Orient Technologies
10+ MACIL Interview Questions and Answers
Q1. What is the OSI layer and explain the work of each layer.
OSI (Open Systems Interconnection) layer is a conceptual model that describes the communication functions of a telecommunication system.
Layer 1 (Physical Layer) - Transmits raw data bits over a communication channel.
Layer 2 (Data Link Layer) - Provides error-free transfer of data frames between nodes over the physical layer.
Layer 3 (Network Layer) - Provides logical addressing and routing of data packets between nodes on different networks.
Layer 4 (Transport Layer) - Provides...read more
Q2. What is the difference between L2 and L3 layer?
L2 is data link layer responsible for MAC addressing and error detection, while L3 is network layer responsible for IP addressing and routing.
L2 operates on MAC addresses while L3 operates on IP addresses
L2 is responsible for error detection and correction while L3 is responsible for routing
L2 switches packets within a network while L3 routes packets between networks
Examples of L2 devices include switches and bridges while examples of L3 devices include routers and layer 3 sw...read more
Q3. What is VLAN ?
VLAN stands for Virtual Local Area Network. It is a logical grouping of devices on a network based on their function, project, or application.
VLANs allow network administrators to segment a network into smaller, more manageable groups.
Each VLAN has its own broadcast domain, which means that broadcasts are contained within the VLAN and do not spread to other VLANs.
VLANs can be configured to span multiple switches, allowing devices in different physical locations to be grouped ...read more
Q4. What is router?
A router is a networking device that forwards data packets between computer networks.
Routers operate at the network layer of the OSI model.
They use routing tables to determine the best path for data to travel.
Routers can connect different types of networks, such as LANs and WANs.
Examples of routers include Cisco, Juniper, and TP-Link.
Routers can provide security features such as firewalls and VPNs.
Q5. What is subnetting ?
Subnetting is the process of dividing a network into smaller subnetworks.
Subnetting helps in efficient utilization of IP addresses.
It improves network performance and security.
Subnetting is done by borrowing bits from the host portion of an IP address.
CIDR notation is used to represent subnet masks.
Example: 192.168.1.0/24 represents a network with 256 IP addresses.
Q6. Tell about virtual private gateway
A virtual private gateway is a VPN connection that enables communication between your VPC and other networks.
It allows secure communication between your VPC and remote networks
It can be used to connect your VPC to on-premises data centers or other VPCs
It acts as a gateway for traffic to and from your VPC
Q7. 1.whats is local area network
A local area network (LAN) is a network that connects computers and devices within a limited area, such as a home, school, or office building.
LANs are typically used for sharing resources such as printers, files, and internet access.
They are usually faster and more secure than wide area networks (WANs).
Examples of LAN technologies include Ethernet, Wi-Fi, and Bluetooth.
LANs can be wired or wireless, and can be set up using a variety of topologies such as bus, ring, or star.
LA...read more
Q8. What stage of OSI model
The question is asking about the stage of OSI model.
The OSI model has 7 stages or layers.
Each layer has a specific function and communicates with the adjacent layers.
The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
The question is asking which layer a certain function or issue is occurring in.
For example, if there is a problem with network connectivity, it would be in the Network layer.
Q9. Difference between Measures and column
Measures are calculations based on aggregated data, while columns are static data columns.
Measures are dynamic and change based on filters and slicers
Columns are static and do not change based on filters and slicers
Measures are used for calculations such as sums, averages, and ratios
Columns are used for storing data such as names, dates, and numbers
Q10. Explain STP and RSTP
STP and RSTP are network protocols used to prevent loops in Ethernet networks.
STP stands for Spanning Tree Protocol and RSTP stands for Rapid Spanning Tree Protocol.
STP is slower in converging compared to RSTP.
RSTP provides faster convergence by using different port roles and states.
Both protocols are used to prevent loops in Ethernet networks by blocking redundant paths.
STP and RSTP operate at Layer 2 of the OSI model.
Q11. Explain BGP,OSPF
BGP and OSPF are routing protocols used in networking to determine the best path for data packets to travel.
BGP (Border Gateway Protocol) is an exterior gateway protocol used to exchange routing information between different autonomous systems.
OSPF (Open Shortest Path First) is an interior gateway protocol used to find the shortest path for routing within a single autonomous system.
BGP uses TCP for communication and is commonly used by Internet Service Providers (ISPs) to con...read more
More about working at Orient Technologies
Interview Process at MACIL
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month