TCS
10+ Interview Questions and Answers
Q1. When two or more computers or communicating devices are in a room, on a floor in a building or in a campus, if connected is said to be connected on a LAN.
LAN stands for Local Area Network, which connects two or more devices in a limited area.
LAN is a type of network that connects devices within a limited area such as a room, floor, or building.
It allows devices to communicate with each other and share resources such as printers and files.
LAN can be wired or wireless, and can be set up using Ethernet cables or Wi-Fi.
Examples of LAN include home networks, office networks, and school networks.
Q2. What is a Local Area Network?
A Local Area Network (LAN) is a network that connects computers and devices within a limited area, such as a home, office, or building.
LAN is used to share resources, such as files, printers, and internet access, among connected devices.
It typically operates at a high data transfer rate and low error rate.
LAN can be wired or wireless, using technologies like Ethernet or Wi-Fi.
Examples of LAN include home networks, office networks, and school networks.
Q3. 3. How DHCP works ? 4. What is APIPA IP addressing ? 5. Tell me about EIGRP ?
DHCP is a network protocol that dynamically assigns IP addresses to devices on a network. APIPA is a feature in Windows that assigns a default IP address when DHCP fails. EIGRP is a routing protocol used in networking.
DHCP stands for Dynamic Host Configuration Protocol
DHCP server assigns IP addresses to devices on a network dynamically
APIPA (Automatic Private IP Addressing) assigns a default IP address in the range of 169.254.0.1 to 169.254.255.254 when DHCP server is not ava...read more
Q4. What is data link layer and network layer
Data link layer is responsible for node-to-node communication, while network layer is responsible for end-to-end communication.
Data link layer operates at Layer 2 of the OSI model and is responsible for framing, error detection, and flow control.
Network layer operates at Layer 3 of the OSI model and is responsible for logical addressing, routing, and path determination.
Examples of data link layer protocols include Ethernet and PPP, while examples of network layer protocols in...read more
Q5. What is the difference between firewall and router
Firewall filters traffic based on security rules, while router forwards data packets between networks.
Firewall is used to block or allow traffic based on security rules, while router is used to forward data packets between networks
Firewall operates at the network layer (Layer 3) or above, while router operates at the network layer (Layer 3)
Firewall can inspect and filter traffic based on IP addresses, ports, protocols, and application types, while router primarily forwards pa...read more
Q6. Tell about SD-WAN architechture
SD-WAN architecture is a software-defined approach to managing wide area networks.
SD-WAN uses software to control the connectivity, management, and services between data centers and remote branches.
It allows for centralized control and automation of network traffic.
SD-WAN can prioritize critical applications and optimize bandwidth usage.
Examples of SD-WAN vendors include Cisco, VMware, and Silver Peak.
Q7. What is bgp, why it is used
BGP stands for Border Gateway Protocol, used for routing between different autonomous systems.
BGP is an exterior gateway protocol used to exchange routing information between different autonomous systems.
It is commonly used by Internet Service Providers (ISPs) to connect their networks and exchange routing information.
BGP helps in determining the best path for data to travel between networks based on various attributes like AS path, prefix length, and more.
It is a key protoco...read more
Q8. What is important aspects of networking
Important aspects of networking include security, scalability, reliability, and performance.
Security: Ensuring data confidentiality, integrity, and availability through measures like firewalls, encryption, and access control.
Scalability: Designing networks to accommodate growth in users, devices, and traffic without sacrificing performance.
Reliability: Minimizing downtime and ensuring continuous connectivity through redundancy, failover mechanisms, and monitoring.
Performance:...read more
Q9. What is the programming language
Programming language is a set of instructions that tells a computer how to perform specific tasks.
Programming languages are used to create software, websites, and applications.
Examples of programming languages include Java, Python, C++, and JavaScript.
Each programming language has its own syntax and rules for writing code.
Q10. what are the BGP states
BGP states refer to the different stages a BGP session goes through during establishment and maintenance.
Idle state: Initial state when BGP process starts
Connect state: Attempting to establish a TCP connection
OpenSent state: Sending an OPEN message to peer
OpenConfirm state: Waiting for an OPEN message from peer
Established state: BGP peers are fully synchronized and exchanging routing information
Q11. what is ospf,vlan,bgp,tcp
OSPF, VLAN, BGP, and TCP are all important networking protocols used in the field of network engineering.
OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets in a network.
VLAN (Virtual Local Area Network) is a method of creating multiple virtual networks within a single physical network.
BGP (Border Gateway Protocol) is an exterior gateway protocol used to exchange routing information between different autonomous systems.
TCP (T...read more
Q12. What is ospf process
OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets in a network.
OSPF is a link-state routing protocol
It uses Dijkstra's algorithm to calculate the shortest path
OSPF routers exchange link-state advertisements (LSAs) to build a topology database
The SPF algorithm is then used to calculate the best path to each network
OSPF supports VLSM (Variable Length Subnet Masking) and CIDR (Classless Inter-Domain Routing)
Q13. explain STP selection process
STP selection process determines the root bridge and designated ports in a network.
STP selection process starts by electing a root bridge based on the lowest bridge ID.
Each switch then determines the best path to the root bridge.
Designated ports are selected on each segment based on the lowest path cost to the root bridge.
Non-designated ports are put in blocking state to prevent loops in the network.
Q14. OSPF LSA types & uses
OSPF LSA types include Router LSA, Network LSA, Summary LSA, and ASBR Summary LSA, each serving different purposes in OSPF routing.
Router LSA: Describes the router's directly connected links.
Network LSA: Represents multi-access networks and lists all routers connected to the network.
Summary LSA: Summarizes routes from one area to another.
ASBR Summary LSA: Summarizes external routes injected into OSPF by an ASBR.
LSA types help OSPF routers build and maintain their routing tabl...read more
Q15. Benefits and advantages
Benefits and advantages of being a Network Engineer include high demand, competitive salary, opportunities for growth, and job security.
High demand for network engineers in various industries
Competitive salary compared to other IT roles
Opportunities for growth and advancement in the field
Job security due to the increasing reliance on technology and networks
Ability to work on cutting-edge technologies and projects
Q16. OSFP and its states
OSPF (Open Shortest Path First) is a routing protocol used in IP networks to determine the best path for data packets.
OSPF has four states: Down, Init, 2-Way, Exstart, Exchange, Loading, and Full.
During the Down state, the router does not have any information about its neighbors.
In the Init state, the router sends Hello packets to discover neighbors.
The 2-Way state is when bidirectional communication is established between neighbors.
Exstart is the state where routers decide w...read more
Q17. VLAN meaning and all
VLAN stands for Virtual Local Area Network, used to segment network traffic for security and efficiency.
VLANs divide a single physical network into multiple logical networks
Each VLAN has its own broadcast domain, reducing network congestion
VLANs can be used to separate different types of traffic, such as voice and data
VLANs are configured at the switch level, assigning ports to specific VLANs
VLANs can improve network security by isolating sensitive data
More about working at TCS
Top HR Questions asked in null
Interview Process at null
Top Network Engineer Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month