i
Juniper
Networks
Work with us
Filter interviews by
DNS protocol is used to translate domain names to IP addresses on the internet.
DNS stands for Domain Name System
It translates human-readable domain names (like www.google.com) to IP addresses (like 172.217.3.206)
DNS operates on a client-server model, with DNS servers hosting DNS records for different domains
DNS queries are sent by clients to DNS servers to resolve domain names to IP addresses
Processes are independent instances of a program, while threads are smaller units within a process sharing resources.
Processes have their own memory space, while threads share the same memory space within a process.
Processes are heavyweight, while threads are lightweight.
Processes communicate with each other through inter-process communication mechanisms, while threads can communicate directly.
Example: A web brows...
Graph algorithms are essential for solving problems related to networks, paths, and connectivity in data structures.
Graphs can be represented using adjacency lists or matrices.
Common algorithms include Depth-First Search (DFS) and Breadth-First Search (BFS).
Dijkstra's algorithm finds the shortest path in weighted graphs.
Topological sorting is used for scheduling tasks based on dependencies.
Example: Finding connect...
EVPN VXLAN topology explanation
EVPN (Ethernet VPN) is a technology used to extend Layer 2 connectivity across a Layer 3 network
VXLAN (Virtual Extensible LAN) is a tunneling protocol used to overlay virtualized Layer 2 networks over Layer 3 networks
EVPN VXLAN topology combines the benefits of both technologies to provide scalable and flexible network virtualization
It allows for efficient communication between virtu...
IPC mechanisms are used for inter-process communication in software development.
IPC mechanisms allow processes to communicate with each other, either on the same machine or across a network.
Common IPC mechanisms include pipes, message queues, shared memory, sockets, and signals.
Examples of IPC mechanisms include using sockets for network communication between client and server applications, or using shared memory ...
I2C and SPI are serial communication protocols used for connecting microcontrollers to peripherals.
I2C (Inter-Integrated Circuit) is a synchronous, multi-master, multi-slave, packet-switched protocol commonly used for communication between integrated circuits.
SPI (Serial Peripheral Interface) is a synchronous, full-duplex, master-slave communication protocol commonly used for communication between microcontrollers...
Reverse a linked list by changing the direction of pointers
Start with three pointers: current, previous, and next
Iterate through the linked list, updating pointers accordingly
Set the next pointer of the current node to the previous node
Find the number of subarrays whose sum is divisible by K.
Use prefix sum technique to calculate the sum of subarrays efficiently.
Keep track of the remainders of prefix sums when divided by K.
Use a hashmap to store the count of each remainder.
For each prefix sum, check how many previous prefix sums have the same remainder.
Add the count of subarrays with the same remainder to the total count.
Find elements in array that sum up to given number
Use a nested loop to iterate through each pair of elements in the array
Check if the sum of the pair equals the given number
Return the pair of elements if found, otherwise continue iterating
Binary search is an efficient algorithm for finding an item from a sorted list using recursion.
Binary search works on sorted arrays only.
It divides the search interval in half each time.
Base case: If the element is found or the interval is empty.
Example: Searching for 5 in [1, 2, 3, 4, 5, 6] returns index 4.
I appeared for an interview in May 2025, where I was asked the following questions.
30min, DSA related question
EVPN VXLAN topology explanation
EVPN (Ethernet VPN) is a technology used to extend Layer 2 connectivity across a Layer 3 network
VXLAN (Virtual Extensible LAN) is a tunneling protocol used to overlay virtualized Layer 2 networks over Layer 3 networks
EVPN VXLAN topology combines the benefits of both technologies to provide scalable and flexible network virtualization
It allows for efficient communication between virtual ma...
Difficult online round
Arrays are a collection of strings in programming used to store multiple values under a single variable name.
Arrays are declared using square brackets []
Each element in an array is accessed by its index, starting from 0
Example: var fruits = ['apple', 'banana', 'orange']
Trees in neet code refer to the implementation of tree data structures in coding challenges on the platform NeetCode.
Trees are a common data structure used in coding challenges to represent hierarchical relationships between data.
Common tree operations include traversal (inorder, preorder, postorder), insertion, deletion, and searching.
Examples of tree-related coding challenges on NeetCode include implementing a binary...
Trees in leetcode are a common topic for coding interviews, involving various tree traversal and manipulation techniques.
Understand different tree traversal methods like inorder, preorder, and postorder.
Learn about common tree algorithms like finding the height, diameter, and lowest common ancestor.
Practice solving tree-related problems on leetcode to improve your skills.
I applied via Referral and was interviewed in May 2024. There were 3 interview rounds.
Processes are independent instances of a program, while threads are smaller units within a process sharing resources.
Processes have their own memory space, while threads share the same memory space within a process.
Processes are heavyweight, while threads are lightweight.
Processes communicate with each other through inter-process communication mechanisms, while threads can communicate directly.
Example: A web browser ru...
DNS protocol is used to translate domain names to IP addresses on the internet.
DNS stands for Domain Name System
It translates human-readable domain names (like www.google.com) to IP addresses (like 172.217.3.206)
DNS operates on a client-server model, with DNS servers hosting DNS records for different domains
DNS queries are sent by clients to DNS servers to resolve domain names to IP addresses
This round had a bit of both, technical and coding related questions.. Technical questions were from basic embedded related questions, as well as, networking protocol and layer questions.
Last round was purely coding round with multiple coding questions which includes bitwise operators and linked list questions mainly.
Scalable system design involves creating a system that can handle increased load and growth over time.
Use microservices architecture to break down the system into smaller, independent services
Implement load balancing to distribute traffic evenly across servers
Utilize caching mechanisms to reduce the load on the database
Design for horizontal scalability by adding more servers to handle increased load
Consider using cloud...
Test proper coding style, logic along with boundary checks
I applied via Job Portal
I applied via Referral and was interviewed in Mar 2024. There was 1 interview round.
Check if a binary tree is a Binary Search Tree (BST) by validating the inorder traversal.
Perform an inorder traversal of the binary tree and store the elements in a list.
Check if the list is sorted in ascending order. If yes, then the binary tree is a BST.
Ensure that there are no duplicate elements in the binary tree.
Flatten a multi-level linked list where nodes have next pointers at all levels.
Each node has a value, a next pointer, and a child pointer to another linked list.
The goal is to flatten the list into a single-level linked list.
Example: Given 1 -> 2 -> 3, where 2 has a child 4 -> 5, the result should be 1 -> 2 -> 4 -> 5 -> 3.
Use a stack to traverse and flatten the list iteratively or recursively.
Reorder a linked list by alternating between the first and last elements
Create two pointers, one at the beginning and one at the end of the linked list
Iterate through the linked list, moving the first pointer to the next node and the second pointer to the previous node
Adjust the pointers to reorder the linked list by alternating between the first and last elements
Normal dsa Basics and aptitude.
I applied via Naukri.com and was interviewed in Sep 2024. There was 1 interview round.
Easy to crack the interview DSA
I applied via LinkedIn and was interviewed in Mar 2024. There was 1 interview round.
Top trending discussions
The duration of Juniper Networks interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 58 interview experiences
Difficulty level
Duration
based on 443 reviews
Rating in categories
Software Engineer
280
salaries
| ₹12.9 L/yr - ₹36 L/yr |
Software Engineer III
271
salaries
| ₹19.2 L/yr - ₹33 L/yr |
Software Engineer2
198
salaries
| ₹13 L/yr - ₹21 L/yr |
Software Engineer IV
190
salaries
| ₹30 L/yr - ₹54.2 L/yr |
Technical Support Engineer
68
salaries
| ₹13.5 L/yr - ₹30 L/yr |
Indus Towers
Sterlite Technologies
Cisco
BT Business