Platform Interview Questions
Platform Interview Questions
OSI Model
1. Can you explain the OSI model and the role of each layer?
The OSI model has 7 layers:
• Physical: Deals with hardware and transmission of raw bits (e.g., cables, switches).
• Data Link: Handles error-free data transfer between adjacent nodes (e.g., MAC, Ethernet).
• Presentation: Formats data for the application layer (e.g., encryption, compression).
4. What is the main difference between the Presentation layer and the Application layer?
The Presentation layer handles data translation, encryption, and compression. The Application layer
provides network services directly to the end user.
TCP/IP Model
1. How do you calculate the subnet mask for a given number of subnets?
Use the formula:
Number of subnets=2n\text{Number of subnets} = 2^n
Where nn is the number of borrowed bits. Subtract nn from the default subnet mask.
2. If you are given an IP address of 192.168.1.0/24, how many hosts can you accommodate?
With /24, there are 232−24=2562^{32-24} = 256 total addresses. Subtract 2 for network and broadcast
addresses, so 254 hosts.
3. What is CIDR, and how does it differ from traditional classful addressing?
CIDR (Classless Inter-Domain Routing) allows flexible subnetting by using prefixes (e.g., /24) instead of
fixed class ranges (Class A, B, C).
4. Can you explain VLSM (Variable Length Subnet Masking) and its applications?
VLSM allows subnets of different sizes, maximizing IP address utilization (e.g., dividing /24 into /28 for
small networks).
Routing Protocols
3. What is the primary function of EIGRP, and how does it differ from OSPF?
EIGRP is Cisco proprietary, uses metrics like bandwidth and delay, and is less resource-intensive than
OSPF.
Switching Concepts
2. Can you explain the role of STP and how it prevents loops in a network?
STP (Spanning Tree Protocol) prevents switching loops by creating a loop-free topology using algorithms
like Root Bridge selection.
• Access ports: Connect end devices, carry traffic for one VLAN.
2. Can you explain how NAT (Network Address Translation) works and its types?
NAT translates private IPs to a public IP for internet access. Types:
• Static NAT
• Dynamic NAT
3. Can you explain how to trace routing issues using tools like traceroute?
Traceroute maps the path packets take, helping locate delays or failures.
1. What are access control lists (ACLs), and how are they implemented?
ACLs filter traffic based on rules. They can be applied on routers or firewalls (e.g., permit/deny IPs,
ports).
3. Can you explain the different types of VPNs and their use cases?
These answers provide a solid foundation for technical discussions during an interview.
1. Discover: The client broadcasts a DHCP discover message to find available DHCP servers.
2. Offer: The DHCP server replies with an offer, providing an available IP address and
configuration details.
3. Request: The client requests the offered IP address by sending a DHCP request message.
4. Acknowledge: The server sends a DHCP acknowledgment to confirm the lease of the IP
address.
• Subnetting: The process of dividing a larger network into smaller, manageable sub-networks
(subnets). It is used to optimize IP address allocation and improve security.
• Supernetting: The process of combining multiple smaller networks into a larger one. It is
typically used for route aggregation in the internet backbone.
3. The root server directs the resolver to a Top-Level Domain (TLD) server (e.g., .com).
4. The TLD server directs the resolver to the authoritative DNS server for the domain.
1. Physical
2. Data Link
3. Network
4. Transport
5. Session
6. Presentation
7. Application
2. Internet (Network)
3. Transport (Transport)
The OSI model is theoretical and provides detailed functionality, whereas the TCP/IP model is practical
and widely implemented.
1. SYN (Synchronize): The client sends a SYN packet to initiate the connection.
3. ACK (Acknowledge): The client replies with an ACK packet to confirm the connection.
o Used for routing between different autonomous systems (AS) on the internet.
o Maintains routing tables and policies for the best path selection based on metrics like
AS-path.
• Port Roles:
o Root Port (RP): The port with the best path to the root bridge.
o Designated Port (DP): The port on a network segment that has the best path to the root.
• Convergence Process:
o STP recalculates roles and status during topology changes. Ports transition through:
1. Blocking
2. Listening
3. Learning
4. Forwarding
9. Can you explain networking protocols, TCP/IP model, UDP, and Linux commands?
• Networking Protocols: Define rules for data exchange, e.g., HTTP, FTP, SSH.
• Linux Commands:
10. What steps would you take to troubleshoot if the internet is not working?
1. Check Hardware: Verify cables, router, and modem connections.
1. Can you provide examples of 2-3 puzzles that you have encountered or solved?
Here are some examples of technical puzzles and challenges:
o Problem: A network application showed intermittent packet losses during peak hours.
o Solution: By analyzing packet flows using tcpdump, it was discovered that the issue
stemmed from buffer overruns at the switch level. Increasing buffer size and optimizing
flow control resolved the issue.
o Solution: Investigated the issue and found that the server clocks were out of sync,
causing SSL certificate validation errors. Syncing the servers with NTP (Network Time
Protocol) resolved the problem.
o Solution: Reconfigured the subnets to use unique ranges and updated the routing tables
to eliminate conflicts.
2. Explain networking models and how the internet works, including all processes involved.
• Networking Models:
2. Data Link
3. Network
4. Transport
5. Session
6. Presentation
7. Application
1. Network Interface
2. Internet
3. Transport
4. Application
2. Routing: Packets are routed from the source to the destination using routing protocols like OSPF,
BGP.
3. Data Transmission: TCP (reliable) or UDP (fast) transports the data packets.
4. Response: The destination processes the request (e.g., an HTTP GET request) and sends the
response back.
5. Security and Encryption: Protocols like HTTPS, TLS ensure secure communication.
• Experience Summary:
o Hands-on experience with networking tools like ifconfig, ping, netstat, and tcpdump.
o Worked with file permissions, user management, and cron jobs for scheduling tasks.
o Debugged application and system logs using tools like journalctl and tail.
o Experience with Linux distributions like Ubuntu, CentOS, and Red Hat Enterprise Linux.
• Experience Summary:
o Developed system-level programs and utilities in C, including custom network tools and
parsers.
o Proficient in pointers, memory allocation (malloc, free), and data structures (linked lists,
queues, stacks).
o Worked on projects that required interfacing with hardware using C libraries and low-
level APIs.
Technical Questions
• NAT (Network Address Translation) allows multiple devices on a private network to access the
internet using a single public IP address.
• How it works: NAT translates private IP addresses into the public IP address of the router when
devices communicate with external networks. Replies are routed back to the originating device
using NAT mappings.
• Static Routing: Manually configured routes; suitable for small, predictable networks. Requires
manual updates for changes.
• Dynamic Routing: Uses protocols like OSPF, EIGRP, or BGP to automatically discover and update
routes. Adapts to network changes but requires more resources.
3. How do you check disk usage on a Linux server?
Answer:
• Containers: Lightweight, share the host OS kernel, and are isolated using namespaces (e.g.,
Docker).
• VMs: Run on a hypervisor, with each VM having its own OS, making them heavier and slower to
start than containers.
1. Use ping and traceroute to identify where packets are being dropped.
2. Check device logs and metrics for resource usage (CPU, memory, buffer).
4. Use tools like Wireshark to capture and analyze traffic for anomalies.
Situational Questions
1. A user reports slow access to a website. How would you troubleshoot the issue?
Answer:
2. Test website access using ping, traceroute, and curl to measure response times.
2. Your server’s disk space is nearly full. What steps would you take to resolve this?
Answer:
Behavioral Questions
• During peak hours, a critical application slowed down due to high database load.
• I identified inefficient queries using slow query logs and optimized indexes.
• Implemented read replicas to balance the load, resolving the issue without downtime.
2. How do you prioritize tasks when working under tight deadlines?
Answer:
Hands-On Questions
1. Write a Linux shell command to find and delete files older than 7 days in a directory.
Answer:
FROM table_name
GROUP BY column_name
These answers are designed to demonstrate strong problem-solving and technical expertise. Let me
know if you want further elaboration!
Here are more Platform Operations Engineer interview questions with detailed answers, expanding on
technical, situational, and hands-on domains:
Technical Questions
1. Explain the OSI and TCP/IP models.
Answer:
• TCP/IP Model: A simplified 4-layer model (Application, Transport, Internet, Network Access) that
focuses on practical implementation.
• Example: Sending an email involves the Application layer (SMTP), Transport layer (TCP for
reliable delivery), Internet layer (IP for addressing), and Network Access layer (Ethernet/Wi-Fi).
• Subnetting: Dividing a network into smaller sub-networks to improve efficiency and security.
Example: Splitting a /24 network (256 IPs) into /26 subnets (64 IPs each).
• Supernetting: Combining smaller networks into a larger one for easier routing (also called CIDR).
Example: Aggregating two /26 networks into a /25.
• Interior Gateway Protocols (IGPs): OSPF (link-state), EIGRP (hybrid), RIP (distance-vector).
• Exterior Gateway Protocols (EGPs): BGP, which manages routing between autonomous systems
on the internet.
• BGP: Uses path vector logic with attributes like AS_PATH and NEXT_HOP to determine the best
routes. Often used for load balancing and ISP-level routing.
o Port Roles:
o Port Status:
▪ Listening, Learning, Forwarding, Blocking.
o Convergence: Occurs when all switches agree on the Root Bridge and active topology.
Situational Questions
1. Local Troubleshooting:
3. DNS Issues:
1. Initial Checks:
2. Hardware/Resource Issues:
3. How would you ensure zero downtime during a critical server upgrade?
Answer:
Hands-On Questions
1. Write a script to monitor CPU usage on a Linux server and alert if it exceeds 80%.
Answer:
#!/bin/bash
threshold=80.0
echo "CPU usage is above threshold: $cpu_usage%" | mail -s "High CPU Alert" [email protected]
fi
2. tcpdump -i eth0
3. Filter traffic to/from a specific IP:
1. Edit crontab:
2. crontab -e
Advanced Questions
• Use load balancers (e.g., AWS ELB or Nginx) to distribute traffic across multiple instances.
• TCP: Reliable, connection-oriented, and ensures data delivery (e.g., HTTP, FTP).
• UDP: Lightweight, connectionless, suitable for real-time data (e.g., video streaming, DNS).
• Kubernetes uses the Horizontal Pod Autoscaler (HPA) to adjust the number of pods based on
CPU/memory usage or custom metrics.
• Example:
• apiVersion: autoscaling/v2
• kind: HorizontalPodAutoscaler
• spec:
• scaleTargetRef:
• apiVersion: apps/v1
• kind: Deployment
• name: my-app
• minReplicas: 2
• maxReplicas: 10
• metrics:
• - type: Resource
• resource:
• name: cpu
• targetAverageUtilization: 70
If you'd like even more examples or specific topics explained, let me know!