0% found this document useful (0 votes)
59 views3 pages

Networking Interview Questions Guide

Uploaded by

ahmed dawood
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views3 pages

Networking Interview Questions Guide

Uploaded by

ahmed dawood
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Comprehensive Interview Questions & Troubleshooting Guide

Q1: What is the difference between a switch and a router?


Switch: Works at Layer 2 (Data Link), connects devices in the same LAN, uses MAC
addresses.
Router: Works at Layer 3 (Network), connects different networks, uses IP addresses, and
supports routing protocols.

Q2: Explain the OSI Model.


7 Layers: Physical → Data Link → Network → Transport → Session → Presentation →
Application.
Helps to understand networking and troubleshoot layer by layer.

Q3: What is a VLAN and why is it used?


VLAN (Virtual LAN) logically separates networks within the same switch.
Improves security and reduces broadcast traffic.

Q4: Explain Subnetting.


Subnetting divides a network into smaller sub-networks to improve efficiency and security.
Example: [Link]/24 can be split into two /25 subnets.

Q5: Explain the difference between TCP and UDP.


TCP: Connection-oriented, reliable, error checking, e.g. HTTP, FTP.
UDP: Connectionless, faster, less overhead, e.g. DNS, VoIP.

Q6: What is the difference between 2G, 3G, and 4G?


2G: Voice + SMS.
3G: Voice + Data up to few Mbps.
4G: High-speed data, VoLTE, internet-based services.

Q7: What are common KPIs in RAN?


Call Setup Success Rate (CSSR), Drop Call Rate (DCR), Handover Success Rate, Throughput.
Q8: What is a handover in mobile networks?
Handover is the process of transferring an active call/data session from one cell to another.
Types: Hard HO (break before make), Soft HO (make before break).

Q9: What is BSC, RNC, and eNodeB?


BSC: Base Station Controller (2G).
RNC: Radio Network Controller (3G).
eNodeB: Base station in LTE (4G).

Q10: What is Active Directory?


A Microsoft service for managing users, groups, devices, and policies in a Windows domain
network.

Q11: What is DNS and how does it work?


DNS (Domain Name System) resolves domain names (like [Link]) into IP addresses.

Q12: What is a firewall?


A firewall monitors and controls incoming/outgoing network traffic based on security rules.

Scenario 1: A user cannot access the internet, but can ping the local gateway.
1. Check DNS settings.
2. Try pinging a public IP (e.g. [Link]).
3. If ping works → DNS issue.
4. If not → router/ISP issue.

Scenario 2: VLAN 10 users cannot communicate with VLAN 20.


1. Check switch port configuration (Access vs Trunk).
2. Verify VLANs exist.
3. Configure inter-VLAN routing.
Scenario 3: One BTS site is down.
1. Check alarms (power, transmission, hardware).
2. Restart node if needed.
3. Escalate to field team if hardware issue.

Scenario 4: A user’s PC cannot join the domain.


1. Ping the domain controller.
2. Verify DNS settings.
3. Ensure permissions.
4. Try rejoining the domain.

Scenario 5: 3G to 4G handover not working.


1. Check neighbor configuration.
2. Verify HO parameters.
3. Analyze KPI counters.
4. Coordinate with RF team.

Scenario 6: High CPU utilization on a router.


1. Check running processes.
2. Verify configuration loops.
3. Optimize routing protocols.
4. Upgrade hardware if needed.

Scenario 7: User complains of slow network performance.


1. Check device resource usage.
2. Run speed test.
3. Verify switch/router performance.
4. Check for congestion or faulty cables.

Common questions

Powered by AI

Troubleshooting high CPU utilization on a router involves several steps that align with network management best practices. First, examine running processes to identify any outliers consuming excessive resources. Next, check for configuration loops or inefficient routing protocols that may lead to unnecessary CPU usage. Optimizing these protocols by adjusting configurations or updating hardware if necessary follows these initial steps. This methodical approach not only identifies the root cause but also ensures that the network adheres to optimized performance standards, aligning with best practices for efficient network management .

To troubleshoot inter-VLAN communication issues, start by verifying the switch port configurations to ensure they are set correctly as trunk ports, which are necessary for carrying traffic between VLANs. Next, check VLAN configurations on network devices to ensure they are properly created and assigned. Finally, confirm that inter-VLAN routing is enabled and correctly set up on the router or Layer 3 switch. By quickly addressing these issues, potential downtime in critical business operations is minimized, and smooth inter-departmental communications are maintained, thus preventing potential operational bottlenecks .

TCP and UDP differ primarily in their connection requirements and reliability assurances. TCP is connection-oriented and provides reliable communication with error checking and recovery, ensuring data integrity, which makes it suitable for applications like web browsing (HTTP) and file transfer (FTP). In contrast, UDP is connectionless and focuses on speed over reliability, lacking error checking and retransmission features. This makes UDP ideal for applications like streaming and gaming where speed is more critical than data accuracy. These fundamental differences impact network services by dictating the choice of protocol based on the needs of data integrity versus performance .

A network engineer might choose TCP over UDP for a web application due to TCP's reliability features, such as error checking, data recovery, and delivery acknowledgments. These features ensure that data is accurately transmitted in the correct order and is more resilient to packet loss and network errors, which are common in web applications requiring the integrity and confidentiality of client-server communication. Although UDP provides lower latency and is suitable for applications where speed is prioritized over reliability, the mission-critical nature of web applications typically necessitates TCP for its reliability, despite the potential overhead. Furthermore, web applications are often sensitive to data accuracy and require the transaction assurances that TCP can offer .

The OSI Model is an essential framework in networking because it breaks down network processes into seven layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application. This layered approach allows network professionals to isolate and troubleshoot issues methodically by examining each layer independently. For example, if a problem is observed at the Network layer, lower layers can generally be assumed to be functioning correctly. It provides a structured way to address configuration issues or data transmission problems .

Mobile network technologies have evolved significantly over generations. 2G networks focused on enhancing voice and SMS services with digital encoding, offering improved security over analog signals. 3G technologies introduced data services, enabling multimedia services and greater internet connectivity with speeds of a few Mbps. 4G further revolutionized mobile networks with high-speed data services, allowing for VoLTE calls and robust internet applications, through LTE technology. Each generation brought incremental improvements in speed, reliability, and capacity, aligning with consumer demand for enhanced mobile services .

Handover in mobile networks is the process of transferring an active session from one cell to another, crucial for maintaining connectivity and call quality, especially in scenarios where a user is on the move. Successful handovers ensure that calls and data sessions remain uninterrupted, maintaining user experience and network performance. Performance can suffer during handovers if not properly configured, such as failed handovers which can lead to dropped calls or connectivity losses. Different types of handovers like hard and soft handovers are employed to mitigate these issues based on network technology .

DNS, or Domain Name System, plays a crucial role in translating human-readable domain names into IP addresses that computers use to identify each other on a network. It underpins the functionality of the internet by allowing users to navigate easily without having to memorize numerical IP addresses. DNS issues can lead to inability to reach websites and can be diagnosed by checking DNS settings, attempting to ping domain names and IP addresses directly, and ensuring there is no misconfiguration or service downtime affecting DNS resolution .

VLANs (Virtual Local Area Networks) enhance network security by segregating network traffic logically within the same physical network infrastructure, thereby limiting access to sensitive information to authorized users. This segmentation reduces the risk of broadcast storms and limits the spread of potential threats across the entire network. It also optimizes traffic by grouping devices with similar requirements, reducing unnecessary data transmission and improving overall network performance .

Subnetting is the practice of dividing a large network into smaller, more manageable sub-networks (subnets), which enhances network efficiency and security. By having multiple smaller networks, traffic can be directed more efficiently, reducing congestion and potential collisions. It also helps in securing segments of a network, as each subnet can enforce its own set of security policies, limiting the spread of potential threats .

You might also like