Filter interviews by
I applied via Campus Placement and was interviewed in Aug 2024. There were 9 interview rounds.
The ISO model, also known as OSI model, is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The ISO model stands for International Organization for Standardization model.
It helps in understanding how different networking protocols work together.
Each layer in the model has specific functions and interacts with adjacent layers.
Examples of layers include p...
Fat 16 has a maximum volume size of 2GB and a maximum file size of 2GB, while Fat 32 has a maximum volume size of 2TB and a maximum file size of 4GB.
Fat 16 has a maximum volume size of 2GB, while Fat 32 has a maximum volume size of 2TB.
Fat 16 has a maximum file size of 2GB, while Fat 32 has a maximum file size of 4GB.
Fat 16 uses 16-bit file allocation table entries, while Fat 32 uses 32-bit file allocation table entrie...
IP stands for Internet Protocol. It is a set of rules that governs the format of data sent over the internet.
IP is a unique address assigned to each device connected to a network.
There are two versions of IP - IPv4 and IPv6.
IPv4 uses a 32-bit address scheme allowing for a total of 2^32 addresses.
IPv6 uses a 128-bit address scheme allowing for a total of 2^128 addresses.
IPv4 uses 32-bit addresses while IPv6 uses 128-bit addresses.
IPv4 addresses are written in decimal format (e.g. 192.168.1.1) while IPv6 addresses are written in hexadecimal format (e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334).
IPv4 supports around 4.3 billion unique addresses, while IPv6 supports an astronomical number of unique addresses (2^128).
IPv4 uses ARP (Address Resolution Protocol) for mapping IP addresses to M...
Loopback IP is a special IP address used to send data back to the same device for testing and troubleshooting purposes.
Loopback IP address is 127.0.0.1 in IPv4 and ::1 in IPv6
It is often used for testing network connectivity on a device without needing an external network
Loopback IP is commonly used in troubleshooting network issues
Subletting is the act of a tenant renting out all or part of a rented property to another party.
Subletting involves the original tenant renting out the property to a subtenant.
The subtenant pays rent to the original tenant, who in turn pays rent to the landlord.
Subletting may require permission from the landlord, depending on the terms of the lease agreement.
The original tenant remains responsible for the lease agreeme
Hub broadcasts data to all devices, while switch forwards data only to the intended device.
Hub operates at physical layer, while switch operates at data link layer.
Hub is a passive device, while switch is an active device.
Hub has one collision domain, while switch has multiple collision domains.
Hub is slower than switch in data transmission.
Example: Hub - Ethernet Hub, Switch - Ethernet Switch
Types of network cables include Ethernet cables, fiber optic cables, and coaxial cables.
Ethernet cables are commonly used for wired networks, with categories like Cat5e, Cat6, and Cat7.
Fiber optic cables use light to transmit data and are known for high speed and long distance capabilities.
Coaxial cables are often used for cable TV and internet connections, with RG6 and RG59 being common types.
Protocol is a set of rules that governs the communication between devices in a network.
Protocol defines the format, timing, sequencing, and error checking of data transmission.
Examples of protocols include TCP/IP, HTTP, FTP, and SMTP.
Protocols ensure that devices can communicate effectively and understand each other's data.
Topology refers to the arrangement of various elements in a network, including nodes and connecting lines.
Topology defines how devices are connected in a network
Common topologies include bus, ring, star, mesh, and hybrid
Each topology has its own advantages and disadvantages
Examples: Bus topology - all devices connected to a single cable; Star topology - all devices connected to a central hub
A cross cable is used to connect two similar devices, like two computers or two switches, directly without the need for a hub or switch.
Used to connect similar devices directly
Does not require a hub or switch in between
Commonly used for connecting two computers or two switches
Straight cables are used to connect a computer to a switch or router.
Straight cables are used to connect a computer to a switch or router
They have the same pin layout on both ends
Examples include connecting a computer to a network switch or router
A MAC address is a unique identifier assigned to network interfaces for communications on a network.
MAC stands for Media Access Control.
It is a 48-bit address typically written as six groups of two hexadecimal digits separated by colons or hyphens.
MAC addresses are used to uniquely identify devices on a network.
They are assigned by the manufacturer and are usually hardcoded into the network interface hardware.
Example:
Troubleshooting network issues involves identifying, isolating, and resolving connectivity problems.
Start by checking physical connections and cables
Use network monitoring tools to identify any issues
Check network configurations and settings
Isolate the issue by testing connectivity with different devices
Update firmware and software as needed
Consider potential interference from other devices or networks
Consult with coll...
To create a shared file, you can use a file sharing service or set up a shared network drive.
Use a file sharing service like Google Drive, Dropbox, or OneDrive
Set up a shared network drive on a server or NAS device
Assign permissions to users to access the shared file
Subnetmask is a 32-bit number used to divide an IP address into network and host portions.
Subnetmask is used in conjunction with IP addresses to determine the network and host portions of an address.
It is represented in decimal format (e.g. 255.255.255.0) or CIDR notation (e.g. /24).
Subnetmask helps in routing packets to the correct destination within a network.
It is essential for creating subnets within a larger netwo
Types of NIC include Ethernet, Wi-Fi, and Bluetooth. MAC address is a unique identifier assigned to network interfaces for communication.
Types of NIC: Ethernet, Wi-Fi, Bluetooth
MAC address is a unique identifier for network interfaces
MAC address is a 48-bit hexadecimal number
MAC address is assigned by the manufacturer
Firmware is a type of software that is embedded into hardware devices to control their basic functions.
Firmware is a specific type of software that is designed to control the hardware it is embedded in.
It is stored in non-volatile memory, such as ROM or flash memory.
Firmware is responsible for booting up the hardware device and providing basic functionality.
Examples of firmware include BIOS in computers, firmware in ro
Top trending discussions
Interview experience
based on 1 review
Rating in categories
Network Engineer
46
salaries
| ₹1.8 L/yr - ₹6 L/yr |
Desktop Support Engineer
39
salaries
| ₹2 L/yr - ₹3.5 L/yr |
Network Security Engineer
17
salaries
| ₹3 L/yr - ₹9.8 L/yr |
HR Executive
15
salaries
| ₹2.5 L/yr - ₹3.3 L/yr |
System Administrator
11
salaries
| ₹3 L/yr - ₹5.2 L/yr |
TCS
Infosys
Wipro
HCLTech