Filter interviews by
Top trending discussions
I applied via Company Website and was interviewed before Mar 2023. There was 1 interview round.
I applied via Company Website and was interviewed before Nov 2020. There was 1 interview round.
A network is a group of interconnected devices that communicate with each other to share resources and information.
Networks can be wired or wireless
They can be local (LAN) or wide area (WAN)
They use protocols such as TCP/IP to facilitate communication
Examples include the internet, corporate networks, and home networks
The basic steps of network troubleshooting involve identifying the problem, gathering information, isolating the issue, testing solutions, and implementing fixes.
Identify the problem by gathering information from the user or monitoring tools
Isolate the issue by checking connectivity, configurations, and logs
Test potential solutions by implementing changes or using diagnostic tools
Implement fixes by applying changes to ...
VLAN stands for Virtual Local Area Network. It is a logical grouping of devices on a network based on function, project, or application.
VLANs allow network administrators to segment a network into smaller, more manageable groups.
Each VLAN is a separate broadcast domain, which means that broadcasts sent by a device in one VLAN are not seen by devices in other VLANs.
There are two types of VLANs: port-based VLANs and tag-...
STP stands for Spanning Tree Protocol. Port Fast is a feature in STP that allows a port to bypass the listening and learning states.
STP is a protocol used to prevent loops in a network by blocking redundant paths
It works by electing a root bridge and calculating the shortest path to it
Port Fast is a feature that allows a port to immediately transition to forwarding state, bypassing the listening and learning states
It i...
OSPF is a routing protocol used in IP networks to distribute IP routing information.
OSPF stands for Open Shortest Path First
It is a link-state routing protocol
OSPF packets include Hello, Database Description, Link State Request, Link State Update, and Link State Acknowledgement
Hello packets are used to establish and maintain neighbor relationships
Database Description packets are used to exchange information about the c...
A router is a networking device that forwards data packets between computer networks.
Routers operate at the network layer of the OSI model.
They use routing tables to determine the best path for data to travel.
Routers can connect different types of networks, such as LANs and WANs.
Examples of routers include Cisco, Juniper, and TP-Link.
Routers can provide security features such as firewalls and VPNs.
L2 switches operate at the data link layer and L3 switches operate at the network layer.
L2 switches forward traffic based on MAC addresses while L3 switches forward traffic based on IP addresses.
L2 switches are simpler and less expensive than L3 switches.
L3 switches can perform routing functions and support multiple VLANs while L2 switches cannot.
L3 switches are used in larger networks where routing and VLANs are neces...
A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Firewall acts as a barrier between a trusted internal network and an untrusted external network.
It filters network traffic based on IP addresses, ports, protocols, and other criteria.
Firewalls can be hardware-based or software-based.
They can be configured to allow or block speci...
Policy is a set of rules or guidelines that dictate how a network should be managed and used.
Identify the purpose of the policy
Define the scope of the policy
Determine the target audience
Create the policy document
Communicate the policy to all stakeholders
Enforce the policy and regularly review and update it
posted on 21 Aug 2024
STP loop prevention is achieved by blocking redundant paths in a network to prevent loops.
STP (Spanning Tree Protocol) identifies redundant paths in a network
STP selects a root bridge to be the central point of the network
STP blocks certain ports to prevent loops while still allowing for redundancy
If a link fails, STP will unblock a previously blocked port to maintain connectivity
posted on 30 Jan 2024
I applied via Naukri.com and was interviewed in Dec 2023. There was 1 interview round.
STP stands for Spanning Tree Protocol.
STP is a network protocol used to prevent loops in Ethernet networks.
It works by creating a loop-free logical topology by blocking redundant paths.
STP elects a root bridge and calculates the shortest path to it for each network segment.
It uses Bridge Protocol Data Units (BPDU) to exchange information between switches.
STP is defined by the IEEE 802.1D standard.
The main function of the Root bridge switch is to control the flow of data traffic in a spanning tree network.
The Root bridge switch is elected as the central point of the spanning tree network.
It determines the shortest path for data traffic to reach all other switches in the network.
The Root bridge switch sends Bridge Protocol Data Units (BPDUs) to other switches to exchange information and maintain the spanning tree...
The IP address works at Layer 3 of the OSI model. Assigning an IP address on a Layer 2 switch is not possible.
IP addresses are used for network layer communication (Layer 3)
Layer 2 switches operate at the data link layer (Layer 2)
Layer 2 switches use MAC addresses for communication within a local network
IP addresses are assigned to devices connected to Layer 2 switches, not to the switch itself
DNS uses port number 53. It works by translating domain names into IP addresses and vice versa.
DNS stands for Domain Name System.
Port number 53 is used for both TCP and UDP protocols.
DNS works by resolving domain names to their corresponding IP addresses.
It uses a hierarchical distributed database system.
DNS queries and responses are sent over port 53.
DNS operates through a client-server model.
Example: When you type a ...
DHCP DORA process is the sequence of steps followed by a client to obtain an IP address from a DHCP server.
DORA stands for Discover, Offer, Request, and Acknowledge.
Discover: Client broadcasts a DHCP Discover message to find available DHCP servers.
Offer: DHCP servers respond with DHCP Offer messages containing IP address lease information.
Request: Client selects one DHCP Offer and sends a DHCP Request message to reques...
2G, 3G, and 5G are different generations of mobile network technology.
2G refers to second-generation mobile network technology, which primarily provided voice and basic data services.
3G refers to third-generation mobile network technology, which introduced faster data speeds and enabled mobile internet access.
5G refers to fifth-generation mobile network technology, which offers significantly faster data speeds, lower l...
The HTTPS port number is 443.
HTTPS uses port 443 for secure communication.
It is the default port for secure HTTP connections.
HTTPS encrypts data using SSL/TLS protocols.
Examples: https://www.example.com:443 or https://192.168.0.1:443
The HTTP port number is 80.
The default port number for HTTP is 80.
It is used for communication between web servers and clients.
Other common port numbers for HTTP include 8080 and 8888.
SSH port number is 22. SSH service is used for secure remote access and secure file transfer.
SSH port number is 22 by default
SSH stands for Secure Shell
SSH service provides secure remote access to servers
It encrypts the data transmitted over the network
SSH service is used for secure file transfer (SFTP) and remote command execution
It provides authentication and encryption for secure communication
The OSI model is a conceptual framework that standardizes the functions of a communication system into seven layers.
Layer 1 (Physical): Deals with the physical transmission of data over the network.
Layer 2 (Data Link): Provides error-free transmission of data frames between nodes on the same network.
Layer 3 (Network): Handles routing and logical addressing to enable data transfer between different networks.
Layer 4 (Tra...
The TCP/IP model is a network protocol suite that defines how data is transmitted over the internet.
The TCP/IP model consists of four layers: Network Interface, Internet, Transport, and Application.
It is used in the current scenario because it provides a standardized framework for communication between devices on a network.
The TCP/IP model allows for reliable and efficient data transmission, ensuring that data packets ...
DTP (Dynamic Trunking Protocol) is a Cisco proprietary protocol used to negotiate trunking between switches.
DTP is used to automatically negotiate trunking on a link between Cisco switches.
It allows switches to dynamically form trunk links without manual configuration.
DTP operates in three modes: dynamic auto, dynamic desirable, and trunk.
Dynamic auto mode waits for the other end to initiate trunking.
Dynamic desirable ...
I have worked on various router devices and vendors.
Cisco routers (e.g. Cisco 2900 series)
Juniper routers (e.g. Juniper MX series)
Huawei routers (e.g. Huawei NE series)
MikroTik routers (e.g. MikroTik RB series)
I applied via Newspaper Ad and was interviewed in Jul 2022. There were 2 interview rounds.
Coding test contains 2 questions
I applied via Campus Placement and was interviewed in Jul 2023. There were 4 interview rounds.
posted on 22 Aug 2024
I applied via Recruitment Consulltant and was interviewed in Feb 2024. There were 3 interview rounds.
GD for Any particular topic
I was interviewed in Mar 2024.
DHCP is a network protocol that dynamically assigns IP addresses to devices on a network. DORA process involves Discover, Offer, Request, and Acknowledge stages.
DHCP Discover: Client broadcasts a request for IP address
DHCP Offer: Server responds with an available IP address
DHCP Request: Client requests the offered IP address
DHCP Acknowledge: Server confirms the IP address assignment
A personal computer communicates with a web application through a series of steps involving network protocols.
The computer sends a request to the web application's server using the HTTP protocol.
The server processes the request and sends back a response containing the requested information.
The communication is facilitated by the TCP/IP protocol stack.
Data is transmitted over the internet using IP addresses and domain n...
SSL handshake is a process where a client and server establish a secure connection by exchanging encryption keys and verifying identities.
Client sends a hello message to server with supported encryption algorithms
Server responds with its own hello message, including its certificate
Client verifies server's certificate and generates a pre-master secret
Both client and server use the pre-master secret to generate a unique ...
ARP (Address Resolution Protocol) is a protocol used for mapping an IP address to a MAC address.
ARP is used to resolve IP addresses to MAC addresses on a local network.
There are two main types of ARP: ARP Request and ARP Reply.
ARP Request is sent by a device to find the MAC address of another device with a known IP address.
ARP Reply is sent in response to an ARP Request, providing the MAC address of the requested IP ad
based on 1 review
Rating in categories
Junior Engineer
1.6k
salaries
| ₹1.1 L/yr - ₹3.7 L/yr |
Assistant Engineer
696
salaries
| ₹1.5 L/yr - ₹4.2 L/yr |
Senior Software Engineer
347
salaries
| ₹4.9 L/yr - ₹18.2 L/yr |
Embedded Software Engineer
309
salaries
| ₹3.2 L/yr - ₹9.2 L/yr |
Technical Lead
304
salaries
| ₹7 L/yr - ₹24 L/yr |
Sasken
Happiest Minds Technologies
L&T Technology Services
LTIMindtree