Wipro
30+ Factentry Data Solutions Interview Questions and Answers
Q1. What is Stp and how it is work? What is root bridge
STP (Spanning Tree Protocol) is a network protocol that prevents loops in Ethernet networks. It elects a root bridge to manage the network.
STP is a network protocol used to prevent loops in Ethernet networks.
It works by creating a loop-free logical topology by blocking redundant paths.
STP elects a root bridge, which becomes the central point of the network.
The root bridge is the bridge with the lowest bridge ID.
STP uses Bridge Protocol Data Units (BPDUs) to exchange informati...read more
Q2. What is the ranges of the private ip addresses
Private IP addresses ranges are reserved for internal networks and not routable on the internet.
Private IP addresses are used within a local network and are not accessible from the internet
There are three ranges of private IP addresses: 10.0.0.0 - 10.255.255.255, 172.16.0.0 - 172.31.255.255, and 192.168.0.0 - 192.168.255.255
Private IP addresses are commonly used in home and office networks to allow devices to communicate with each other
Q3. What is BGP and its attributes
BGP is a routing protocol used to exchange routing information between different networks.
BGP stands for Border Gateway Protocol.
It is used to connect different autonomous systems (AS) on the internet.
BGP uses path vector routing to determine the best path for data to travel.
BGP attributes include AS path, next hop, local preference, and origin.
AS path is a list of AS numbers that the route has passed through.
Next hop is the IP address of the next router in the path.
Local pre...read more
Q4. What will be the subnet mask for CIDR /29
The subnet mask for CIDR /29 is 255.255.255.248.
CIDR /29 means 29 bits are used for the network portion and 3 bits for the host portion.
To calculate the subnet mask, convert the 29 network bits to 1s and add 3 0s for the host bits.
The result is 255.255.255.248 in dotted decimal notation.
Q5. What is ospf and its LSA types
OSPF is a routing protocol used to exchange routing information between routers in a network.
OSPF stands for Open Shortest Path First
It is a link-state routing protocol
OSPF uses LSAs (Link State Advertisements) to exchange routing information
There are 5 types of LSAs: Router LSA, Network LSA, Summary LSA, ASBR Summary LSA, and External LSA
Each LSA type serves a different purpose in the OSPF network
OSPF is commonly used in large enterprise networks
Q6. Difference between static and default route
Static routes are manually configured while default routes are used when no other route is available.
Static routes are manually configured by the network administrator
Default routes are used when no other route is available
Static routes have a higher priority than default routes
Static routes are more specific than default routes
Example: ip route 192.168.1.0 255.255.255.0 10.0.0.1
Example: ip route 0.0.0.0 0.0.0.0 10.0.0.1
Q7. How can you avoid loop in IBGP and EBGP
To avoid loop in IBGP and EBGP, use route reflectors or confederations.
Use route reflectors to avoid full mesh IBGP and confederations to avoid full mesh EBGP.
Configure the router to not advertise the same prefix received from one neighbor to another neighbor.
Use AS path prepending to influence the path selection in EBGP.
Configure loopback interfaces on routers to avoid the use of physical interfaces in BGP updates.
Use BGP TTL security feature to prevent BGP packets from loop...read more
Q8. What is STP and how DP and RP elected
STP is a protocol used to prevent network loops. DP and RP are elected based on their bridge priority and MAC address.
STP stands for Spanning Tree Protocol
It prevents network loops by blocking redundant paths
Designated Port (DP) is the port that forwards traffic on a segment
Root Port (RP) is the port that has the shortest path to the root bridge
DP and RP are elected based on their bridge priority and MAC address
The bridge with the lowest bridge ID becomes the root bridge
STP r...read more
Q9. What is VLAN
VLAN stands for Virtual Local Area Network. It is a logical grouping of devices on a network based on function, department or application.
VLANs allow network administrators to segment a network into smaller, more manageable groups.
Devices in a VLAN can communicate with each other as if they were on the same physical network, even if they are physically located on different switches.
VLANs can improve network security by isolating sensitive data and restricting access to certai...read more
Q10. How to resolve DNS issue?
DNS issue can be resolved by checking DNS server settings, clearing cache, flushing DNS, and checking network connectivity.
Check DNS server settings and ensure they are correct
Clear DNS cache on the client machine
Flush DNS resolver cache on the DNS server
Check network connectivity and ensure there are no firewall or routing issues
Use tools like nslookup or dig to troubleshoot DNS issues
Q11. What is RT and RD
RT stands for Route Target and RD stands for Route Distinguisher.
RT is used in MPLS VPN to identify which VPN a particular packet belongs to.
RD is used to distinguish between identical routes learned from different VRFs.
RT is a 64-bit value and RD is a 64-bit value or a combination of 32-bit AS number and 32-bit identifier.
Example: RT can be used to route traffic from a specific VPN to a specific service provider.
Example: RD can be used to differentiate between routes learned...read more
Q12. What is Fireball used in hardware
Fireball is not used in hardware.
Fireball is not a term commonly used in the context of hardware.
There is no specific hardware component or technology called Fireball.
It is possible that the interviewer may have made a mistake or referred to a different term.
Q13. What are the ranges of private ip address
Private IP addresses ranges are reserved for use within private networks and are not routable on the internet.
Private IP address ranges include: 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255
These ranges are defined in RFC 1918 and are commonly used in home, office, and enterprise networks
Private IP addresses allow multiple devices to share a single public IP address for internet access
Q14. what is loop and what is the IP
A loop is a sequence of instructions that is continually repeated until a certain condition is met. An IP (Internet Protocol) address is a unique numerical label assigned to each device connected to a computer network.
A loop is used in programming to execute a block of code repeatedly until a specific condition is met.
There are different types of loops such as for loop, while loop, and do-while loop.
An IP address is used to identify and locate devices on a network, allowing t...read more
Q15. What is ABR router.
ABR router stands for Area Border Router, which connects multiple areas in a OSPF network.
ABR router is used in OSPF (Open Shortest Path First) protocol.
It connects multiple areas in a network and acts as a gateway between them.
ABR router maintains separate link-state databases for each area it connects.
It summarizes the routing information between areas to reduce the size of the routing table.
Example: In a company network, ABR router connects the main office area with the br...read more
Q16. What is bgp and its type
BGP (Border Gateway Protocol) is an exterior gateway protocol used in internet routing. It is used to exchange routing information between different autonomous systems.
BGP is used to connect different autonomous systems (AS) on the internet.
It is a path-vector protocol that determines the best path for data packets to travel between AS.
BGP has two main types: eBGP (External BGP) and iBGP (Internal BGP).
eBGP is used to exchange routing information between different AS, while i...read more
Q17. What is subnet and its type
A subnet is a logical subdivision of an IP network. It allows for efficient use of IP addresses and helps in network management.
Subnets divide a larger network into smaller, more manageable networks.
They are created by borrowing bits from the host portion of an IP address.
Subnetting helps in reducing network congestion and improving security.
Types of subnets include Classful Subnetting, Classless Inter-Domain Routing (CIDR), and Variable Length Subnet Masking (VLSM).
Q18. What is Ospf ?
OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data to travel in a network.
OSPF is a link-state protocol that uses Dijkstra's algorithm to calculate the shortest path between two points.
It is used in large enterprise networks and is designed to scale well.
OSPF routers exchange information about their connected networks and use this information to build a topology map of the network.
This topology map is used to determine the best path...read more
Q19. Why is Osi what Is BtP
OSI is a reference model for network communication. BtP stands for Business-to-Peer, a type of e-commerce model.
OSI (Open Systems Interconnection) is a conceptual model that describes how data is transmitted over a network.
It has seven layers, each with a specific function.
BtP is a type of e-commerce model where businesses sell products or services directly to individuals.
It is also known as B2P (Business-to-Peer).
Q20. What is BGP ?
BGP stands for Border Gateway Protocol. It is a routing protocol used to exchange routing information between different networks.
BGP is used in large-scale networks such as the internet.
It is a path-vector protocol that selects the best path for data to travel between networks.
BGP uses TCP port 179 for communication.
It is used to connect different autonomous systems (AS) together.
BGP is used to prevent routing loops and ensure efficient routing.
An example of BGP in action is ...read more
Q21. What is mpls, description in brief
MPLS stands for Multiprotocol Label Switching, a technique used in telecommunications networks to direct data packets along predefined paths.
MPLS is used to improve network performance and efficiency by quickly routing data packets based on labels instead of IP addresses.
It allows for traffic engineering, quality of service (QoS) prioritization, and virtual private network (VPN) services.
MPLS is commonly used by service providers to offer services like MPLS VPN, MPLS TE, and ...read more
Q22. Switch is which layer used
Switch is used at the data link layer of the OSI model.
Switches operate at Layer 2 of the OSI model.
They use MAC addresses to forward data within a local area network (LAN).
Switches improve network performance by reducing collisions and providing dedicated bandwidth.
Examples of switches include Ethernet switches and VLAN switches.
Q23. What is osi model
The OSI model is a conceptual framework that standardizes the functions of a communication system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It was developed by the International Organization for Standardization (ISO) in 1984.
The model divides the communication process into seven layers, each with its own specific functions.
The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer interacts wi...read more
Q24. Difference between L2 &L3 switch?
L2 switch operates at the data link layer and forwards packets based on MAC addresses, while L3 switch operates at the network layer and forwards packets based on IP addresses.
L2 switch operates at the data link layer of the OSI model.
L2 switch forwards packets based on MAC addresses.
L2 switch is typically used for creating LANs.
L3 switch operates at the network layer of the OSI model.
L3 switch forwards packets based on IP addresses.
L3 switch is capable of routing packets bet...read more
Q25. What is ip address
An IP address is a unique numerical label assigned to each device connected to a computer network.
IP address stands for Internet Protocol address.
It is used to identify and locate devices on a network.
IP addresses can be either IPv4 (32-bit) or IPv6 (128-bit) format.
IPv4 addresses are written in the form of four sets of numbers separated by periods (e.g., 192.168.0.1).
IPv6 addresses are written in the form of eight groups of four hexadecimal digits separated by colons (e.g., ...read more
Q26. Which layer is 2nd
The 2nd layer in the network model is the Data Link Layer.
The Data Link Layer is responsible for the physical addressing of devices on the network.
It ensures reliable transmission of data over the physical layer.
Examples of protocols at this layer include Ethernet, Wi-Fi, and PPP.
Q27. What is Virtual LAN?
Virtual LAN (VLAN) is a network technology that allows for the segmentation of a single physical network into multiple virtual networks.
VLANs help improve network security by isolating traffic within specific groups or departments.
They can also improve network performance by reducing broadcast traffic.
VLANs are configured at the switch level and can span multiple switches.
Each VLAN operates as a separate network, even though they share the same physical infrastructure.
VLANs a...read more
Q28. Explain OSI model and also
The OSI model is a conceptual framework for understanding network communication.
OSI stands for Open Systems Interconnection.
It has 7 layers, each with a specific function.
The layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer communicates with the layer above and below it.
Example: When you visit a website, the Application layer sends a request to the Transport layer, which breaks it into smaller packets and sends it to the N...read more
Q29. Different between tcp and udp
TCP is a reliable, connection-oriented protocol while UDP is a fast, unreliable, connectionless protocol.
TCP provides guaranteed delivery of data packets while UDP does not.
TCP ensures data integrity through error checking and retransmission of lost packets.
UDP is faster and more efficient for real-time applications like video streaming or online gaming.
TCP is used for applications that require reliable and ordered delivery of data, such as web browsing or file transfer.
UDP i...read more
Q30. Blah concept Wht is Stp
STP stands for Spanning Tree Protocol, a network protocol used to prevent loops in a network topology.
STP is used to prevent broadcast storms and network congestion caused by loops in a network.
It works by creating a logical tree structure of the network, with one root bridge and multiple non-root bridges.
STP blocks redundant links to prevent loops, but can quickly activate them if the active link fails.
There are different versions of STP, such as Rapid Spanning Tree Protocol...read more
Q31. What is a submitting
A subnetting is the process of dividing a network into smaller subnetworks.
Subnetting helps in optimizing network performance and security.
It allows for efficient use of IP addresses.
Subnetting involves creating subnets with their own unique network addresses.
Q32. What is a router
A router is a networking device that forwards data packets between computer networks.
Routes data packets between different networks
Uses IP addresses to determine where to send data
Acts as a gateway for devices to connect to the internet
Can prioritize certain types of traffic for better performance
Q33. What is ospf explain
OSPF (Open Shortest Path First) is a routing protocol used to find the best path for data packets in a network.
OSPF is a link-state routing protocol
It uses Dijkstra's algorithm to calculate the shortest path
OSPF routers exchange link-state advertisements (LSAs) to build a topology map
It supports VLSM (Variable Length Subnet Masking) and CIDR (Classless Inter-Domain Routing)
OSPF divides the network into areas to reduce routing table size and improve scalability
Q34. Any shifts are comfortable
I am comfortable with any shifts, including nights, weekends, and holidays.
I am flexible and adaptable to different work schedules
I have experience working night shifts and weekends in previous roles
I understand the importance of maintaining network operations 24/7, which may require working non-traditional hours
Top HR Questions asked in Factentry Data Solutions
Interview Process at Factentry Data Solutions
Top Network Engineer Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month