What are WebSockets?
WebSockets are a communication protocol that provides a full-duplex, persistent communication channel over a single TCP connection. It is part of the HTML5 specification.
Unlike the traditional HTTP request-response model where the client must initiate every request, WebSockets allow the server to push data to the client at any time without the client having to request it. This makes it ideal for real-time applications.
Key Differences from HTTP:
What is CSMA/CA and how is it different from CSMA/CD?
CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) is the media access method used in wireless networks (Wi-Fi, 802.11).
It is different from CSMA/CD (used in wired Ethernet) because in a wireless environment, a station cannot listen while sending (it would just hear its own loud transmission). It's also difficult to detect collisions due to the 'hidden node problem'.
CSMA/CA works by trying to avoid collisions before they happen:
In summary, CSMA/CD detects collisions and reacts, while CSMA/CA tries to avoid them in the first place.
What is a Virtual Private Cloud (VPC)?
A Virtual Private Cloud (VPC) is a secure, isolated private cloud hosted within a public cloud. It provides a logically isolated section of a public cloud provider's infrastructure where a customer can launch resources in a virtual network that they define.
Essentially, a VPC allows you to have your own private data center within the public cloud (like AWS, Azure, or Google Cloud). You have complete control over your virtual networking environment, including:
What is a honeypot in network security?
A honeypot is a decoy computer system or network resource set up to attract and trap cyber attackers. It is designed to look like a legitimate and vulnerable target, but it is actually isolated and heavily monitored.
The purpose of a honeypot is not to block attacks, but to:
Explain the difference between an Intrusion Detection System (IDS) and an Intrusion Prevention System (IPS).
Both are security systems that monitor network traffic for malicious activity, but they differ in their response.
In short: IDS detects and alerts, while IPS detects and prevents.
What is the Nagle algorithm?
The Nagle algorithm is a mechanism in TCP designed to improve the efficiency of TCP/IP networks by reducing the number of small packets sent over the network.
It works by combining a number of small outgoing messages and sending them all at once. Specifically, as long as there is a sent packet for which the sender has not yet received an acknowledgment, the sender will keep buffering any new small packets until a full-sized packet (MTU) is ready to be sent or until the acknowledgment for the previous packet arrives.
This reduces network congestion caused by many small 'tinygram' packets, but it can introduce a small delay. For this reason, it is sometimes disabled for applications that require very low latency, such as real-time online gaming.
What is APIPA?
APIPA (Automatic Private IP Addressing) is a feature in operating systems (like Windows) that allows a device to automatically assign itself an IP address if it cannot contact a DHCP server.
When a device is configured to use DHCP but fails to receive an address, it will assign itself an IP address from the reserved APIPA range: 169.254.0.1
to 169.254.255.254
with a subnet mask of 255.255.0.0
.
This allows devices on a small local network to communicate with each other without a DHCP server or manual configuration. However, a device with an APIPA address cannot communicate with other subnets or the internet because it has no default gateway information.
What is a digital certificate?
A digital certificate, also known as an SSL/TLS certificate, is a data file used in cryptography to verify the identity of an entity, such as a website, and to enable encrypted communication.
It works like a digital passport. It contains key information:
When you visit an HTTPS website, your browser receives its digital certificate. The browser checks if the certificate is valid and was issued by a trusted CA. This process authenticates the website and allows your browser to use the website's public key to establish a secure, encrypted connection.
Explain symmetric vs. asymmetric encryption.
These are two fundamental types of encryption.
What is a three-tier network architecture?
The three-tier (or hierarchical) network model is a common design for building scalable, reliable, and high-performance enterprise networks. It divides the network into three logical layers: