i
TCS
Filter interviews by
Packet forwarding from ACI to WAN involves routing, encapsulation, and policy application for efficient data transmission.
ACI uses a control plane to manage packet forwarding decisions based on policies.
Packets are encapsulated in a VXLAN header for transport across the ACI fabric.
The ACI fabric communicates with external routers via Layer 3 gateways.
For example, a packet from a tenant application is routed throug...
An OSPF area is a logical grouping of routers that share the same link-state information to optimize routing efficiency.
OSPF (Open Shortest Path First) uses areas to reduce routing overhead.
Each OSPF area has a unique identifier, typically in the form of an IP address.
Area 0 is the backbone area, and all other areas must connect to it.
Example: Area 1 and Area 2 can connect to Area 0, but not directly to each other...
LSA7 is a type of Link State Advertisement used in OSPF for external routes, specifically for Type 7 LSAs.
LSA7 is used in OSPF (Open Shortest Path First) routing protocol.
It is specifically for Not-So-Stubby Areas (NSSA) to advertise external routes.
Type 7 LSAs are translated into Type 5 LSAs by the Area Border Router (ABR) when leaving the NSSA.
Example: If an external route is advertised in an NSSA, it will be se...
Firewall filters traffic based on security rules, while router forwards data packets between networks.
Firewall is used to block or allow traffic based on security rules, while router is used to forward data packets between networks
Firewall operates at the network layer (Layer 3) or above, while router operates at the network layer (Layer 3)
Firewall can inspect and filter traffic based on IP addresses, ports, proto...
What people are saying about TCS
Programming language is a set of instructions that tells a computer how to perform specific tasks.
Programming languages are used to create software, websites, and applications.
Examples of programming languages include Java, Python, C++, and JavaScript.
Each programming language has its own syntax and rules for writing code.
Important aspects of networking include security, scalability, reliability, and performance.
Security: Ensuring data confidentiality, integrity, and availability through measures like firewalls, encryption, and access control.
Scalability: Designing networks to accommodate growth in users, devices, and traffic without sacrificing performance.
Reliability: Minimizing downtime and ensuring continuous connectivity throu...
STP selection process determines the root bridge and designated ports in a network.
STP selection process starts by electing a root bridge based on the lowest bridge ID.
Each switch then determines the best path to the root bridge.
Designated ports are selected on each segment based on the lowest path cost to the root bridge.
Non-designated ports are put in blocking state to prevent loops in the network.
BGP states refer to the different stages a BGP session goes through during establishment and maintenance.
Idle state: Initial state when BGP process starts
Connect state: Attempting to establish a TCP connection
OpenSent state: Sending an OPEN message to peer
OpenConfirm state: Waiting for an OPEN message from peer
Established state: BGP peers are fully synchronized and exchanging routing information
SD-WAN architecture is a software-defined approach to managing wide area networks.
SD-WAN uses software to control the connectivity, management, and services between data centers and remote branches.
It allows for centralized control and automation of network traffic.
SD-WAN can prioritize critical applications and optimize bandwidth usage.
Examples of SD-WAN vendors include Cisco, VMware, and Silver Peak.
BGP stands for Border Gateway Protocol, used for routing between different autonomous systems.
BGP is an exterior gateway protocol used to exchange routing information between different autonomous systems.
It is commonly used by Internet Service Providers (ISPs) to connect their networks and exchange routing information.
BGP helps in determining the best path for data to travel between networks based on various attri...
I appeared for an interview in May 2025, where I was asked the following questions.
Packet forwarding from ACI to WAN involves routing, encapsulation, and policy application for efficient data transmission.
ACI uses a control plane to manage packet forwarding decisions based on policies.
Packets are encapsulated in a VXLAN header for transport across the ACI fabric.
The ACI fabric communicates with external routers via Layer 3 gateways.
For example, a packet from a tenant application is routed through the...
LSA types in NSSA help in route advertisement within OSPF networks, specifically for external routes.
NSSA (Not-So-Stubby Area) allows external routes to be advertised using Type 7 LSAs.
Type 7 LSAs are converted to Type 5 LSAs when they leave the NSSA area.
This enables the redistribution of external routes while maintaining OSPF's hierarchical structure.
Example: If a router in an NSSA receives a Type 7 LSA for a route, ...
LSA7 is a type of Link State Advertisement used in OSPF for external routes, specifically for Type 7 LSAs.
LSA7 is used in OSPF (Open Shortest Path First) routing protocol.
It is specifically for Not-So-Stubby Areas (NSSA) to advertise external routes.
Type 7 LSAs are translated into Type 5 LSAs by the Area Border Router (ABR) when leaving the NSSA.
Example: If an external route is advertised in an NSSA, it will be sent as...
An OSPF area is a logical grouping of routers that share the same link-state information to optimize routing efficiency.
OSPF (Open Shortest Path First) uses areas to reduce routing overhead.
Each OSPF area has a unique identifier, typically in the form of an IP address.
Area 0 is the backbone area, and all other areas must connect to it.
Example: Area 1 and Area 2 can connect to Area 0, but not directly to each other.
OSPF, VLAN, BGP, and TCP are all important networking protocols used in the field of network engineering.
OSPF (Open Shortest Path First) is a routing protocol used to determine the best path for data packets in a network.
VLAN (Virtual Local Area Network) is a method of creating multiple virtual networks within a single physical network.
BGP (Border Gateway Protocol) is an exterior gateway protocol used to exchange routi...
OSPF (Open Shortest Path First) is a routing protocol used in IP networks to determine the best path for data packets.
OSPF has four states: Down, Init, 2-Way, Exstart, Exchange, Loading, and Full.
During the Down state, the router does not have any information about its neighbors.
In the Init state, the router sends Hello packets to discover neighbors.
The 2-Way state is when bidirectional communication is established bet...
Prepare the techinical
Technically questions
Benefits and advantages of being a Network Engineer include high demand, competitive salary, opportunities for growth, and job security.
High demand for network engineers in various industries
Competitive salary compared to other IT roles
Opportunities for growth and advancement in the field
Job security due to the increasing reliance on technology and networks
Ability to work on cutting-edge technologies and projects
I applied via Recruitment Consulltant and was interviewed in Mar 2024. There was 1 interview round.
SD-WAN architecture is a software-defined approach to managing wide area networks.
SD-WAN uses software to control the connectivity, management, and services between data centers and remote branches.
It allows for centralized control and automation of network traffic.
SD-WAN can prioritize critical applications and optimize bandwidth usage.
Examples of SD-WAN vendors include Cisco, VMware, and Silver Peak.
STP selection process determines the root bridge and designated ports in a network.
STP selection process starts by electing a root bridge based on the lowest bridge ID.
Each switch then determines the best path to the root bridge.
Designated ports are selected on each segment based on the lowest path cost to the root bridge.
Non-designated ports are put in blocking state to prevent loops in the network.
OSPF LSA types include Router LSA, Network LSA, Summary LSA, and ASBR Summary LSA, each serving different purposes in OSPF routing.
Router LSA: Describes the router's directly connected links.
Network LSA: Represents multi-access networks and lists all routers connected to the network.
Summary LSA: Summarizes routes from one area to another.
ASBR Summary LSA: Summarizes external routes injected into OSPF by an ASBR.
LSA typ...
BGP states refer to the different stages a BGP session goes through during establishment and maintenance.
Idle state: Initial state when BGP process starts
Connect state: Attempting to establish a TCP connection
OpenSent state: Sending an OPEN message to peer
OpenConfirm state: Waiting for an OPEN message from peer
Established state: BGP peers are fully synchronized and exchanging routing information
Data link layer is responsible for node-to-node communication, while network layer is responsible for end-to-end communication.
Data link layer operates at Layer 2 of the OSI model and is responsible for framing, error detection, and flow control.
Network layer operates at Layer 3 of the OSI model and is responsible for logical addressing, routing, and path determination.
Examples of data link layer protocols include Ethe...
Firewall filters traffic based on security rules, while router forwards data packets between networks.
Firewall is used to block or allow traffic based on security rules, while router is used to forward data packets between networks
Firewall operates at the network layer (Layer 3) or above, while router operates at the network layer (Layer 3)
Firewall can inspect and filter traffic based on IP addresses, ports, protocols,...
I appeared for an interview in Aug 2024.
I work with my team to design, implement, and maintain network infrastructure to ensure optimal performance and security.
Collaborate with team members to plan and design network infrastructure
Implement network solutions based on project requirements
Monitor and troubleshoot network issues to ensure optimal performance
Contribute to network security by implementing best practices and protocols
Document network configuratio...
The duration of TCS Network Engineer interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 24 interview experiences
Difficulty level
Duration
based on 173 reviews
Rating in categories
System Engineer
1.1L
salaries
| ₹3.9 L/yr - ₹8.3 L/yr |
IT Analyst
65.5k
salaries
| ₹7.7 L/yr - ₹12.7 L/yr |
AST Consultant
53.6k
salaries
| ₹12 L/yr - ₹20.6 L/yr |
Assistant System Engineer
33.2k
salaries
| ₹2.5 L/yr - ₹6.4 L/yr |
Associate Consultant
33k
salaries
| ₹16.2 L/yr - ₹28 L/yr |
Amazon
Wipro
Infosys
Accenture