i
Juniper Networks
Filter interviews by
Clear (1)
I was interviewed before May 2021.
Round duration - 45 minutes
Round difficulty - Easy
Technical Interview round with questions on DSA
Given a Binary Tree of integers, your task is to return the level order traversal of the tree.
The first line contains an integer 'T' which denotes the number...
Return the level order traversal of a Binary Tree of integers.
Perform a level order traversal using a queue data structure
Start by pushing the root node into the queue
Pop each node from the queue, print its value, and push its children into the queue
Given an integer N
, your task is to compute the number that results from swapping each even position bit of N
's binary representation with its adjacent odd bit to...
Swap each even position bit of an integer with its adjacent odd bit to the right in binary representation.
Iterate through the binary representation of the integer and swap adjacent bits at even positions with odd positions.
Convert the modified binary representation back to an integer to get the final result.
Handle edge cases like leading zeros in binary representation.
Round duration - 60 minutes
Round difficulty - Easy
Technical round with questions on Networking.
Components of an IP packet header
Version
Header Length
Type of Service
Total Length
Identification
Flags
Fragment Offset
Time to Live
Protocol
Header Checksum
Source IP Address
Destination IP Address
Options
TCP is connection-oriented, reliable, and slower, while UDP is connectionless, unreliable, and faster.
TCP is connection-oriented, meaning it establishes a connection before sending data, while UDP is connectionless and does not establish a connection.
TCP is reliable as it ensures all data packets are received in order and retransmits any lost packets, while UDP does not guarantee delivery or order of packets.
TCP is slo...
The TCP segment header consists of various components that help in the transmission of data over a network.
Source Port
Destination Port
Sequence Number
Acknowledgment Number
Data Offset
Reserved
Flags
Window Size
Checksum
Urgent Pointer
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
IP packet header fields and their usage
Version: indicates the IP version being used (IPv4 or IPv6)
Header Length: specifies the length of the IP header
Type of Service: used to prioritize packets
Total Length: specifies the total length of the IP packet
Identification: used to identify fragments of a larger packet
Flags: used to control fragmentation
Fragment Offset: used to reassemble fragmented packets
Time to Live: specifi...
TCP packet header fields and their usage
TCP packet header consists of 20 bytes
Fields include source and destination ports, sequence and acknowledgement numbers, flags, window size, and checksum
Source and destination ports identify the endpoints of the connection
Sequence and acknowledgement numbers are used for reliable data transfer
Flags indicate the purpose of the packet, such as SYN, ACK, FIN, RST
Window size is used ...
A program to implement a dictionary using an array of strings.
Use an array of strings to store the words and their definitions.
Implement functions to add, delete, and search for words.
Consider using a hash table for faster search times.
Implement a telephone directory program using an array of strings.
Create an array of strings to store the directory
Implement functions to add, delete, and search for entries
Consider using a hash table for faster search times
Include error handling for invalid input
TCP is a reliable, connection-oriented protocol while UDP is a faster, unreliable, connectionless protocol.
TCP ensures data delivery and error checking while UDP does not.
TCP establishes a connection before data transfer while UDP does not.
TCP is used for applications that require reliable data transfer like email, file transfer, etc. while UDP is used for applications that require speed like online gaming, video strea
Security is important in a system to protect against unauthorized access, data breaches, and cyber attacks.
Prevents unauthorized access to sensitive data
Protects against data breaches and cyber attacks
Ensures confidentiality, integrity, and availability of data
Compliance with regulations and standards
Maintains trust and confidence of customers and stakeholders
Printing a tree in level order
Use a queue to store nodes in level order
Enqueue root node and print its value
Dequeue the node and enqueue its children
Repeat until queue is empty
Swapping two particular bits of an integer program.
Use bitwise operators to get the values of the two bits to be swapped
Use XOR operator to swap the bits
Shift the bits back to their original positions
Example: Swapping 2nd and 5th bits of 8 (1000) gives 32 (100000)
Example code: num ^= (1 << bit1) | (1 << bit2);
Top trending discussions
C code for printing Fibonacci Series upto n elements
Declare three variables to store the current, previous and next numbers in the series
Initialize the previous and current variables to 0 and 1 respectively
Use a loop to print the next number in the series by adding the previous two numbers
Loop should run n times to print n elements in the series
I was interviewed in Mar 2017.
I have the technical skills, experience, and passion to deliver high-quality software solutions.
I have a strong background in programming languages such as Java, Python, and C++.
I have experience working on complex software projects and collaborating with cross-functional teams.
I am passionate about staying up-to-date with the latest technologies and trends in software development.
I am a quick learner and have a strong...
Ericsson is a global leader in telecommunications technology with a strong focus on innovation and career development.
Global leader in telecommunications technology
Strong focus on innovation
Opportunities for career development
I was interviewed in Mar 2017.
To make the red fishes 98%, 50 fishes have to be removed from the aquarium.
Calculate 1% of 200 fishes, which is 2 fishes.
To make the red fishes 98%, subtract 1% (2 fishes) from 99% (198 fishes).
To find the number of fishes to be removed, divide the difference by 1% (2 fishes).
Therefore, 50 fishes have to be removed to make the red fishes 98%.
I was interviewed in Feb 2017.
I was interviewed in Mar 2017.
To make the red fishes 98%, 50 fishes have to be removed from the aquarium.
Calculate 1% of 200 fishes to find the number of red fishes.
Subtract the number of red fishes from 200 to find the number of non-red fishes.
Calculate 2% of the total number of fishes to find the desired number of red fishes.
Subtract the desired number of red fishes from the current number of red fishes to find the number of fishes to be removed.
posted on 3 May 2017
I was interviewed before May 2016.
posted on 28 Jun 2017
I was interviewed in Mar 2017.
To make the red fishes 98%, 50 fishes have to be removed from the aquarium.
Calculate 1% of 200 fishes to find out how many fishes represent 1%.
Multiply the result by 2 to find out how many fishes represent 2%.
Subtract the result from 200 to find out how many fishes represent 98%.
I was interviewed before Mar 2021.
Round duration - 15 minutes
Round difficulty - Easy
This was a group discussion round where we were divided into groups of 10 and we had 15 minutes for GD.
Round duration - 60 minutes
Round difficulty - Medium
This is all about how good you are with the fundamentals. Out of 10 I would give it a 6.5 on difficulty.
You are given a string STR
which contains alphabets, numbers, and special characters. Your task is to reverse the string.
STR = "abcde"
"e...
Reverse a given string containing alphabets, numbers, and special characters.
Iterate through the string from the end to the beginning and append each character to a new string.
Use built-in functions like reverse() or StringBuilder in languages like Python or Java for efficient reversal.
Handle special characters and numbers while reversing the string.
Ensure to consider the constraints on the length of the string and the
A deadlock is a situation in which two or more processes are unable to proceed because each is waiting for the other to release a resource.
Occurs in multitasking environments where processes compete for limited resources
Can be resolved using techniques like deadlock prevention, deadlock avoidance, and deadlock detection
Example: Process A holds Resource X and waits for Resource Y, while Process B holds Resource Y and wa
A thread is a lightweight sub-process that allows concurrent execution within a single process.
Threads share the same memory space within a process.
Threads are used to achieve parallelism and improve performance.
Examples of threads include the main thread in a program and worker threads in a multi-threaded application.
Multiprocessing involves multiple processors executing multiple tasks simultaneously, while multiprogramming involves multiple programs sharing a single processor by switching between them.
Multiprocessing utilizes multiple processors to execute multiple tasks concurrently.
Multiprogramming involves multiple programs sharing a single processor by switching between them.
Multiprocessing is more efficient in terms of perfor...
Process life cycle in an operating system involves creation, execution, termination, and resource management.
Creation: When a process is created, it is assigned a unique process ID and allocated necessary resources.
Execution: The process is then scheduled by the operating system to run on the CPU.
Termination: Once the process completes its task or is terminated by the user, it is removed from memory.
Resource Management...
Windows XP and Windows 7 are both operating systems developed by Microsoft, but they have several key differences.
User interface: Windows 7 has a more modern and user-friendly interface compared to Windows XP.
Performance: Windows 7 is generally faster and more stable than Windows XP.
Security: Windows 7 has more advanced security features and updates compared to Windows XP.
Hardware support: Windows 7 supports newer hard...
Round duration - 60 minutes
Round difficulty - Easy
Technical round with questions on DBMS and Networking mainly.
RDBMS is a type of DBMS that stores data in a structured format with relationships between tables.
RDBMS enforces referential integrity and allows for normalization of data.
DBMS is a general term for any system that manages databases, while RDBMS specifically refers to relational databases.
Examples of RDBMS include MySQL, Oracle, and SQL Server.
Examples of DBMS include MongoDB and Redis.
An Object-Oriented Database Management System (OODBMS) is a type of database management system that supports the creation and management of objects in a database.
OODBMS stores data in the form of objects, which can contain attributes and methods.
It allows for complex data structures and relationships to be represented more easily.
Examples of OODBMS include db4o, ObjectDB, and ObjectStore.
Use the COUNT DISTINCT function in SQL to find the number of unique values in a database.
Use the COUNT DISTINCT function along with the column name to count the number of unique values in that column.
For example, SELECT COUNT(DISTINCT column_name) FROM table_name;
You can also use GROUP BY to find the number of unique values for multiple columns.
A hub operates at the physical layer and broadcasts data to all devices on the network, while a switch operates at the data link layer and forwards data only to the intended recipient.
Hub operates at the physical layer, while switch operates at the data link layer
Hub broadcasts data to all devices on the network, while switch forwards data only to the intended recipient
Switch is more efficient and secure compared to a
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven different layers.
Physical Layer: Deals with the physical connection between devices. Example: Ethernet cables.
Data Link Layer: Responsible for node-to-node communication. Example: MAC addresses.
Network Layer: Manages routing of data packets. Example: IP addresses.
T...
Different protocols supported at each OSI layer
Layer 1 (Physical): Ethernet, Wi-Fi, Bluetooth
Layer 2 (Data Link): MAC, PPP, HDLC
Layer 3 (Network): IP, ICMP, ARP
Layer 4 (Transport): TCP, UDP, SCTP
Layer 5 (Session): NetBIOS, PPTP
Layer 6 (Presentation): SSL, TLS
Layer 7 (Application): HTTP, FTP, SMTP
Round duration - 15 minutes
Round difficulty - Easy
IF you make it to the HR round you are selected. All 28 that attended got selected . It was more like stuff for formality. The usual questions.
Tip 1 : Must do Previously asked Interview as well as Online Test Questions.
Tip 2 : Go through all the previous interview experiences from Codestudio and Leetcode.
Tip 3 : Do at-least 2 good projects and you must know every bit of them.
Tip 1 : Have at-least 2 good projects explained in short with all important points covered.
Tip 2 : Every skill must be mentioned.
Tip 3 : Focus on skills, projects and experiences more.
Some of the top questions asked at the Juniper Networks Staff Engineer interview -
based on 1 interview
Interview experience
based on 11 reviews
Rating in categories
Software Engineer
284
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer III
248
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer2
170
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer IV
160
salaries
| ₹0 L/yr - ₹0 L/yr |
Financial Analyst
58
salaries
| ₹0 L/yr - ₹0 L/yr |
Cisco
Huawei Technologies
Nokia Networks
Ericsson