Interview Questions: Network Engineer/System Engineer

What is a node and links?

In a network the devices at different endpoint located at a different location are called nodes and the physical communication medium they using is called links.


Describe Domain Name System

There are two types of client/server programs:

● First is used directly by the user, such as e­mail

● Second supports other application programs

The Domain Name System (DNS) is a supporting program that is used by other programs such as to find the IP address of an e­mail recipient.


What are the difference between Domain and Workgroup?

Find the difference between domain and workgroup:

Domain

● Server is responsible for data safety

● Centralize administration

● Main aim is to secure data

● Best suite in company environments

Workgroup

● Every PC is responsible for its own security

● No centralize administration

● Main aim to save hardware resource

● Best suite in the school, training institute, cyber cafe


Define Fully Qualified Domain Name and Partially Qualified Domain Name

In hierarchical namespace, names are defined in an inverted­ tree structure with the root at the top. The tree can have only 128 levels: level 0 (root) to level 127. Each node in the tree has a label, which is a string with a maximum of 63 characters. The root label is a null string (empty string). In this tree, all the labels have a different name, which guarantee the uniqueness of the domain names. A full domain name is a sequence of labels separated by dots (.). The domain names are always read from the node up to the root. 

● Fully Qualified Domain Name 

If a label is terminated by a null string or empty string, it is called a fully qualified domain name (FQDN).

● Partially Qualified Domain Name

If a label is not terminated by a null string, it is called a partially qualified domain name (PQDN). A PQDN starts from a node, but it does not end with the root.


Describe attenuation, distortion, and noise in brief

Attenuation 

When a signal travels through a medium, it loses some of its energy due to resistance of the medium. This loss of energy is called the Attenuation. This is the reason why a wire carrying electric signals gets warm. Some of the electrical energy in the signal is converted to heat. To overcome this problem, amplifiers are used to amplify the signal. Unit of the decibel is used to find out if a signal has lost or gained strength. The decibel (dB) measures the relative strengths of two signals or one signal at two different points. If decibel is negative then a signal is attenuated and if the positive signal is amplified.

Formula: Where PI and P2 are the variable and the powers of a signal at points 1 and 2, respectively.

Distortion

When the signal travels through the medium from one point to another it may chance to change the form or shape of the signal. It is called distortion. Distortion can occur in a composite signal made up of different frequencies. Each signal component has its own propagation speed through a traveling medium and, therefore, its own delay in reaching the final destination. Means signal components at the receiver have phases different from what they had at the sender.

Noise

The third cause of impairment is Noise. Following types of noise are possible.

➢ Thermal noise.

➢ Induced noise.

➢ Crosstalk noise.

➢ Impulse noise.

This noise may corrupt the signal. 

Thermal noise is produced due to the random motion of electrons in a wire which creates an extra signal not originally sent by the transmitter. 

Induced noise comes from sources such as motors and other electronic appliances. These devices act as a sending antenna, and the transmission medium acts as the receiving antenna. 

Crosstalk is the effect of one wire on the other. 

Impulse noise comes from power lines, lightning etc.


What is IP?

An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication.


What are the difference between hub and switch?

Hub is a layer 1 device. It will out the signal from all of its port except the one from where it’s insert. It is unable to detect the collision. It works on single collision and a single broadcast domain. 

Switch is layer 2 device. It maintains a CAM table that store the MAC address of devices attached to its port. CAM table is used to make the forwarding decision. It works on per port collision and single broadcast domain.


What is MAC Address? and how many bits are of Ethernet Address?

MAC Address is a unique 6-byte (48-bit) address that is usually permanently burned into a network interface card (NIC) or other physical-layer networking device and that uniquely identifies the device on an Ethernet-based network.

A MAC address is also known as an Ethernet address, hardware address, physical address, or PHY address.


How does a "tracert/traceroute/tracepath" command work?

The tracert command is a Command Prompt command that's used to show several details about the path that a packet takes from the computer or device you're on to whatever destination you specify. 

i.e. A tracert/traceroute is a function which traces the path from one network to another. It allows us to diagnose the source of many problems.

The tracert command is available from within the Command Prompt in all Windows operating systems. The Unix/Linux traceroute command uses a slightly different set of TCP/IP messages and responses to accomplish the same result.


What is Spanning Tree?

Spanning Tree Protocol (STP) is a Layer 2 protocol that runs on bridges and switches. The specification for STP is IEEE 802.1D. The main purpose of STP is to ensure that you do not create loops when you have redundant paths in your network. That is a loop-free logical topology for Ethernet networks. The basic function of STP is to prevent bridge loops and the broadcast radiation that results from them.


DNS full form

In simple terms, a Domain Name System (DNS) is a collection of databases that translate hostnames to IP addresses.

Differentiate between forward lookup and reverse lookup in DNS?

Forward Lookup: Name to IP resolution

Reverse Lookup: IP to Name resolution.


 How many bits of IPv4 and IPv6?

IPv4 addresses are 32-bit numbers that are typically displayed in dotted decimal notation and contains two primary parts: the network prefix and the host number.

IPv6 addresses consist of 128 bits, instead of 32 bits, and include a scope field that identifies the type of application suitable for the address. IPv6 does not support broadcast addresses, but instead uses multicast addresses for broadcast. In addition, IPv6 defines a new type of address called anycast.


What is IPSec?

IPSec provides data security at the IP Packet Level.


NTFS full form

NTFS stands for New Technology File System is a proprietary file system developed by Microsoft.


Write at least 2 file system names of windows.

FAT
exFAT
NTFS
WinFS
ReFS


Write mail client names.

Mailbird (Windows)
Thunderbird (Windows, macOS, Linux, and FreeBSD)
Postbox (Windows and macOS)
eM Client (Windows and macOS)
Mailspring (Windows, macOS, and Linux)
Airmail (macOS and iOS)
Microsoft Outlook (Windows and macOS)


What is NMS?

A network management system (NMS) is an application or set of applications that lets network administrators manage a network's independent components inside a bigger network management framework. 

A network management system is useful in:

Network device discovery
Network device monitoring
Network performance analysis
Network device management
Intelligent notifications, or customizable alerts

What is a File System?

A file system is a means to organize data expected to be retained after a program terminates by providing procedures to store, retrieve and update data, as well as manage the available space on the device(s) which contain it. File system formats define the way that data file is stored on storage media and they affects a file system's structure.


What is MAC Flooding?

MAC Flooding is one of the most common network attacks. Unlike other web attacks,  MAC Flooding is not a method of attacking any host machine in the network, but it is the method of attacking the network switches. However, the victim of the attack is a host computer in the network. We are going to see what the MAC Flooding is and how can we prevent it.


Differences between Layer 2 and Layer 3 switches.

Layer 2 Switch

Layer 3 Switch

Operates on layer 2 (Data link) of OSI model.

Operates on layer 3 (Network Layer) of OSI model.

Send “frames” to the destination on the basis of MAC address.

Route Packet with help of IP address

Work with MAC address only

Can perform functioning of both 2 layer and 3 layer switch

Used to reduce traffic on the local network.

Mostly Used to implement VLAN (Virtual Local area network)

Quite fast as they do not look at the Layer 3 portion of the data packets.

Takes time to examine data packets before sending them to their destination

It has single broadcast domain

It has multiple broadcast domains.

Can communicate within a network only.

Can communicate within or outside the network.



What is the timeout for MAC table entries?

300 sec

What is the difference between half-duplex and full-duplex?

In a half-duplex, information can flow in both directions but not simultaneously. While in full-duplex, information can flow in both directions simultaneously.


What are Unicast, Multicast, and Broadcast?

Unicast communication is from a device on the network to another device on the network.

Multicast communication is from a device on the network to many, but not all, devices on the network.

Broadcast communication is from devices on the network to all devices on the network. 


*****

0 Comments