Filter interviews by
Covid 19 has had a significant impact on India.
India has reported a high number of Covid cases and deaths.
The pandemic has affected the economy, leading to job losses and reduced income.
The healthcare system has been overwhelmed, with shortages of hospital beds, oxygen, and medicines.
The government has implemented lockdowns and other measures to control the spread of the virus.
Vaccination efforts have been ramped up, b...
Top trending discussions
I applied via Naukri.com
I applied via Naukri.com and was interviewed in Feb 2022. There were 3 interview rounds.
I am an experienced NOC Engineer with a strong background in network operations and troubleshooting.
I have a Bachelor's degree in Computer Science.
I have worked for 5 years in a large telecommunications company, managing and monitoring network infrastructure.
I am skilled in using network monitoring tools such as SolarWinds and Wireshark.
I have experience in troubleshooting network issues, analyzing logs, and implementi...
Modulation is the process of varying a signal's characteristics to transmit information. TCP/IP is a protocol used for communication between devices. Guard band is a frequency band used to separate two channels.
Modulation is used in radio communication to transmit information by varying the amplitude, frequency, or phase of a carrier wave.
TCP/IP is a set of protocols used for communication between devices on a network....
2G, 3G, and 4G are different generations of mobile network technology.
2G stands for second generation and is based on digital technology. It allows for basic voice and text communication.
3G stands for third generation and introduced mobile data and internet connectivity.
4G stands for fourth generation and offers faster internet speeds and improved data transfer rates.
Examples of 2G networks include GSM and CDMA. Exampl...
I applied via Recruitment Consultant and was interviewed in Jul 2021. There were 3 interview rounds.
GSM architecture includes multiple layers of OSI model for connectivity. Each layer has a specific function.
GSM architecture consists of physical, data link, network, transport, and application layers.
Physical layer handles the transmission of bits over the air interface.
Data link layer provides error-free transmission of data frames.
Network layer handles routing and addressing of data packets.
Transport layer ensures r...
Modulation techniques are used to encode information onto a carrier signal for transmission over a communication channel.
Modulation techniques vary in terms of the type of carrier signal used (analog or digital), the type of modulation (amplitude, frequency, phase), and the complexity of the modulation scheme.
Examples of modulation techniques include amplitude modulation (AM), frequency modulation (FM), phase modulatio...
DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that assigns IP addresses to devices on a network.
DHCP automates the process of assigning IP addresses to devices on a network.
It helps to avoid IP address conflicts and makes it easier to manage a large network.
DHCP also provides other network configuration information, such as subnet mask and default gateway.
Without DHCP, network administra...
GSM and CDMA are two different technologies used in mobile communication.
GSM uses SIM cards while CDMA does not.
GSM allows for easy switching of phones while CDMA does not.
GSM has better international roaming capabilities than CDMA.
CDMA has better call quality and network capacity than GSM.
GSM is more widely used globally while CDMA is mostly used in the US and parts of Asia.
I applied via Naukri.com and was interviewed in Jul 2021. There were 5 interview rounds.
NOC team monitors and maintains network infrastructure to ensure smooth operations.
Monitor network performance and troubleshoot issues
Maintain network infrastructure and ensure uptime
Respond to alerts and incidents in a timely manner
Collaborate with other teams to resolve complex issues
Document network changes and maintain network documentation
Implement network security measures
Provide technical support to end-users
ITIL fundamentals are a set of best practices for IT service management.
ITIL stands for Information Technology Infrastructure Library
It includes processes for service strategy, design, transition, operation, and continual improvement
ITIL helps organizations align their IT services with business needs and improve efficiency
Examples of ITIL processes include incident management, problem management, and change management
HLR, VLR, AuC, EIR are components of a mobile network that handle subscriber information and authentication.
HLR (Home Location Register) stores subscriber information and location data
VLR (Visitor Location Register) stores temporary subscriber information when they roam outside their home network
AuC (Authentication Center) stores authentication and encryption keys for subscribers
EIR (Equipment Identity Register) stores...
BGP is a routing protocol used to exchange routing information between different networks on the internet.
BGP stands for Border Gateway Protocol.
It is used to connect different autonomous systems (AS) on the internet.
BGP is a path-vector protocol, which means it selects the best path for data to travel based on a number of factors such as shortest path, least number of hops, etc.
BGP is used by internet service provider...
MPLS stands for Multiprotocol Label Switching, a protocol used for efficient data transfer in telecommunications networks.
MPLS is a routing technique that uses labels to forward data packets.
It allows for faster and more efficient data transfer by reducing the time it takes for a packet to reach its destination.
MPLS is commonly used in large-scale networks such as those used by internet service providers.
It can be used...
CRC stands for Cyclic Redundancy Check. It is an error-detecting code used in network communication to ensure data integrity.
CRC is a mathematical algorithm that generates a fixed-size checksum for a block of data.
The checksum is appended to the data and is recalculated at the receiving end to check for errors.
If the calculated checksum doesn't match the received checksum, it indicates that the data has been corrupted ...
Default loopback IP address is 127.0.0.1 and private IPs are reserved for internal networks.
Default loopback IP address is used to test network software without connecting to a network.
Private IPs are reserved for internal networks and cannot be accessed from the internet.
Private IP ranges include 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16.
To configure DHCP in a router through CMD, use the 'ip dhcp pool' command and specify the network and default gateway.
Open CMD and access the router's CLI
Enter 'enable' to access privileged mode
Enter 'configure terminal' to enter global configuration mode
Enter 'ip dhcp pool [pool name]' to create a DHCP pool
Specify the network and default gateway using the 'network' and 'default-router' commands
Exit configuration mode ...
To configure VLAN in a router through CMD, use the 'vlan' command and specify the VLAN ID and name.
Open CMD and connect to the router's console
Enter 'enable' to access privileged mode
Enter 'configure terminal' to enter global configuration mode
Enter 'vlan [VLAN ID]' to create the VLAN
Enter 'name [VLAN name]' to assign a name to the VLAN
Exit configuration mode by entering 'exit'
Save the configuration by entering 'write ...
To check IP route through CMD, use the 'route print' command.
Open Command Prompt
Type 'route print' and press Enter
The IP route table will be displayed
You can filter the results using various parameters like destination IP, interface, etc.
I applied via Campus Placement and was interviewed before Nov 2021. There were 4 interview rounds.
Easy enough, anyone can crack with good logical skills
CDMA is a wireless communication technology that allows multiple users to share the same frequency band simultaneously.
CDMA stands for Code Division Multiple Access.
It uses spread spectrum technology to allow multiple users to transmit data simultaneously.
Each user is assigned a unique code to differentiate their signal from others.
Examples of CDMA networks include Verizon and Sprint in the US.
HandShaking is a process ...
I applied via Naukri.com
I applied via Naukri.com and was interviewed in Feb 2022. There were 3 interview rounds.
I am an experienced NOC Engineer with a strong background in network operations and troubleshooting.
I have a Bachelor's degree in Computer Science.
I have worked for 5 years in a large telecommunications company, managing and monitoring network infrastructure.
I am skilled in using network monitoring tools such as SolarWinds and Wireshark.
I have experience in troubleshooting network issues, analyzing logs, and implementi...
Modulation is the process of varying a signal's characteristics to transmit information. TCP/IP is a protocol used for communication between devices. Guard band is a frequency band used to separate two channels.
Modulation is used in radio communication to transmit information by varying the amplitude, frequency, or phase of a carrier wave.
TCP/IP is a set of protocols used for communication between devices on a network....
2G, 3G, and 4G are different generations of mobile network technology.
2G stands for second generation and is based on digital technology. It allows for basic voice and text communication.
3G stands for third generation and introduced mobile data and internet connectivity.
4G stands for fourth generation and offers faster internet speeds and improved data transfer rates.
Examples of 2G networks include GSM and CDMA. Exampl...
I applied via Recruitment Consultant and was interviewed in Jul 2021. There were 3 interview rounds.
GSM architecture includes multiple layers of OSI model for connectivity. Each layer has a specific function.
GSM architecture consists of physical, data link, network, transport, and application layers.
Physical layer handles the transmission of bits over the air interface.
Data link layer provides error-free transmission of data frames.
Network layer handles routing and addressing of data packets.
Transport layer ensures r...
Modulation techniques are used to encode information onto a carrier signal for transmission over a communication channel.
Modulation techniques vary in terms of the type of carrier signal used (analog or digital), the type of modulation (amplitude, frequency, phase), and the complexity of the modulation scheme.
Examples of modulation techniques include amplitude modulation (AM), frequency modulation (FM), phase modulatio...
DHCP stands for Dynamic Host Configuration Protocol. It is a network protocol that assigns IP addresses to devices on a network.
DHCP automates the process of assigning IP addresses to devices on a network.
It helps to avoid IP address conflicts and makes it easier to manage a large network.
DHCP also provides other network configuration information, such as subnet mask and default gateway.
Without DHCP, network administra...
GSM and CDMA are two different technologies used in mobile communication.
GSM uses SIM cards while CDMA does not.
GSM allows for easy switching of phones while CDMA does not.
GSM has better international roaming capabilities than CDMA.
CDMA has better call quality and network capacity than GSM.
GSM is more widely used globally while CDMA is mostly used in the US and parts of Asia.
I applied via Naukri.com and was interviewed in Jul 2021. There were 5 interview rounds.
NOC team monitors and maintains network infrastructure to ensure smooth operations.
Monitor network performance and troubleshoot issues
Maintain network infrastructure and ensure uptime
Respond to alerts and incidents in a timely manner
Collaborate with other teams to resolve complex issues
Document network changes and maintain network documentation
Implement network security measures
Provide technical support to end-users
ITIL fundamentals are a set of best practices for IT service management.
ITIL stands for Information Technology Infrastructure Library
It includes processes for service strategy, design, transition, operation, and continual improvement
ITIL helps organizations align their IT services with business needs and improve efficiency
Examples of ITIL processes include incident management, problem management, and change management
HLR, VLR, AuC, EIR are components of a mobile network that handle subscriber information and authentication.
HLR (Home Location Register) stores subscriber information and location data
VLR (Visitor Location Register) stores temporary subscriber information when they roam outside their home network
AuC (Authentication Center) stores authentication and encryption keys for subscribers
EIR (Equipment Identity Register) stores...
BGP is a routing protocol used to exchange routing information between different networks on the internet.
BGP stands for Border Gateway Protocol.
It is used to connect different autonomous systems (AS) on the internet.
BGP is a path-vector protocol, which means it selects the best path for data to travel based on a number of factors such as shortest path, least number of hops, etc.
BGP is used by internet service provider...
MPLS stands for Multiprotocol Label Switching, a protocol used for efficient data transfer in telecommunications networks.
MPLS is a routing technique that uses labels to forward data packets.
It allows for faster and more efficient data transfer by reducing the time it takes for a packet to reach its destination.
MPLS is commonly used in large-scale networks such as those used by internet service providers.
It can be used...
CRC stands for Cyclic Redundancy Check. It is an error-detecting code used in network communication to ensure data integrity.
CRC is a mathematical algorithm that generates a fixed-size checksum for a block of data.
The checksum is appended to the data and is recalculated at the receiving end to check for errors.
If the calculated checksum doesn't match the received checksum, it indicates that the data has been corrupted ...
Default loopback IP address is 127.0.0.1 and private IPs are reserved for internal networks.
Default loopback IP address is used to test network software without connecting to a network.
Private IPs are reserved for internal networks and cannot be accessed from the internet.
Private IP ranges include 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16.
To configure DHCP in a router through CMD, use the 'ip dhcp pool' command and specify the network and default gateway.
Open CMD and access the router's CLI
Enter 'enable' to access privileged mode
Enter 'configure terminal' to enter global configuration mode
Enter 'ip dhcp pool [pool name]' to create a DHCP pool
Specify the network and default gateway using the 'network' and 'default-router' commands
Exit configuration mode ...
To configure VLAN in a router through CMD, use the 'vlan' command and specify the VLAN ID and name.
Open CMD and connect to the router's console
Enter 'enable' to access privileged mode
Enter 'configure terminal' to enter global configuration mode
Enter 'vlan [VLAN ID]' to create the VLAN
Enter 'name [VLAN name]' to assign a name to the VLAN
Exit configuration mode by entering 'exit'
Save the configuration by entering 'write ...
To check IP route through CMD, use the 'route print' command.
Open Command Prompt
Type 'route print' and press Enter
The IP route table will be displayed
You can filter the results using various parameters like destination IP, interface, etc.
based on 24 reviews
Rating in categories
Senior Engineer
458
salaries
| ₹3 L/yr - ₹12 L/yr |
Software Engineer
384
salaries
| ₹2.5 L/yr - ₹10 L/yr |
Assistant Manager
279
salaries
| ₹5.3 L/yr - ₹15 L/yr |
Engineer
244
salaries
| ₹2.7 L/yr - ₹9 L/yr |
Deputy Manager
235
salaries
| ₹5.3 L/yr - ₹20 L/yr |
Samsung
Apple
Cisco
Ericsson