Nokia
Proud winner of ABECA 2024 - AmbitionBox Employee Choice Awards
Filter interviews by
I applied via Referral and was interviewed in Sep 2022. There were 3 interview rounds.
My expected CTC is negotiable based on the job role, responsibilities, and benefits offered.
My expected CTC is based on industry standards and my level of experience.
I am open to discussing the salary range during the interview process.
I am looking for a competitive salary package that aligns with my skills and qualifications.
I applied via Approached by Company and was interviewed in Nov 2024. There was 1 interview round.
4G architecture includes radio access network (RAN), core network, and user equipment (UE) with interfaces like S1, X2, and LTE-Uu.
4G architecture consists of Radio Access Network (RAN), Core Network, and User Equipment (UE)
Interfaces used in 4G architecture include S1, X2, and LTE-Uu
RAN connects UE to the core network, while X2 is used for communication between base stations
LTE-Uu is the air interface between UE and b
PRB can be calculated by dividing the total available bandwidth by the bandwidth per PRB.
Calculate total available bandwidth
Determine the bandwidth per PRB
Divide total available bandwidth by bandwidth per PRB to get the number of PRBs
I applied via Referral and was interviewed in Aug 2024. There were 3 interview rounds.
I am a highly experienced Senior Network Engineer with a strong background in designing, implementing, and managing complex network infrastructures.
Over 10 years of experience in network engineering
Proficient in Cisco, Juniper, and Palo Alto technologies
Skilled in network design, implementation, and troubleshooting
Certified in CCNP and JNCIP
Led successful network upgrade projects at previous companies
LAN technology refers to the methods and protocols used to create local area networks for connecting devices within a limited geographical area.
LAN technology includes Ethernet, Wi-Fi, and Token Ring.
Ethernet is the most common LAN technology, using CSMA/CD for collision detection.
Wi-Fi uses wireless signals to connect devices within a LAN.
Token Ring is a less common LAN technology that uses a token-passing protocol.
LA...
Router technique refers to the method used by a router to determine the best path for forwarding data packets.
Routing protocols like OSPF, EIGRP, and BGP are used to determine the best path for data packets
Static routing involves manually configuring the routes on the router
Dynamic routing allows routers to communicate with each other to determine the best path
Packet switching is used by routers to forward data packets
The OSI Model defines the functions of each layer in a network communication system.
Physical layer - transmits raw data bits over a physical medium
Data link layer - provides error detection and correction, and organizes data into frames
Network layer - routes data packets between different networks
Transport layer - ensures reliable data delivery and manages end-to-end communication
Session layer - establishes, maintains,...
TCP/IP model is a conceptual framework used for understanding networking protocols.
Consists of four layers: Application, Transport, Internet, Link
Each layer has specific functions and protocols
Data is encapsulated and decapsulated as it moves through the layers
Example: HTTP operates at the Application layer, TCP at the Transport layer
IPRAN solution stands for Internet Protocol Radio Access Network, which is a network architecture that combines IP/MPLS and mobile technologies.
IPRAN solution is used to provide high-speed internet access to mobile users.
It helps in optimizing network resources and improving network performance.
Examples of IPRAN solution providers include Cisco, Huawei, and Juniper Networks.
Different types of L2VPN include Ethernet VPN (EVPN), Virtual Private LAN Service (VPLS), and Layer 2 Tunneling Protocol (L2TP).
Ethernet VPN (EVPN) - Uses BGP as the control plane protocol for distributing MAC addresses across the network.
Virtual Private LAN Service (VPLS) - Extends a LAN over the network, allowing multiple sites to appear as if they are on the same LAN segment.
Layer 2 Tunneling Protocol (L2TP) - Creat...
posted on 16 Apr 2024
I applied via Referral and was interviewed in Mar 2024. There was 1 interview round.
MPLS (Multiprotocol Label Switching) is a protocol used in high-performance telecommunications networks to direct data packets along predefined paths.
MPLS is used to improve network performance by efficiently routing data packets based on labels instead of IP addresses.
It is commonly used in scenarios where quality of service (QoS) and traffic engineering are important, such as in large enterprise networks or service p...
Three different INTER_AS solutions and their advantages and disadvantages
Option 1: Option A - Advantages: Scalability, Disadvantages: Complexity
Option 2: Option B - Advantages: Simplicity, Disadvantages: Limited scalability
Option 3: Option C - Advantages: Flexibility, Disadvantages: Potential security risks
I applied via Job Portal and was interviewed before Sep 2022. There were 3 interview rounds.
Network flow in Nexus switches involves understanding vPC communication and troubleshooting SSH connectivity issues.
Network flow in Nexus switches involves the movement of data packets between devices connected to the switches.
vPC (Virtual Port Channel) communication in Nexus switches allows for link aggregation and redundancy by combining multiple physical links into a single logical link.
Troubleshooting SSH connectiv...
I applied via Referral and was interviewed in Jun 2024. There were 3 interview rounds.
Load balancing can be done by distributing network traffic across multiple servers to ensure optimal resource utilization and prevent overload.
Implementing a load balancer device or software
Configuring load balancing algorithms such as round-robin, least connections, or IP hash
Monitoring server health and adjusting traffic distribution accordingly
Scaling resources up or down based on traffic demands
SD Congestion can be found by monitoring network traffic, analyzing performance metrics, and identifying bottlenecks.
Monitor network traffic using tools like Wireshark or NetFlow
Analyze performance metrics such as latency, packet loss, and throughput
Identify bottlenecks in the network infrastructure, such as overloaded switches or routers
External interference can be removed by implementing shielding, using filters, adjusting frequencies, and improving signal strength.
Implement shielding to block external signals from interfering with the network
Use filters to eliminate unwanted frequencies that may cause interference
Adjust frequencies to avoid overlapping with other nearby networks
Improve signal strength to overcome interference from distant sources
LTE Accessibility formula calculates the probability of successful connection to the LTE network.
LTE Accessibility = (RSRP - PL) - (UE Noise + Interference)
RSRP: Reference Signal Received Power
PL: Path Loss
UE: User Equipment
My current CTC is $80,000 per year.
My current CTC is $80,000 per year
I am open to discussing salary expectations during the interview process
I have experience negotiating salary based on skills and experience
based on 1 review
Rating in categories
Technical Lead
499
salaries
| ₹7.4 L/yr - ₹28.5 L/yr |
Technical Specialist
472
salaries
| ₹11 L/yr - ₹32 L/yr |
Software Engineer
452
salaries
| ₹6 L/yr - ₹23.3 L/yr |
R&D Engineer
434
salaries
| ₹7 L/yr - ₹25.7 L/yr |
Senior Technical Specialist
243
salaries
| ₹16.7 L/yr - ₹43 L/yr |
Samsung
Apple
Huawei Technologies
Xiaomi