i
Ciena
Filter interviews by
Clear (1)
I applied via Company Website and was interviewed in Jan 2024. There were 2 interview rounds.
U-boot hands off control to Linux kernel during boot process.
U-boot loads Linux kernel image into memory
U-boot sets up necessary parameters for Linux kernel
U-boot passes control to Linux kernel by jumping to its entry point
Linux kernel takes over and initializes system hardware
Semaphore is a signaling mechanism to control access to a shared resource, while Mutex is a locking mechanism to ensure only one thread accesses a resource at a time.
Semaphore can allow multiple threads to access a shared resource simultaneously, while Mutex ensures only one thread can access the resource at a time.
Mutex is more restrictive than Semaphore as it provides exclusive access to a resource, while Semaphore c...
Top trending discussions
str[] is an array of strings.
str[] can hold multiple strings in a single variable.
Each element in str[] is a string.
str[] can be accessed using index numbers.
Factorial and Fibonacci can be calculated with or without recursion.
Factorial can be calculated using a loop or recursion.
Fibonacci can be calculated using a loop or recursion.
Recursion can lead to stack overflow for large inputs.
Iterative solutions are more efficient for large inputs.
Process scheduling is the method by which the operating system decides which process to run first.
Process scheduling is an important part of operating system design.
It involves deciding which process to run first, based on various criteria such as priority, time slice, and resource availability.
There are several scheduling algorithms, including First-Come-First-Serve (FCFS), Round Robin, and Priority Scheduling.
FCFS is...
Yes, I have worked extensively on LINUX.
I have experience in LINUX system administration and shell scripting.
I have developed applications using C++ and Python on LINUX platform.
I have worked with various LINUX distributions such as Ubuntu, CentOS, and Red Hat.
I am familiar with LINUX command line tools and utilities.
I have worked with LINUX servers and virtual machines.
Function overloading is having multiple functions with the same name but different parameters. Function overriding is having a derived class function with the same name and parameters as the base class function.
Function overloading is a compile-time polymorphism concept while function overriding is a runtime polymorphism concept.
Function overloading is used to provide multiple ways to call a function with different par...
I am a software engineer with experience in developing web applications and mobile apps.
I have a degree in Computer Science
I am proficient in programming languages such as Java, Python, and JavaScript
I have experience working with frameworks such as React and Angular
I have developed several web applications and mobile apps, including a social media platform and a fitness tracking app
OSI network model has 7 layers. Layer 2 is Data Link layer and Layer 3 is Network layer.
Layer 2 protocols include Ethernet, Wi-Fi, and PPP
Layer 3 protocols include IP, ICMP, and ARP
Data Link layer provides error-free transmission over physical layer
Network layer provides logical addressing and routing of data packets
Layer 2 devices operate at the data link layer, while Layer 3 devices operate at the network layer.
Layer 2 devices include switches and bridges.
Layer 3 devices include routers and layer 3 switches.
Layer 2 devices forward frames based on MAC addresses.
Layer 3 devices forward packets based on IP addresses.
Routers direct traffic between networks while switches connect devices within a network.
Routers use IP addresses to direct traffic between networks
Routers can prioritize traffic based on Quality of Service (QoS)
Switches use MAC addresses to connect devices within a network
Switches can create virtual LANs (VLANs) to segment a network
Example of a router: Cisco ISR 4000 series
Example of a switch: Cisco Catalyst 2960 serie
OSI has 7 layers while TCP/IP has 4 layers.
OSI model is theoretical while TCP/IP is practical
OSI has a dedicated session layer while TCP/IP does not
TCP/IP combines the presentation and session layers into one
OSI is more complex and rarely used in practice
TCP/IP is the standard for internet communication
Program to reverse a string in any language
Declare a string variable
Loop through the string in reverse order
Append each character to a new string variable
Return the new string variable
I applied via Campus Placement and was interviewed in Jan 2016. There were 3 interview rounds.
Yes
Knowledge of network protocols and architectures
Understanding of data structures and algorithms
Experience with network troubleshooting and analysis
Familiarity with network security and encryption
Proficiency in network programming and socket programming
The test went well, I was able to complete all the tasks within the given time frame.
I prepared well for the test by reviewing relevant materials
I managed my time effectively during the test
I was able to solve all the problems and complete all the tasks
I double-checked my work to ensure accuracy
I applied via Referral
Program to print binary tree elements in spiral order
Use two stacks to keep track of nodes at odd and even levels
Push nodes from left to right in odd level stack and right to left in even level stack
Pop nodes from the stack alternatively and print them
Repeat until both stacks are empty
Entering a URL in the browser triggers a series of events to retrieve and display the requested webpage.
The browser checks the cache for a previously stored copy of the webpage
If not found, the browser sends a request to the DNS server to resolve the domain name to an IP address
The browser then sends a request to the web server at the IP address for the webpage
The web server responds with the requested webpage
The brows...
MAC addresses are required for identifying devices on a local network, while IP addresses are used for identifying devices on a global network.
MAC addresses are used for communication within a local network
IP addresses are used for communication across different networks
MAC addresses are assigned by the manufacturer and cannot be changed
IP addresses can be assigned dynamically or statically
MAC addresses are used in the...
Developed a web application for tracking inventory and sales data
Used React.js for front-end development
Implemented RESTful APIs using Node.js and Express for back-end
Utilized MongoDB for database management
Integrated authentication and authorization features for secure access
Designed user-friendly interface with responsive design
An ArrayList is a dynamic array in Java that can grow or shrink in size during runtime.
ArrayList is a class in Java's Collection framework.
It implements the List interface and allows duplicate elements.
Elements can be added or removed using methods like add(), remove(), etc.
It can also be sorted using the sort() method.
Example: ArrayList
names.add("John"); names.add("Mary"); names.remove(0);
ArrayList is a resizable array while LinkedList is a doubly linked list.
ArrayList is faster for accessing elements while LinkedList is faster for adding or removing elements.
ArrayList uses contiguous memory while LinkedList uses non-contiguous memory.
ArrayList is better for random access while LinkedList is better for sequential access.
Example: ArrayList - List
Java is not a pure OO language due to primitive types not being objects.
Primitive types like int, boolean, etc. are not objects in Java
They do not have methods or inheritance like objects do
This violates the principle of everything being an object in pure OO languages
Wrapper classes like Integer, Boolean, etc. were introduced to provide object-like behavior for primitives
Object-oriented languages support inheritance and polymorphism, while object-based languages do not.
Object-oriented languages allow for the creation of classes and objects, and support inheritance and polymorphism.
Object-based languages only support objects, but do not have the concept of classes or inheritance.
Examples of object-oriented languages include Java, C++, and Python, while JavaScript is an example of an obj
Inheritance is a way to create new classes based on existing ones. Abstraction is a way to hide implementation details.
Inheritance allows a subclass to inherit properties and methods from a superclass.
Abstraction allows a class to provide a simplified interface to its users while hiding its implementation details.
For example, a Car class can inherit properties and methods from a Vehicle class, while also implementing i...
I applied via Referral
No, as a software engineer, you may not have the necessary experience or skills to work as an IT manager.
Software engineers typically focus on coding and technical aspects, while IT managers are responsible for overseeing projects, teams, and budgets.
IT managers need strong leadership, communication, and decision-making skills, which may not be the primary focus of a software engineer.
Consider gaining experience in pro...
OSI stack has 7 layers that define how data is transmitted over a network.
OSI stands for Open Systems Interconnection
Each layer has a specific function and communicates with adjacent layers
Layers are: Physical, Data Link, Network, Transport, Session, Presentation, Application
A router is needed to connect two computers in different networks or to share internet connection.
When two computers are in different networks, a router is needed to connect them.
A router can also be used to share internet connection between multiple devices.
Routers can provide additional security features like firewall and VPN.
Examples of routers include Cisco, Netgear, and TP-Link.
IPv4 has 32 bits and IPv6 has 128 bits.
IPv4 addresses are in the format of xxx.xxx.xxx.xxx where each xxx is an 8-bit number.
IPv6 addresses are in the format of xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx where each xxxx is a 16-bit number.
IPv6 addresses allow for a much larger number of unique addresses than IPv4.
IPv6 is needed due to the exhaustion of IPv4 addresses and the need for more unique IP addresses.
IPv6 provides a significantly larger address space compared to IPv4.
It allows for the allocation of unique IP addresses to every device connected to the internet.
IPv6 supports improved security features and better network performance.
It enables the growth of Internet of Things (IoT) devices and services.
Transitioning to IPv...
A /24 address can have 256 clients. Network address is the first IP and broadcast address is the last IP.
A /24 address has 256 IP addresses
The network address is the first IP in the range
The broadcast address is the last IP in the range
Anycast, unicast, and multicast are different ways of routing network traffic.
Unicast is one-to-one communication between a sender and a receiver.
Anycast is one-to-nearest communication where the sender sends a message to the nearest receiver.
Multicast is one-to-many communication where the sender sends a message to a group of receivers.
Anycast is used for load balancing and finding the nearest server.
Unicast is used f...
Virtual memory is a memory management technique that allows a computer to use more memory than physically available.
Virtual memory is created by using hard disk space as an extension of RAM.
It allows running more programs than the physical memory can handle.
The size of virtual memory is typically larger than the size of main memory.
Virtual memory is divided into pages, which are swapped in and out of main memory as nee...
I rate myself 8 in C and 7 in web technologies.
I have extensive experience in C programming and have worked on multiple projects using it.
In web technologies, I have a good understanding of HTML, CSS, and JavaScript, but there is always room for improvement.
I am constantly learning and improving my skills in both areas.
My strengths include problem-solving skills, attention to detail, and strong programming abilities.
Strong problem-solving skills - able to analyze complex problems and come up with effective solutions
Attention to detail - meticulous in writing code and ensuring it is error-free
Strong programming abilities - proficient in multiple programming languages such as Java, Python, and C++
based on 1 interview
Interview experience
Software Engineer
182
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer2
164
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Software Engineer
129
salaries
| ₹0 L/yr - ₹0 L/yr |
Module Lead
77
salaries
| ₹0 L/yr - ₹0 L/yr |
Embedded Software Engineer
65
salaries
| ₹0 L/yr - ₹0 L/yr |
Cisco
Juniper Networks
Infinera
Corning Technologies