text-align: justify;">
<li>PAN is a network arranged within an individual person, typically within a range of 10 meters.</li>
<li>PAN is used for connecting the computer devices of personal use.</li>
<li>Personal computer devices are used to develop the personal area network are the media player, laptop, play stations and mobile phones and it covers an area of <strong>30 feet</strong>.</li>
</ul>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4607" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/personal-area-network.jpg" alt="" width="1184" height="990" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/personal-area-network.jpg 1184w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/personal-area-network-300x251.jpg 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/personal-area-network-1024x856.jpg 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/personal-area-network-768x642.jpg 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/personal-area-network-390x326.jpg 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/personal-area-network-820x686.jpg 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/personal-area-network-1180x987.jpg 1180w" sizes="(max-width: 1184px) 100vw, 1184px" /></p>
<h2 id="man-metropolitan-area-network" style="text-align: justify;">MAN-Metropolitan Area Network</h2>
<ul style="text-align: justify;">
<li>MAN is a network that covers a larger geographic area by interconnecting a different LAN to form a larger network.</li>
<li>MAN is used by government agencies to connect to the private industries and citizens.</li>
<li>It is higher range than LAN and most widely used protocols are ATM, ADSL, Frame Relay, RS-232, OC-3, etc.</li>
</ul>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4605 aligncenter" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/man-network.jpg" alt="" width="578" height="332" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/man-network.jpg 578w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/man-network-300x172.jpg 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/man-network-390x224.jpg 390w" sizes="(max-width: 578px) 100vw, 578px" /></p>
<h2 id="wan-wide-area-network" style="text-align: justify;">WAN-Wide Area Network</h2>
<ul style="text-align: justify;">
<li>A WAN is a network that extends over a large geographical area such as countries or states.</li>
<li>It is not limited to a single location, but it spans over a large geographical area through a fiber optic cable, telephone line or satellite links.</li>
<li>It is quite bigger network than the LAN and widely used in the field of education, Business and government.</li>
</ul>
<p style="text-align: justify;">
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4606" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/wan-network.png" alt="" width="1603" height="670" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/wan-network.png 1603w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/wan-network-300x125.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/wan-network-1024x428.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/wan-network-768x321.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/wan-network-1536x642.png 1536w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/wan-network-390x163.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/wan-network-820x343.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/wan-network-1180x493.png 1180w" sizes="(max-width: 1603px) 100vw, 1603px" /></p>
<p style="text-align: justify;">
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-are-the-types-of-networking/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What are Networking protocols ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-are-networking-protocols/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-are-networking-protocols/#respond</comments>
		
		<dc:creator><![CDATA[webmaster]]></dc:creator>
		<pubDate>Mon, 08 Aug 2022 12:18:53 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[internet protocol]]></category>
		<category><![CDATA[need for protocols in computer networks]]></category>
		<category><![CDATA[network layer protocols]]></category>
		<category><![CDATA[network protocols]]></category>
		<category><![CDATA[protocol example]]></category>
		<category><![CDATA[total number of protocols in networking]]></category>
		<category><![CDATA[types of network protocols]]></category>
		<category><![CDATA[Types of Networking Protocols]]></category>
		<category><![CDATA[types of protocols]]></category>
		<category><![CDATA[what are networking protocols]]></category>
		<category><![CDATA[what is network protocol]]></category>
		<category><![CDATA[what is networking protocols]]></category>
		<category><![CDATA[what is protocol]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=4599</guid>

					<description><![CDATA[It is a set of rules that determines how data is transmitted between devices in same network. It allows connected devices to communicate with each other, regardless of any differences in their structure, design or internal processes. Network protocols are the reason you can easily communicate with people all over the world, and it plays [&#8230;]]]></description>
										<content:encoded><![CDATA[<ul>
<li style="text-align: justify;">It is a set of rules that determines how data is transmitted between devices in same network.</li>
<li style="text-align: justify;">It allows connected devices to communicate with each other, regardless of any differences in their structure, design or internal processes.</li>
<li style="text-align: justify;">Network protocols are the reason you can easily communicate with people all over the world, and it plays a critical role in modern digital communications.</li>
</ul>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4600" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-protocol.png" alt="" width="1289" height="582" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-protocol.png 1289w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-protocol-300x135.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-protocol-1024x462.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-protocol-768x347.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-protocol-390x176.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-protocol-820x370.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2022/08/networking-protocol-1180x533.png 1180w" sizes="(max-width: 1289px) 100vw, 1289px" /></p>
<ul style="text-align: justify;">
<li>There are various types of protocols that support a compassionate and major role in communicating with different devices across the network, they are:</li>
</ul>
<h2 id="transmission-control-protocol" style="text-align: justify;">Transmission Control Protocol</h2>
<ul style="text-align: justify;">
<li>It is used for communicating over a network and becomes a popular communication protocol.</li>
<li>It separates any message into series of pockets where sent from source to destination and there it gets reassembled at the destination.</li>
</ul>
<h2 id="internet-protocol" style="text-align: justify;">Internet Protocol</h2>
<ul style="text-align: justify;">
<li>It is mostly used with TCP and designed explicitly as addressing protocol.</li>
<li>In network IP addresses in packets help in routing them through different nodes until it reaches the destination system.</li>
</ul>
<h2 id="user-datagram-protocol" style="text-align: justify;">User Datagram Protocol</h2>
<ul style="text-align: justify;">
<li>It is substitute communication protocol to TCP implemented primarily for creating low-latency and loss-tolerating linking between different applications.</li>
</ul>
<h2 id="post-office-protocol" style="text-align: justify;">Post Office Protocol</h2>
<ul style="text-align: justify;">
<li>Post Office Protocol is designed for receiving incoming E-mails.</li>
</ul>
<h2 id="simple-mail-transport-protocol" style="text-align: justify;">Simple Mail Transport Protocol</h2>
<ul style="text-align: justify;">
<li>Simple Mail Transport Protocol is designed to distribute and send outgoing E-mail.</li>
</ul>
<h2 id="file-transfer-protocol" style="text-align: justify;">File Transfer Protocol</h2>
<ul style="text-align: justify;">
<li>It allows users to transfer files like text files, multimedia files, program files and documents from one machine to another.</li>
</ul>
<h2 id="hyper-text-transfer-protocol" style="text-align: justify;">Hyper Text Transfer Protocol</h2>
<ul style="text-align: justify;">
<li>In this HTML tags are used for creating links and it is designed for transferring a hypertext among two or more systems.</li>
</ul>
<h2 id="hyper-text-transfer-protocol-secure" style="text-align: justify;">Hyper Text Transfer Protocol Secure</h2>
<ul style="text-align: justify;">
<li>It is a standard protocol to secure the communication among two computers one using the browser and other fetching data from web server.</li>
<li>HTTPS is used for transferring data between the client browser (request) and the web server (response) in the encrypted format.</li>
</ul>
<h2 id="telnet" style="text-align: justify;">Telnet</h2>
<ul style="text-align: justify;">
<li>It is designed for connecting one system with another and here the connecting process is termed as remote login.</li>
<li>Here the local computer system request for connection and remote computer system accepts the connection.</li>
</ul>
<h2 id="gopher" style="text-align: justify;">Gopher</h2>
<ul style="text-align: justify;">
<li>It is a collection of rules implemented for retrieving, searching as well as displaying documents from isolated sites and also works on the client/server principle.</li>
</ul>
<p style="text-align: justify;">
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-are-networking-protocols/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Blacklist ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-blacklist/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-blacklist/#respond</comments>
		
		<dc:creator><![CDATA[webmaster]]></dc:creator>
		<pubDate>Mon, 20 Sep 2021 12:07:28 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[blacklist]]></category>
		<category><![CDATA[blacklist check]]></category>
		<category><![CDATA[blacklist definition]]></category>
		<category><![CDATA[blacklist meaning]]></category>
		<category><![CDATA[blacklisted]]></category>
		<category><![CDATA[email block list]]></category>
		<category><![CDATA[ip blacklist]]></category>
		<category><![CDATA[is my ip blacklisted]]></category>
		<category><![CDATA[the blacklist]]></category>
		<category><![CDATA[what does blacklisted mean]]></category>
		<category><![CDATA[what is blacklist]]></category>
		<category><![CDATA[when is the blacklist on]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=3853</guid>

					<description><![CDATA[What is Blacklist ? A blacklist sometimes called blackhole list,which is a list of usernames or IP addresses, that are denied access to a certain system or protocol. The goal of a blackhole list is to provide a list of IP addresses that a network can use to filter out undesireable traffic. Examples of Blacklist Applications Web servers uses blacklist [&#8230;]]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-blacklist" class="color-pink" style="text-align: justify;">What is Blacklist ?</h2>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4290 aligncenter" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/09/blacklisting.png" alt="" width="1332" height="479" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/09/blacklisting.png 1332w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/09/blacklisting-300x108.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/09/blacklisting-1024x368.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/09/blacklisting-768x276.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/09/blacklisting-390x140.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/09/blacklisting-820x295.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/09/blacklisting-1180x424.png 1180w" sizes="(max-width: 1332px) 100vw, 1332px" /></p>
</div>
</div>
<div class="Content">
<div class="hddn">
<ul style="text-align: justify;">
<li>A blacklist sometimes called blackhole list,which is a list of usernames or <a href="https://www.wikitechy.com/final-year-project/dotnet/server-hacking/finding-ip-address-module" target="_blank" rel="noopener">IP addresses</a>, that are denied access to a certain system or <a href="https://www.wikitechy.com/final-year-project/dotnet/server-hacking/what-is-protocol" target="_blank" rel="noopener">protocol</a>.</li>
<li>The goal of a blackhole list is to provide a list of <a href="https://www.wikitechy.com/technology/get-client-ip-address-php/" target="_blank" rel="noopener">IP addresses</a> that a network can use to filter out undesireable traffic.</li>
</ul>
<p style="text-align: justify;"><img decoding="async" src="https://cdn.wikitechy.com/interview-questions/networking/what-is-blacklist.png" alt="What is Blacklist" /></p>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="examples-of-blacklist-applications" class="color-green">Examples of Blacklist Applications</h2>
</div>
</div>
<div class="Content">
<div class="hddn">
<ul>
<li style="text-align: justify;"><a href="https://www.wikitechy.com/tutorials/ethical-hacking/server-hacking/how-to-hack-web-server" target="_blank" rel="noopener">Web servers</a> uses blacklist that denies access from specific IP addresses or ranges of IPs, for security purposes.</li>
<li style="text-align: justify;"><a href="https://www.wikitechy.com/technology/how-to-get-firewall-access-on-android-without-root/" target="_blank" rel="noopener">Firewalls</a> may use a blacklist to deny access to individual users, systems located in certain regions, or computers with IPs within a certain subnet mask.</li>
<li style="text-align: justify;"><a href="https://www.wikitechy.com/interview-questions/networking/what-is-spam" target="_blank" rel="noopener">Spam</a> filters uses blacklists that reject certain e-mail addresses and specific message content.</li>
<li style="text-align: justify;">Programmers implemented the blacklists within a program to prevent certain objects from being modified.</li>
</ul>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4292" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/09/blacklist.png" alt="" width="1528" height="794" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/09/blacklist.png 1528w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/09/blacklist-300x156.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/09/blacklist-1024x532.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/09/blacklist-768x399.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/09/blacklist-390x203.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/09/blacklist-820x426.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/09/blacklist-1180x613.png 1180w" sizes="(max-width: 1528px) 100vw, 1528px" /></p>
</div>
</div>
</div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-blacklist/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is TCP/IP reference model ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-tcp-ip-reference-model/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-tcp-ip-reference-model/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 20:29:37 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[difference between osi and tcp ip]]></category>
		<category><![CDATA[difference between osi and tcp ip model]]></category>
		<category><![CDATA[dod model vs tcp/ip model]]></category>
		<category><![CDATA[explain in brief osi tcp model]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[fundamentals of osi and tcp/ip model]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[modele tcp ip]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[osi and tcp ip model]]></category>
		<category><![CDATA[osi model layers]]></category>
		<category><![CDATA[osi reference model]]></category>
		<category><![CDATA[osi tcp ip]]></category>
		<category><![CDATA[osi tcp/ip layers and protocols]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[polaris financial technology interview questions and answers]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[similarities and difference between tcp and osi model]]></category>
		<category><![CDATA[similarities between osi and tcp/ip model]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[tcp ip]]></category>
		<category><![CDATA[tcp ip layers]]></category>
		<category><![CDATA[tcp ip model]]></category>
		<category><![CDATA[tcp ip model chart]]></category>
		<category><![CDATA[tcp ip model layers]]></category>
		<category><![CDATA[tcp ip networking]]></category>
		<category><![CDATA[tcp ip osi model]]></category>
		<category><![CDATA[tcp ip packet]]></category>
		<category><![CDATA[tcp ip protocol]]></category>
		<category><![CDATA[tcp ip protocol layers]]></category>
		<category><![CDATA[tcp ip protocol suite]]></category>
		<category><![CDATA[tcp ip reference model]]></category>
		<category><![CDATA[tcp ip stack]]></category>
		<category><![CDATA[tcp ip transport layer]]></category>
		<category><![CDATA[tcp ip vs osi which is better]]></category>
		<category><![CDATA[tcp/ip and osi model explained]]></category>
		<category><![CDATA[tcp/ip layers and their functions]]></category>
		<category><![CDATA[tcp/ip model 5 layers]]></category>
		<category><![CDATA[tcp/ip model vs osi model]]></category>
		<category><![CDATA[tcp/ip reference model tutorialspoint]]></category>
		<category><![CDATA[tcpip]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[understanding tcp ip]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[what is tcp ip]]></category>
		<category><![CDATA[why are the osi and tcp/ip network models important in networking]]></category>
		<category><![CDATA[why tcp ip is used instead of osi]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=792</guid>

					<description><![CDATA[Answer : TCP/IP means Transmission Control Protocol and Internet Protocol...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-tcp-ip-reference-model" class="color-pink" style="text-align: justify;">What is TCP/IP reference model ?</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li><a href="https://castr.io/blog/udp-vs-tcp-what-is-the-difference-between-tcp-and-udp/">UDP vs TCP</a> &#8211; TCP/IP means Transmission Control <a href="https://www.wikitechy.com/final-year-project/dotnet/server-hacking/what-is-protocol" target="_blank" rel="noopener">Protocol</a> and Internet Protocol. It is the network model used in the current Internet architecture as well.</li>
<li>Protocols are set of rules which govern every possible communication over a network.</li>
<li>These protocols describe the movement of data between the source and destination or the internet. They also offer simple naming and addressing schemes.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4294 aligncenter" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-model.png" alt="" width="1474" height="1461" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-model.png 1474w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-model-300x297.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-model-1024x1015.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-model-150x150.png 150w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-model-768x761.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-model-80x80.png 80w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-model-390x387.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-model-820x813.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-model-1180x1170.png 1180w" sizes="(max-width: 1474px) 100vw, 1474px" /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="features-of-tcp-ip-reference-model" class="color-purple">Features of TCP/IP reference model</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Support for a flexible architecture. Adding more machines to a network was easy.</li>
<li>The network was robust, and connections remained intact until the source and destination machines were functioning.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/what-is-tcp-ip-reference-model.png" alt=" " /></div>
</div>
<p style="text-align: justify;" align="center">Protocol and networks in the TCP/IP model</p>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="different-layers-of-tcp-ip-reference-model" class="color-purple">Different Layers of TCP/IP Reference Model</h2>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4295" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-reference-model.png" alt="" width="874" height="698" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-reference-model.png 874w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-reference-model-300x240.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-reference-model-768x613.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-reference-model-390x311.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/tcp-ip-reference-model-820x655.png 820w" sizes="(max-width: 874px) 100vw, 874px" /></p>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="layer-1-host-to-network-layer" class="color-green">Layer 1: Host-to-network Layer</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Lowest layer of the all.</li>
<li>Protocol is used to connect to the host, so that the packets can be sent over it. Varies from host to host and network to network.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="layer-2-internet-layer" class="color-green">Layer 2: Internet Layer</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Selection of a packet switching network which is based on a connectionless internetwork layer is called a internet layer. This layer which holds the whole architecture together.</li>
<li>It helps the packet to travel independently to the destination.</li>
<li>Order in which packets are received is different from the way they are sent.</li>
<li>IP (Internet Protocol) is used in this layer.</li>
</ul>
</div>
</div>
<div class="subheading" style="text-align: justify;">
<h2 id="the-various-functions-performed-by-the-internet-layer-are">The various functions performed by the Internet Layer are</h2>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Delivering IP packets.</li>
<li>Performing <a href="https://www.wikitechy.com/interview-questions/networking/what-is-routing/" target="_blank" rel="noopener">routing</a>.</li>
<li>Avoiding congestion.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="layer-3-transport-layer" class="color-green">Layer 3: Transport Layer</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>It decides if data transmission should be on parallel path or single path.</li>
<li>Functions such as multiplexing, segmenting or splitting on the data is done by transport layer.</li>
<li>The applications can read and write to the transport layer.</li>
<li>Transport layer adds header information to the data.</li>
<li>Transport layer breaks the message (data) into small units so that they are handled more efficiently by the network layer.</li>
<li>Transport layer also arrange the packets to be sent, in sequence.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="layer-4-application-layer" class="color-green">Layer 4: Application Layer</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>The TCP/IP specifications described a lot of applications that were at the top of the protocol stack. Some of them were <b>TELNET, FTP, SMTP, DNS</b> etc.
<ul>
<li><b>TELNET</b> is a two-way communication protocol which allows connecting to a remote machine and run applications on it.</li>
<li><b>FTP (File Transfer Protocol)</b> is a protocol, that allows File transfer amongst computer users connected over a network. It is reliable, simple and efficient.</li>
<li><b>SMTP (Simple Mail Transport Protocol)</b> is a protocol, which is used to transport electronic mail between a source and destination, directed via a route.</li>
<li><b>DNS (Domain Name Server)</b> resolves an IP address into a textual address for Hosts connected over a network.</li>
</ul>
</li>
<li>It allows peer entities to carry conversation.</li>
<li>It defines two end-to-end protocols : <b class="color-pink">TCP and UDP</b>
<ul>
<li><b>TCP (Transmission Control Protocol) : </b>It is a reliable connection-oriented protocol which handles byte-stream from source to destination without error and flow control.</li>
<li><b>UDP (User-Datagram Protocol) : </b>It is an unreliable connection-less protocol that do not want TCPs, sequencing and flow control. For Example One-shot request-reply kind of service.</li>
</ul>
</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="advantages-of-tcp-ip-model" class="color-purple">Advantages of TCP/IP model</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>It operated independently.</li>
<li>It is scalable.</li>
<li>Client/server architecture.</li>
<li>Supports a number of routing protocols.</li>
<li>Can be used to establish a connection between two computers.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="disadvantages-of-tcp-ip-model" class="color-purple">Disadvantages of TCP/IP Model</h2>
</div>
</div>
<div class="Content">
<div class="hddn">
<ul>
<li style="text-align: justify;">In this layer does not guarantee delivery of packets.</li>
<li style="text-align: justify;">The model cannot be used in any other application.</li>
<li style="text-align: justify;">Replacing protocol is not easy.</li>
<li style="text-align: justify;">It has not clearly separated its services, interfaces and protocols.</li>
</ul>
</div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-tcp-ip-reference-model/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Switching ?</title>
		<link>https://www.wikitechy.com/interview-questions/networking/what-is-switching/</link>
					<comments>https://www.wikitechy.com/interview-questions/networking/what-is-switching/#respond</comments>
		
		<dc:creator><![CDATA[Editor]]></dc:creator>
		<pubDate>Sat, 17 Jul 2021 20:26:14 +0000</pubDate>
				<category><![CDATA[Networking]]></category>
		<category><![CDATA[Accenture interview questions and answers]]></category>
		<category><![CDATA[Allstate Solutions Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Applied Mate interview questions and answers]]></category>
		<category><![CDATA[Atos interview questions and answers]]></category>
		<category><![CDATA[Bharti Airtel interview questions and answers]]></category>
		<category><![CDATA[Capgemini interview questions and answers]]></category>
		<category><![CDATA[CASTING NETWORKS INDIA PVT LIMITED interview questions and answers]]></category>
		<category><![CDATA[Ciena Corporation interview questions and answers]]></category>
		<category><![CDATA[circuit switching]]></category>
		<category><![CDATA[circuit switching advantages and disadvantages]]></category>
		<category><![CDATA[circuit switching in networking]]></category>
		<category><![CDATA[circuit switching in telecommunication]]></category>
		<category><![CDATA[cisco routing and switching]]></category>
		<category><![CDATA[classification of switching system]]></category>
		<category><![CDATA[code switching definition]]></category>
		<category><![CDATA[CSS Corp Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[datagram packet switching]]></category>
		<category><![CDATA[Dell International Services India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[difference between circuit switching and packet switching and message switching]]></category>
		<category><![CDATA[explain switching in computer networks]]></category>
		<category><![CDATA[Flipkart interview questions and answers]]></category>
		<category><![CDATA[HCL Technologies interview questions and answers]]></category>
		<category><![CDATA[how does packet switching work]]></category>
		<category><![CDATA[IBM interview questions and answers]]></category>
		<category><![CDATA[Indecomm Global Services interview questions and answers]]></category>
		<category><![CDATA[Infosys Technologies interview questions and answers]]></category>
		<category><![CDATA[lan switching]]></category>
		<category><![CDATA[manual switching system]]></category>
		<category><![CDATA[Mavenir interview questions and answers]]></category>
		<category><![CDATA[message switching]]></category>
		<category><![CDATA[message switching geeksforgeeks]]></category>
		<category><![CDATA[message switching slideshare]]></category>
		<category><![CDATA[message switching vs packet switching]]></category>
		<category><![CDATA[Mphasis interview questions and answers]]></category>
		<category><![CDATA[NCR Corporation interview questions and answers]]></category>
		<category><![CDATA[need of switching in networking]]></category>
		<category><![CDATA[NetApp interview questions and answers]]></category>
		<category><![CDATA[network routing and switching]]></category>
		<category><![CDATA[network switching equipment]]></category>
		<category><![CDATA[networking and switching]]></category>
		<category><![CDATA[Oracle Corporation interview questions and answers]]></category>
		<category><![CDATA[packet switching]]></category>
		<category><![CDATA[packet switching advantages and disadvantages]]></category>
		<category><![CDATA[packet switching diagram]]></category>
		<category><![CDATA[packet switching in computer networks]]></category>
		<category><![CDATA[packet switching in networking]]></category>
		<category><![CDATA[packet switching technology]]></category>
		<category><![CDATA[packet switching vs circuit switching]]></category>
		<category><![CDATA[PeopleStrong interview questions and answers]]></category>
		<category><![CDATA[polaris financial technology interview questions and answers]]></category>
		<category><![CDATA[R Systems interview questions and answers]]></category>
		<category><![CDATA[raise two main advantages of packet switching compared to message switching]]></category>
		<category><![CDATA[RBS India Development Centre Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[Reliance Industries Ltd interview questions and answers]]></category>
		<category><![CDATA[routing and switching]]></category>
		<category><![CDATA[SAP Labs India Pvt Ltd interview questions and answers]]></category>
		<category><![CDATA[simple switching network]]></category>
		<category><![CDATA[switching cost]]></category>
		<category><![CDATA[switching in data communication]]></category>
		<category><![CDATA[switching in data communication and networking]]></category>
		<category><![CDATA[switching in networking]]></category>
		<category><![CDATA[switching in telecommunication]]></category>
		<category><![CDATA[switching network in telecommunication]]></category>
		<category><![CDATA[switching process in networking]]></category>
		<category><![CDATA[switching regulator]]></category>
		<category><![CDATA[switching system in networking]]></category>
		<category><![CDATA[switching techniques]]></category>
		<category><![CDATA[switching technologies in networking]]></category>
		<category><![CDATA[Tata Communications interview questions and answers]]></category>
		<category><![CDATA[Tech Mahindra interview questions and answers]]></category>
		<category><![CDATA[types of packet switching]]></category>
		<category><![CDATA[types of switching in computer networks]]></category>
		<category><![CDATA[types of switching in networking]]></category>
		<category><![CDATA[UnitedHealth Group interview questions and answers]]></category>
		<category><![CDATA[Virtela interview questions and answers]]></category>
		<category><![CDATA[what is a circuit in networking]]></category>
		<category><![CDATA[what is circuit switching]]></category>
		<category><![CDATA[what is circuit switching and packet switching]]></category>
		<category><![CDATA[what is packet switching]]></category>
		<category><![CDATA[what is packet switching in networking]]></category>
		<category><![CDATA[what is switching]]></category>
		<category><![CDATA[what is switching cost]]></category>
		<category><![CDATA[what is switching in networking and its types]]></category>
		<category><![CDATA[what is switching in telecommunication]]></category>
		<category><![CDATA[what is switching regulator]]></category>
		<guid isPermaLink="false">https://www.wikitechy.com/interview-questions/?p=791</guid>

					<description><![CDATA[Answer : Switching is the most valuable asset...]]></description>
										<content:encoded><![CDATA[<div class="TextHeading">
<div class="hddn">
<h2 id="what-is-switching" class="color-pink" style="text-align: justify;">What is Switching ?</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Switching is the most valuable asset of computer networking.</li>
<li>Everytime in computer network you have access the internet or another computer network outside your immediate location, or your messages are sent through a maze of transmission media and connection devices.</li>
<li>The mechanism for exchange of information between different computer networks and network segments is called switching in Networking.</li>
<li>On the other words we can say that any type signal or data element directing or Switching toward a particular hardware address or hardware pieces.</li>
<li>Hardware devices that can be used for switching or transferring data from one location to another that can use multiple layers of the Open Systems Interconnection (OSI) model.</li>
</ul>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4298 aligncenter" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/network-switch.png" alt="" width="1254" height="385" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/network-switch.png 1254w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/network-switch-300x92.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/network-switch-1024x314.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/network-switch-768x236.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/network-switch-390x120.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/network-switch-820x252.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/network-switch-1180x362.png 1180w" sizes="(max-width: 1254px) 100vw, 1254px" /></p>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="types-of-switching-techniques" class="color-purple">Types of Switching Techniques</h2>
</div>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4297" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/methods-of-switching.png" alt="" width="1234" height="842" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/methods-of-switching.png 1234w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/methods-of-switching-300x205.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/methods-of-switching-1024x699.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/methods-of-switching-768x524.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/methods-of-switching-390x266.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/methods-of-switching-820x560.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/methods-of-switching-1180x805.png 1180w" sizes="(max-width: 1234px) 100vw, 1234px" /></p>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>There are basically three types of switching methods are available.
<ul>
<li>Circuit Switching</li>
<li>Packet Switching</li>
<li>Message Switching</li>
</ul>
</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="circuit-switching" class="color-purple">Circuit Switching</h2>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-4300 aligncenter" src="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/circuit-switching.png" alt="" width="1367" height="595" srcset="https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/circuit-switching.png 1367w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/circuit-switching-300x131.png 300w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/circuit-switching-1024x446.png 1024w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/circuit-switching-768x334.png 768w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/circuit-switching-390x170.png 390w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/circuit-switching-820x357.png 820w, https://www.wikitechy.com/interview-questions/wp-content/uploads/2021/07/circuit-switching-1180x514.png 1180w" sizes="(max-width: 1367px) 100vw, 1367px" /></p>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Circuit-switching is the real-time connection-oriented system. In Circuit Switching a dedicated channel (or circuit) is set up for a single connection between the sender and recipient during the communication session.</li>
<li>In telephone communication system, the normal voice call is the example of Circuit Switching. The telephone service provider maintain a unbroken link for each telephone call.</li>
<li>Circuit switching is pass through three phases, that are circuit establishment, data transfer and circuit disconnect.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/circuit-switching.gif" alt=" " /></div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="packet-switching" class="color-purple">Packet Switching</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>The basic example of Packet Switching is the Internet. In Packet Switching, data can be fragmented into suitably-sized pieces in variable length or blocks that are called packets that can be routed independently by network devices based on the destination address contained certain “formatted” header within each packet.</li>
<li>The packet switched networks allow sender and recipient without reserving the circuit. Multiple paths are exist between sender and recipient in a packet switching network.</li>
<li>They does not require a call setup to transfer packets between sender and recipient.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/packet-switching.gif" alt="Packet Switching" width="70%" /></div>
</div>
<p style="text-align: center;" align="center">Packet Switching</p>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>There are two type of Packet Switching connectionless or Connection-Oriented.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="connectionless-packet-switching" class="color-purple">Connectionless Packet Switching</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>It is also known as datagram switching. In this type of network each packet routed individually by network devices based on the destination address contained within each packet.</li>
<li>Due to each packet is routed individually, the result is that each packet is delivered out-of-order with different paths of transmission, it depend on the networking devices like (switches and routers) at any given time.</li>
<li>After reaching recipient location, the packets are reassemble to the original form.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="connection-oriented-packet-switching" class="color-purple">Connection-Oriented Packet Switching</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>It is also known as virtual circuit switching. In this type of Networking packets are send in sequential order over a defined route.</li>
</ul>
</div>
</div>
<div class="TextHeading" style="text-align: justify;">
<div class="hddn">
<h2 id="message-switching" class="color-purple">Message Switching</h2>
</div>
</div>
<div class="Content" style="text-align: justify;">
<div class="hddn">
<ul>
<li>Message switching does not set up a dedicated channel (or circuit) between the sender and recipient during the communication session.</li>
<li>In Message Switching each message is treated as an independent blocks.</li>
<li>In this type of networking, each message is then transmitted from first network device to second network device through the internetwork i.e. message is transmitted from the sender to intermediate device.</li>
</ul>
</div>
</div>
<div class="ImageContent" style="text-align: justify;">
<div class="hddn"><img decoding="async" class="img-responsive center-block aligncenter" src="https://cdn.wikitechy.com/interview-questions/networking/message-switching.jpg" alt=" " /></div>
</div>
<p style="text-align: justify;" align="center">Message Switching</p>
<div class="Content">
<div class="hddn">
<ul>
<li style="text-align: justify;">The intermediate device stores the message for a time being, after inspects it for errors, intermediate device transmitting the message to the next node with its routing information. Because the message switching networks are called store and forward networks in networking.</li>
</ul>
</div>
</div>
]]></content:encoded>
					
					<wfw:commentRss>https://www.wikitechy.com/interview-questions/networking/what-is-switching/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
