Filter interviews by
I applied via Walk-in and was interviewed before Jul 2023. There were 3 interview rounds.
OSI (Open Systems Interconnection) layer is a conceptual model that describes the communication functions of a telecommunication system.
Layer 1 (Physical Layer) - Transmits raw data bits over a communication channel.
Layer 2 (Data Link Layer) - Provides error-free transfer of data frames between nodes over the physical layer.
Layer 3 (Network Layer) - Provides logical addressing and routing of data packets between nodes ...
VLAN stands for Virtual Local Area Network. It is a logical grouping of devices on a network based on their function, project, or application.
VLANs allow network administrators to segment a network into smaller, more manageable groups.
Each VLAN has its own broadcast domain, which means that broadcasts are contained within the VLAN and do not spread to other VLANs.
VLANs can be configured to span multiple switches, allow...
L2 is data link layer responsible for MAC addressing and error detection, while L3 is network layer responsible for IP addressing and routing.
L2 operates on MAC addresses while L3 operates on IP addresses
L2 is responsible for error detection and correction while L3 is responsible for routing
L2 switches packets within a network while L3 routes packets between networks
Examples of L2 devices include switches and bridges w...
A router is a networking device that forwards data packets between computer networks.
Routers operate at the network layer of the OSI model.
They use routing tables to determine the best path for data to travel.
Routers can connect different types of networks, such as LANs and WANs.
Examples of routers include Cisco, Juniper, and TP-Link.
Routers can provide security features such as firewalls and VPNs.
Subnetting is the process of dividing a network into smaller subnetworks.
Subnetting helps in efficient utilization of IP addresses.
It improves network performance and security.
Subnetting is done by borrowing bits from the host portion of an IP address.
CIDR notation is used to represent subnet masks.
Example: 192.168.1.0/24 represents a network with 256 IP addresses.
Top trending discussions
I applied via Walk-in and was interviewed in Feb 2024. There were 2 interview rounds.
Basic question like as time ditance
Basic of dsa sql dbms
I applied via Recruitment Consulltant and was interviewed in Jul 2023. There were 3 interview rounds.
English , GK, arithmetic
Device bias can lead to improved performance, efficiency, and user experience in network engineering.
Device bias can result in optimized network traffic routing, leading to faster data transmission.
It can enhance security measures by prioritizing certain devices for access control and monitoring.
Device bias can improve overall network stability and reliability by allocating resources more effectively.
For example, imple...
I applied via Approached by Company and was interviewed before Apr 2021. There were 3 interview rounds.
I applied via Naukri.com and was interviewed before Mar 2020. There were 4 interview rounds.
Hashtable is synchronized while hashmap is not.
Hashtable is thread-safe while hashmap is not.
Hashtable does not allow null keys or values while hashmap allows one null key and multiple null values.
Hashtable is slower than hashmap due to synchronization.
Hashtable is a legacy class while hashmap is a newer implementation.
Hashmap is not thread-safe while Concurrent Hashmap is thread-safe.
Hashmap is not suitable for multi-threaded environments as it can lead to race conditions and data inconsistencies.
Concurrent Hashmap allows multiple threads to access and modify the map concurrently without any data inconsistencies.
Concurrent Hashmap uses a technique called lock striping to achieve thread-safety.
Concurrent Hashmap is slower than Hashma...
posted on 16 Apr 2021
I applied via Referral and was interviewed in Oct 2020. There was 1 interview round.
posted on 16 Apr 2021
Implement merge sort and find kth largest element in an array.
Merge sort is a divide and conquer algorithm that recursively divides the array into two halves, sorts them and then merges them.
Kth largest element can be found using quick select algorithm or by sorting the array and returning the kth element from the end.
Merge sort has a time complexity of O(nlogn) and space complexity of O(n).
Quick select has a time comp...
I applied via Campus Placement and was interviewed in May 2021. There was 1 interview round.
I applied via Naukri.com and was interviewed in Mar 2021. There were 3 interview rounds.
based on 1 interview
Interview experience
based on 4 reviews
Rating in categories
Desktop Support Engineer
227
salaries
| ₹1.1 L/yr - ₹4.1 L/yr |
Network Support Engineer
172
salaries
| ₹0.9 L/yr - ₹3.5 L/yr |
Network Engineer
152
salaries
| ₹1.7 L/yr - ₹7.9 L/yr |
Technical Support Engineer
82
salaries
| ₹1.5 L/yr - ₹4.2 L/yr |
System Administrator
77
salaries
| ₹2.4 L/yr - ₹7.5 L/yr |
ITC Infotech
CMS IT Services
KocharTech
Xoriant