Computer Networks to crack interviews, explained in simple words

Think of the Internet like a Postal Service for Data
Imagine you want to send a letter (data) to a friend across the country (another computer). Computer networks are all about how this "letter" gets there reliably and efficiently.
Key Concepts - Your Interview Toolkit
Layers - The OSI Model (Simplified)
Imagine the postal service has different departments to handle different parts of sending a letter. Computer networks are similar, organized in layers. Think of it like this:
Application Layer (Top): This is the "user" layer. It's like writing the letter and addressing it. This is where apps like your web browser (Chrome, Firefox), email (Gmail, Outlook), and messaging apps (WhatsApp) live. Key protocols here: HTTP (for web), DNS (for website names), Email protocols (SMTP, POP3, IMAP).
Transport Layer (Middle-High): This is like the packaging and delivery instructions for your letter. It makes sure your letter arrives correctly and in order. Key protocols: TCP (like registered mail - reliable, ordered delivery, used for web browsing, file transfer) and UDP (like regular mail - fast but less reliable, used for streaming, online games).
Network Layer (Middle-Low): This is like the routing and addressing department. It figures out the best path to send your letter across different networks. Key protocol: IP (Internet Protocol) - like the address system for computers on the internet. IP Addresses are crucial! Think of them as house addresses for computers.
Data Link Layer (Low): This is like the local delivery department. It handles sending your letter within your local area (like your house or office network). Key protocols: Ethernet (for wired networks), Wi-Fi (for wireless networks). MAC Addresses are important here - think of them as unique hardware addresses for network devices.
Physical Layer (Bottom): This is the actual physical transportation - wires, cables, radio waves. It's the physical medium that carries your letter. Think of cables, Wi-Fi signals, etc.
Why Layers are Important: They break down a complex problem into smaller, manageable pieces. Each layer has a specific job, making it easier to design, build, and troubleshoot networks. Interviewers like to ask about the OSI model or TCP/IP model (a simplified version of OSI) to see if you understand the fundamental structure of networks.
IP Addresses and MAC Addresses - Computer Addresses
IP Address (Internet Protocol Address): Like a house address for your computer on the internet. It's a logical address used for routing data across networks. Think of "192.168.1.100" as an example. There are two main types:
IPv4: The older, more common type (like the example above). Running out of addresses.
IPv6: The newer type, designed to solve the address shortage. Looks more complex (like "2001:0db8:85a3:0000:0000:8a2e:0370:7334").
MAC Address (Media Access Control Address): Like a unique serial number for your network card (the hardware that connects your computer to a network). It's a physical address, burned into the network card. Think of "00-1A-2B-3C-4D-5E" as an example. Used for communication within a local network.
Key Difference: IP address is logical and can change (e.g., when you move to a different Wi-Fi network). MAC address is physical and usually stays the same.
TCP vs. UDP - Delivery Options
TCP (Transmission Control Protocol): Reliable and Ordered Delivery. Like registered mail.
Connection-oriented: Establishes a connection before sending data, like making a phone call before talking.
Reliable: Guarantees data arrives, re-sends lost packets, checks for errors.
Ordered: Data arrives in the same order it was sent.
Slower (slightly) but safer.
Used for: Web browsing (HTTP), file transfer (FTP), email (SMTP).
UDP (User Datagram Protocol): Fast but Unreliable Delivery. Like sending postcards.
Connectionless: Just sends data without establishing a connection, like shouting across a room.
Unreliable: No guarantee data arrives, no error checking, no re-sending.
Unordered: Packets might arrive in a different order.
Faster but riskier.
Used for: Streaming video and audio, online games, DNS (sometimes).
Analogy: Imagine ordering food. TCP is like a restaurant with table service – they take your order, make sure it's right, and deliver it to your table. UDP is like a food truck – you shout your order, they make it quickly, and hand it to you, but if they mess up or drop it, tough luck.
Ports - Apartment Numbers in a Building
Imagine an IP address is like a building address, and a port is like an apartment number within that building. A computer can run many applications (like web server, email server) at the same time. Ports help direct data to the correct application.
Port Numbers: Numbers from 0 to 65535. Some are "well-known" for specific services:
Port 80: HTTP (web browsing)
Port 443: HTTPS (secure web browsing)
Port 21: FTP (file transfer)
Port 22: SSH (secure remote access)
Port 25: SMTP (email sending)
When you visit a website, your browser uses port 80 or 443 by default to connect to the web server running on that website's IP address.
DNS - Phonebook for the Internet
DNS (Domain Name System): Translates website names (like google.com) into IP addresses (like 172.217.160.142). Think of it as the internet's phonebook.
You type google.com into your browser.
Your computer asks a DNS server: "Hey, what's the IP address for google.com?"
The DNS server replies: "It's 172.217.160.142."
Your browser then connects to 172.217.160.142 to get the Google website.
Why DNS is important: We remember names easier than numbers. DNS makes the internet user-friendly.
Routers and Switches - Network Traffic Controllers
Router: Like a post office or traffic director for networks. Connects different networks together (like your home network to your internet provider's network). Routers decide the best path for data to travel between networks. Operates at the Network Layer (Layer 3) and uses IP addresses to make routing decisions.
Switch: Like a sorter within a building. Connects devices within the same network (like computers in your home or office). Switches efficiently forward data only to the intended device. Operates at the Data Link Layer (Layer 2) and uses MAC addresses to forward data.
Analogy: Imagine a city. Routers are like major highway interchanges directing traffic between cities (different networks). Switches are like street intersections directing traffic within a city (same network).
Firewall - Network Security Guard
Firewall: A security system that controls network traffic, allowing only authorized traffic in and out of your network. Like a security guard at the entrance of a building.
Protects your network from unauthorized access, malware, and cyberattacks.
Works by: Examining network traffic and blocking traffic based on rules you set (e.g., block traffic from certain IP addresses, block traffic to certain ports).
Can be hardware (a physical device) or software (running on your computer).
Subnetting (Basic Idea)
Imagine a big apartment building (a network). Subnetting is like dividing that building into smaller floors or sections (subnetworks). It helps to:
Organize a large network into smaller, more manageable parts.
Improve network performance by reducing broadcast traffic (traffic sent to everyone on the network).
Enhance security by isolating different parts of the network.
Interviewers might ask about why subnetting is used, not necessarily for you to do subnet calculations in your head.
Common Interview Questions (and How to Prepare)
Explain the OSI model (or TCP/IP model). Focus on the layers and their basic functions, key protocols at each layer.
What is the difference between TCP and UDP? When would you use each? Focus on reliability vs. speed, use cases like web browsing vs. streaming.
What are IP addresses and MAC addresses? What's the difference? House address vs. hardware address, logical vs. physical, layer 3 vs. layer 2.
What is DNS? How does it work? Phonebook analogy, translating names to IPs.
What are routers and switches? What's the difference? Network connectors vs. local connectors, layer 3 vs. layer 2, IP vs. MAC.
What is a firewall and why is it important? Security guard analogy, protecting against threats.
What is subnetting (briefly)? Why is it used? Dividing networks for organization, performance, and security.
Explain how you would troubleshoot a network problem (e.g., "I can't access the internet"). Think step-by-step, checking physical connections, IP address, DNS, router, etc.
Tips for Interview Success
Keep it simple. Explain concepts in clear, concise language, like you're explaining to a friend, not a networking expert.
Use analogies. The postal service, phonebook, apartment building analogies can be very helpful.
Focus on the "why" not just the "what." Explain why things are done a certain way, not just what the acronyms stand for.
Practice explaining these concepts out loud. This will help you articulate your thoughts clearly in an interview.
Be honest about what you don't know. It's okay to say "I'm not an expert in that, but my understanding is..." rather than making something up.
Show enthusiasm and willingness to learn. Interviewers value potential and a positive attitude.
To Prepare Further:
Watch some introductory videos on YouTube about computer networks. Search for "computer networks for beginners."
Read some simple articles online about the topics we covered. Wikipedia can be a starting point, but look for simpler explanations first.
Try to visualize how data flows through a network. Imagine sending a request to a website and think about the layers and devices involved.
Subscribe to my newsletter
Read articles from Singaraju Saiteja directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by

Singaraju Saiteja
Singaraju Saiteja
I am an aspiring mobile developer, with current skill being in flutter.