Find Interview Questions for Top Companies
Ques:- What are the principles that were applied to arrive at the seven layers in OSI model?
Right Answer:
The principles applied to arrive at the seven layers in the OSI model include:

1. **Modularity**: Each layer is independent and performs a specific function.
2. **Abstraction**: Each layer provides services to the layer above and receives services from the layer below, hiding the complexities of the lower layers.
3. **Interoperability**: Standardized protocols at each layer allow different systems to communicate.
4. **Encapsulation**: Data is packaged with protocol information at each layer, allowing for proper transmission and processing.
5. **Separation of Concerns**: Each layer addresses a specific aspect of networking, simplifying design and troubleshooting.
6. **Layered Architecture**: Each layer can be developed and updated independently, promoting flexibility and scalability.
7. **End-to-End Communication**: Ensures that communication can be established between end systems, regardless of the underlying network technology.
Ques:- What are the reasons for using layered protocols ?
Right Answer:
Layered protocols are used for the following reasons:

1. **Modularity**: Each layer can be developed and updated independently.
2. **Simplification**: Complex processes are broken down into manageable layers.
3. **Interoperability**: Different systems can communicate using standard protocols at each layer.
4. **Encapsulation**: Each layer only needs to interact with the layers directly above and below it, hiding the complexity of the underlying layers.
5. **Flexibility**: Changes in one layer can be made without affecting others, allowing for easier upgrades and maintenance.
6. **Troubleshooting**: Issues can be isolated to specific layers, making it easier to diagnose and fix problems.
Ques:- Enumerate the main responsibilities of data link layer ?
Right Answer:
The main responsibilities of the data link layer are:

1. Framing: Dividing data into frames for transmission.
2. Physical Addressing: Adding MAC addresses to frames for delivery.
3. Error Detection and Correction: Identifying and correcting errors in transmitted frames.
4. Flow Control: Managing data transmission rates to prevent overwhelming the receiver.
5. Access Control: Regulating access to the physical medium to avoid collisions.
Ques:- IP datagram has a checksum field; still, it is called an unreliable protocol. Justify your answer.
Right Answer:

The IP datagram is considered an unreliable protocol because the checksum only verifies the integrity of the header and not the entire packet. It does not guarantee delivery, order, or error recovery; packets can be lost, duplicated, or arrive out of order without any mechanism to address these issues.

Ques:- What do you mean by link to link layers of OSI reference model? Explain their functions briefly?
Right Answer:
The link layer, also known as the Data Link layer, is the second layer of the OSI reference model. It is responsible for node-to-node data transfer and error detection and correction. Its main functions include framing data packets, managing access to the physical medium, and ensuring reliable communication between directly connected devices. It also handles MAC (Media Access Control) addressing to identify devices on the same network segment.
Ques:- Write a short note on ISDN?
Right Answer:
ISDN (Integrated Services Digital Network) is a set of communication standards that allows for the transmission of voice, video, and data over traditional telephone networks. It provides a digital connection that enables higher quality and faster data transfer compared to analog systems. ISDN supports multiple channels, allowing simultaneous calls and data sessions, and is commonly used for teleconferencing and internet access.
Ques:- What is the difference between boundary level masking and non- boundary level masking? Give examples
Right Answer:
Boundary level masking refers to the practice of hiding or altering data at the edges or boundaries of a dataset, often to protect sensitive information while still allowing some data to be visible. For example, masking a credit card number to show only the last four digits (e.g., **** **** **** 1234).

Non-boundary level masking, on the other hand, involves altering data that is not at the edges or boundaries, often by changing the actual values within the dataset. For example, replacing a person's name with a random name (e.g., changing "John Doe" to "Jane Smith") without regard to its position in the dataset.
Ques:- What are the two reasons for using layered protocols?
Right Answer:
1. Modularity: Layered protocols allow for easier updates and maintenance by separating functions into distinct layers.
2. Interoperability: They enable different systems and technologies to communicate by standardizing how data is transmitted across layers.
Ques:- What is the difference between LUN and RAID?
Right Answer:
A LUN (Logical Unit Number) is a logical representation of a storage device that allows a server to access a portion of a storage array, while RAID (Redundant Array of Independent Disks) is a technology that combines multiple physical disks into a single unit for improved performance and redundancy.
Comments
Admin May 17, 2020

A logical unit number (LUN) can refer to an entire physical disk, or a subset of a larger physical disk or disk volume. The physical disk or disk volume could be an entire single disk drive, a partition (subset) of a single disk drive, or a disk volume from a redundant array of independent disks (RAID) controller comprising multiple disk drives aggregated together for larger capacity and redundancy. LUNs are an important factor in managing block storage arrays shared over a SAN. A LUN represents a logical abstraction or, if you prefer, virtualization layer between the physical disk device/volume and the applications

Ques:- Can we extend the range of Wifi with the use of some softwares, if yes, which one? Or is there any hardware to do so, how much will it cost?
Right Answer:
Yes, you can extend the range of Wi-Fi using software like DD-WRT or OpenWRT, which can be installed on compatible routers. Additionally, hardware options include Wi-Fi extenders or mesh systems, which typically cost between $30 to $300 depending on the brand and features.
Ques:- what is computer.
Right Answer:
A computer is an electronic device that processes data, performs calculations, and executes instructions to carry out tasks.
Comments
DK BOSS Jul 14, 2021

A computer is an electronic device that executed thousands of instructions within a second with the help of input and output devices.

Admin May 17, 2020

Computer is a electronic device. Computer is nothing but interconnection of different networks. It can be used to connectivity and communication.

Admin May 17, 2020

computer is electronic machine and input and output data device.

Ques:- what is backup? what are those types and where those are used?
Right Answer:
A backup is a copy of data stored separately to protect against data loss. The main types of backups are:

1. **Full Backup**: A complete copy of all data. Used for comprehensive data protection.
2. **Incremental Backup**: Only backs up data that has changed since the last backup. Used for efficient storage and faster backup times.
3. **Differential Backup**: Backs up data changed since the last full backup. Used for a balance between speed and storage efficiency.
4. **Mirror Backup**: An exact copy of the source data, updated in real-time. Used for immediate data recovery.

These backups are used in various scenarios, such as disaster recovery, data migration, and system restoration.
Comments
Admin May 17, 2020

back up refers to the copying and archiving of computer data
so it may be used to restore the original after a data loss
event with the help of external hard disc,network cable,usb
flash drive.. types are
1.system image backup..
2.system repair disk..

Ques:- can we use pc as router?
Right Answer:
Yes, a PC can be used as a router by configuring it with routing software and connecting it to multiple networks.
Comments
Admin May 17, 2020

Yes we can use a pc as a router provided it has minimum two nic(network interface card) ports.One will be configure for the internal network and one to the external.

Ques:- NFS server + Solaris client + Linux client, all connected at GigE to the same switch. The Linux client is fast but the Solaris client is slow. Explain troubleshooting steps
Right Answer:
1. **Check Network Configuration**: Ensure the Solaris client has the correct IP configuration, subnet mask, and gateway settings.

2. **Verify NFS Version**: Confirm that both the Solaris and Linux clients are using the same NFS version. Mismatched versions can cause performance issues.

3. **Examine Mount Options**: Review the NFS mount options on the Solaris client. Options like `rsize`, `wsize`, and `timeo` can affect performance.

4. **Check Network Performance**: Use tools like `ping` and `iperf` to test network latency and bandwidth between the Solaris client and the NFS server.

5. **Monitor System Resources**: Check CPU, memory, and disk I/O usage on the Solaris client to ensure it’s not resource-constrained.

6. **Review NFS Server Load**: Assess the load on the NFS server to see if it’s overloaded, which could affect performance for the Solaris client.

7.
Comments
Admin May 17, 2020

NFS performance to solaris clients is poor during write.

Ques:- systems on the same switch: A can talk to B; A can talk to C; B cannot talk to C. How do you troubleshoot the problem?
Right Answer:
Check the VLAN configuration on the switch ports for B and C. Ensure that both B and C are in the same VLAN. Also, verify if there are any access control lists (ACLs) or firewall rules that might be blocking communication between B and C.
Comments
Admin May 17, 2020

you have to check network connection between B and C may be
not reach in network

Ques:- Assume you have to build 30 systems (mix of Solaris + Linux) in a brand new place (ie: no existing infrastructure). How do you tackle this?
Right Answer:
1. Assess requirements: Determine the specifications and roles for each system.
2. Plan network layout: Design the physical and logical network topology.
3. Acquire hardware: Purchase or procure the necessary servers, switches, and routers.
4. Set up network infrastructure: Install and configure networking equipment.
5. Install operating systems: Deploy Solaris and Linux on the systems.
6. Configure network settings: Assign IP addresses, set up DNS, and configure firewalls.
7. Implement security measures: Set up user accounts, permissions, and security policies.
8. Install necessary software: Deploy applications and tools required for the systems.
9. Test the setup: Verify connectivity, performance, and security.
10. Document the setup: Create documentation for configurations and procedures for future reference.
Ques:- FILESYSTEM scenario. A volume is filling up and almost out of space. How do you determine what is using up your available filesystem space?
Right Answer:
Use the `du` command to check disk usage of directories and files, and the `df` command to see overall filesystem usage. You can also use tools like `ncdu` for a more user-friendly interface.
Ques:- What is the Rule of 17 concerning mapping devices to FAs?
Right Answer:
The Rule of 17 states that for mapping devices to Fabric Attach (FA) ports, you should allocate 17 devices per FA port to ensure optimal performance and resource utilization.
Ques:- How will you choose between synchronous and asynchronous replication for SRDF?
Right Answer:
Choose synchronous replication for applications requiring zero data loss and low latency, such as financial transactions. Opt for asynchronous replication when distance is a factor, allowing for higher latency and potential data loss, suitable for less critical applications.
Comments
Admin May 17, 2020

In synchronous mode (SRDF/S), the primary array waits until the secondary array has acknowledged each write before the next write is accepted, ensuring that the replicated copy of the data is always as current as the primary. However, the latency due to propagation increases significantly with distance.
Asynchronous SRDF (SRDF/A) transfers changes made to the secondary array in units called delta sets, which are transferred at defined intervals. Although the remote copy of the data will never be as current as the primary copy, this method can replicate data over considerable distances and with reduced bandwidth requirements and minimal impact on host performance.

Ques:- What is zoning/masking/mapping?
Right Answer:
Zoning, masking, and mapping are techniques used in storage area networks (SANs) to control access to storage devices.

- **Zoning**: Divides the SAN into segments, allowing only specific devices to communicate with each other.
- **Masking**: Hides certain storage devices from specific hosts, ensuring that only authorized hosts can see and access particular storage resources.
- **Mapping**: Defines the relationships between hosts and storage devices, specifying which hosts can access which storage resources.


The Networking category on takluu.com is designed for candidates preparing for technical interviews that focus on the principles, protocols, and technologies behind computer networks. Networking knowledge is crucial for roles such as Network Engineer, System Administrator, Security Analyst, and IT Support.

This category covers fundamental and advanced topics including OSI and TCP/IP models, IP addressing and subnetting, routing and switching, network protocols (HTTP, FTP, DNS, DHCP), wireless technologies, and network security. Interview questions also often address firewalls, VPNs, VLANs, NAT, load balancing, and troubleshooting techniques.

Candidates will gain insights into configuring network devices, understanding communication between hardware components, and securing networks against threats. The section also covers emerging trends such as software-defined networking (SDN), cloud networking, and network automation.

Interviewers evaluate your ability to design, implement, and troubleshoot networks efficiently. Scenario-based questions may include diagnosing connectivity issues, optimizing network performance, or configuring secure remote access.

Whether you’re preparing for entry-level or senior networking roles, this category provides comprehensive study material, practical examples, and real-world interview questions to build your confidence and technical expertise.

At Takluu, we focus on blending theory with hands-on knowledge, helping you master networking concepts and succeed in your career.

AmbitionBox Logo

What makes Takluu valuable for interview preparation?

1 Lakh+
Companies
6 Lakh+
Interview Questions
50K+
Job Profiles
20K+
Users