i
TCS
Filter interviews by
BGP table stores routing information for inter-domain routing, enabling efficient data packet delivery across the internet.
BGP table contains routes learned from other BGP peers, including attributes like AS path, next hop, and prefix.
Routes in the BGP table are selected based on various attributes, with the best route being used for packet forwarding.
Example: If a network has multiple paths to reach a destination...
OSPF is a link-state routing protocol that uses a table to manage routing information efficiently.
OSPF maintains a Link-State Database (LSDB) that contains information about the network topology.
Each OSPF router generates Link-State Advertisements (LSAs) to share its routing information with other routers.
The OSPF table is built from LSAs and is used to calculate the shortest path to each destination using Dijkstr...
L3 switches are network devices that operate at the network layer of the OSI model, providing routing functionality along with switching capabilities.
L3 switches can route traffic based on IP addresses, making them more intelligent than L2 switches.
They can support VLANs and provide inter-VLAN routing.
L3 switches are commonly used in enterprise networks to improve network performance and security.
Examples of L3 sw...
Switching is the process of forwarding data packets between devices on a network based on the destination address.
Switching occurs at the data link layer of the OSI model.
Switches use MAC addresses to determine where to forward incoming data packets.
Switching is faster and more efficient than traditional hub-based networking.
Examples of switches include Cisco Catalyst series and Juniper EX series.
What people are saying about TCS
NAT is used to translate private IP addresses to public IP addresses, allowing multiple devices to share a single public IP address.
Allows multiple devices on a local network to access the internet using a single public IP address
Enhances security by hiding internal IP addresses from external networks
Conserves public IP addresses by allowing multiple devices to share a single public IP address
ACL stands for Access Control List, which is a set of rules that controls network traffic and permissions on a network device.
ACL is used to filter network traffic based on defined criteria such as source or destination IP address, port number, protocol, etc.
ACL can be configured on routers, switches, firewalls, and other network devices to control access to resources.
There are two types of ACLs: standard ACLs and...
NAT stands for Network Address Translation. It is a technique used to map public IP addresses to private IP addresses.
NAT is used to conserve public IP addresses by allowing multiple devices to share a single public IP address.
It provides an additional layer of security by hiding the private IP addresses of devices on a network.
There are three types of NAT: Static NAT, Dynamic NAT, and Port Address Translation (PA...
Static routing uses manually configured routes while dynamic routing uses protocols to automatically update routes.
Static routing requires manual configuration of routes while dynamic routing uses protocols to automatically update routes.
Static routing is best suited for small networks with few changes while dynamic routing is better for larger networks with frequent changes.
Examples of static routing protocols in...
Static routing is a type of network routing where the administrator manually configures the routes in the routing table.
Routes are manually configured by the network administrator
Routes do not change unless manually modified
It is less flexible than dynamic routing
It is useful for small networks with few changes in topology
Example: A small office network with a single router connecting to the internet
Unicast, multicast and broadcast are types of network communication.
Unicast is a one-to-one communication between a sender and a receiver.
Multicast is a one-to-many communication where a sender sends data to a group of receivers.
Broadcast is a one-to-all communication where a sender sends data to all devices on the network.
Unicast is used for communication that requires privacy and security.
Multicast is used for s...
I appeared for an interview before Jun 2024, where I was asked the following questions.
I appeared for an interview in Feb 2025, where I was asked the following questions.
BGP table stores routing information for inter-domain routing, enabling efficient data packet delivery across the internet.
BGP table contains routes learned from other BGP peers, including attributes like AS path, next hop, and prefix.
Routes in the BGP table are selected based on various attributes, with the best route being used for packet forwarding.
Example: If a network has multiple paths to reach a destination, BGP...
OSPF is a link-state routing protocol that uses a table to manage routing information efficiently.
OSPF maintains a Link-State Database (LSDB) that contains information about the network topology.
Each OSPF router generates Link-State Advertisements (LSAs) to share its routing information with other routers.
The OSPF table is built from LSAs and is used to calculate the shortest path to each destination using Dijkstra's a...
NAT is used to translate private IP addresses to public IP addresses, allowing multiple devices to share a single public IP address.
Allows multiple devices on a local network to access the internet using a single public IP address
Enhances security by hiding internal IP addresses from external networks
Conserves public IP addresses by allowing multiple devices to share a single public IP address
ACL stands for Access Control List, which is a set of rules that controls network traffic and permissions on a network device.
ACL is used to filter network traffic based on defined criteria such as source or destination IP address, port number, protocol, etc.
ACL can be configured on routers, switches, firewalls, and other network devices to control access to resources.
There are two types of ACLs: standard ACLs and exte...
Routing is the process of selecting the best path for network traffic to reach its destination.
Routing involves determining the optimal path for data packets to travel from the source to the destination.
Routers use routing tables to make decisions on how to forward packets based on destination IP addresses.
Routing protocols like OSPF and BGP are used to exchange routing information between routers.
Dynamic routing allow...
Switching is the process of forwarding data packets between devices on a network based on the destination address.
Switching occurs at the data link layer of the OSI model.
Switches use MAC addresses to determine where to forward incoming data packets.
Switching is faster and more efficient than traditional hub-based networking.
Examples of switches include Cisco Catalyst series and Juniper EX series.
L3 switches are network devices that operate at the network layer of the OSI model, providing routing functionality along with switching capabilities.
L3 switches can route traffic based on IP addresses, making them more intelligent than L2 switches.
They can support VLANs and provide inter-VLAN routing.
L3 switches are commonly used in enterprise networks to improve network performance and security.
Examples of L3 switche...
I applied via Naukri.com and was interviewed in Apr 2023. There were 2 interview rounds.
OSPF has three layers: backbone, area, and interface.
Backbone layer connects all areas and is responsible for routing between them.
Area layer groups networks together and reduces the amount of routing information exchanged.
Interface layer connects routers to the network and exchanges routing information within an area.
OSPF uses a hierarchical structure to efficiently manage large networks.
Each layer has its own set of ...
TCP is a connection-oriented protocol while UDP is a connectionless protocol.
TCP provides reliable, ordered, and error-checked delivery of data while UDP does not guarantee reliable delivery.
TCP is slower but more reliable while UDP is faster but less reliable.
TCP is used for applications that require high reliability and accuracy while UDP is used for applications that require speed and efficiency.
Examples of TCP-base...
Unicast, multicast and broadcast are types of network communication.
Unicast is a one-to-one communication between a sender and a receiver.
Multicast is a one-to-many communication where a sender sends data to a group of receivers.
Broadcast is a one-to-all communication where a sender sends data to all devices on the network.
Unicast is used for communication that requires privacy and security.
Multicast is used for stream...
Routing is the process of selecting the best path for network traffic to reach its destination.
Routing involves analyzing network topology and determining the most efficient path for data to travel.
Routers use routing tables to determine the best path for data to take.
Routing protocols such as OSPF and BGP are used to exchange routing information between routers.
Routing can be either static or dynamic, depending on whe...
Static routing is a type of network routing where the administrator manually configures the routes in the routing table.
Routes are manually configured by the network administrator
Routes do not change unless manually modified
It is less flexible than dynamic routing
It is useful for small networks with few changes in topology
Example: A small office network with a single router connecting to the internet
Static routing uses manually configured routes while dynamic routing uses protocols to automatically update routes.
Static routing requires manual configuration of routes while dynamic routing uses protocols to automatically update routes.
Static routing is best suited for small networks with few changes while dynamic routing is better for larger networks with frequent changes.
Examples of static routing protocols include...
NAT stands for Network Address Translation. It is a technique used to map public IP addresses to private IP addresses.
NAT is used to conserve public IP addresses by allowing multiple devices to share a single public IP address.
It provides an additional layer of security by hiding the private IP addresses of devices on a network.
There are three types of NAT: Static NAT, Dynamic NAT, and Port Address Translation (PAT).
St...
I appeared for an interview before Apr 2024, where I was asked the following questions.
I applied via Naukri.com and was interviewed in Aug 2021. There were 2 interview rounds.
I applied via Walk-in and was interviewed before May 2022. There were 3 interview rounds.
I applied via Naukri.com and was interviewed in Aug 2021. There were 2 interview rounds.
I applied via Approached by Company and was interviewed before Jun 2021. There were 2 interview rounds.
In aptitude need to be ask about mathmatics skill
The duration of TCS Network Administrator interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 7 interview experiences
Difficulty level
Duration
based on 184 reviews
Rating in categories
System Engineer
1.1L
salaries
| ₹3.9 L/yr - ₹8.3 L/yr |
IT Analyst
65.4k
salaries
| ₹7.8 L/yr - ₹14.5 L/yr |
AST Consultant
53.7k
salaries
| ₹12 L/yr - ₹20.6 L/yr |
Assistant System Engineer
33.2k
salaries
| ₹2.4 L/yr - ₹6.3 L/yr |
Associate Consultant
33.1k
salaries
| ₹16.2 L/yr - ₹28.1 L/yr |
Amazon
Wipro
Infosys
Accenture