i
Tejas Networks
Filter interviews by
Code for producer-consumer problem using mutex
Create a shared buffer between producer and consumer
Use mutex to lock the buffer while accessing it
Producer adds data to buffer and signals consumer
Consumer waits for signal and consumes data from buffer
Repeat until all data is produced and consumed
Mutex is used for mutual exclusion while Semaphore is used for signaling and synchronization.
Mutex is used to protect a shared resource from simultaneous access by multiple threads.
Semaphore is used to signal between threads or to limit the number of threads accessing a shared resource.
Mutex can only be locked and unlocked by the thread that locked it.
Semaphore can be signaled and waited on by different threads.
Mutex i...
Mutex and Semaphores serve different purposes in managing concurrent access to shared resources.
Mutex is used to provide exclusive access to a shared resource, while Semaphores can be used to control access to a shared resource by multiple threads.
Mutex is binary in nature, meaning it can only be in two states - locked or unlocked, while Semaphores can have multiple states.
Mutex is typically used for protecting critica...
Deadlock is a situation where two or more processes are unable to proceed because they are waiting for each other to release resources.
Occurs in multi-threaded or multi-process environments
Can lead to system freeze or crash
Prevention techniques include resource ordering and timeouts
Example: Process A holds resource X and waits for resource Y, while Process B holds resource Y and waits for resource X
Deadlock can be prevented by using techniques like resource allocation, avoidance, and detection.
Use a resource allocation algorithm to ensure resources are allocated in a safe manner.
Avoidance can be achieved by ensuring that resources are only requested when they are available.
Detection involves periodically checking for deadlock and taking action to resolve it if it is detected.
Implementing timeouts can also help pr...
Virtual addressing is a memory management technique that allows a program to use more memory than physically available.
Virtual addresses are mapped to physical addresses by the operating system.
Virtual addresses are allocated to a program during its execution.
Virtual addressing allows for efficient use of memory resources.
Virtual addressing enables the use of shared memory and memory protection.
Examples of virtual addr
Linker links object files and libraries to create an executable file. Loader loads the executable file into memory and executes it.
Linker resolves external references and generates an executable file
Loader loads the executable file into memory and performs relocation
Linker and loader are part of the toolchain used to build and run programs
Example: gcc uses linker and loader to compile and run C programs
Test_and_Set program is used to ensure mutual exclusion in concurrent systems.
Test_and_Set is a hardware instruction that sets a memory location to a value and returns its old value.
The program uses a loop to repeatedly execute the Test_and_Set instruction until it returns 0.
The program then enters the critical section and sets the memory location back to 0 when done.
Example code: while(Test_and_Set(&lock)); //critica
Program to merge two sorted linked lists in sorted order
Create a new linked list to store the merged result
Compare the first nodes of both lists and add the smaller one to the result list
Move the pointer of the list with the smaller node to the next node
Repeat until one of the lists is empty, then add the remaining nodes of the other list to the result
Return the merged list
Program to find the duplicate in an array using binary tree or hash table
Create a binary tree or hash table
Iterate through the array and insert each element into the tree or table
If an element already exists, it is a duplicate
Virtual memory is still necessary even with large physical memory. Paging helps manage memory usage.
Virtual memory allows for efficient use of physical memory by swapping data between RAM and storage devices.
Paging helps manage memory usage by dividing memory into smaller chunks called pages, which can be swapped in and out of physical memory as needed.
Even with large physical memory, virtual memory can still be useful...
Time complexity of building a heap using linked list and arrays
Building a heap using a linked list takes O(nlogn) time complexity
Building a heap using an array takes O(n) time complexity
Linked list implementation is slower than array implementation
Arrays are better for random access while linked lists are better for insertion and deletion
To find the middle of a linked list, use two pointers - one moving at twice the speed of the other.
Initialize two pointers - slow and fast
Move the slow pointer one step at a time and the fast pointer two steps at a time
When the fast pointer reaches the end of the list, the slow pointer will be at the middle
If the list has even number of nodes, there will be two middle nodes. In that case, return the second middle node
I was interviewed in Jan 2025.
The first round consisted of an aptitude and coding assessment. It included several aptitude questions and technical multiple-choice questions on networking. Additionally, there was one straightforward coding question that needed to be solved using Python.
I applied via Recruitment Consulltant and was interviewed in Dec 2024. There were 2 interview rounds.
Easy like time speed distance ,time and work
Above average like dynamic progrmming and arrays
Tejas Networks interview questions for popular designations
Very good but easy
easy question long question
Get interview-ready with Top Tejas Networks Interview Questions
There were 3 sections. 1st was aptitute 10 questions and 2nd section was technical 10 questions then 3rd section had 3 coding questions which were of easy level.
LTE stands for Long-Term Evolution and is a standard for wireless broadband communication.
LTE is a 4G wireless communication standard used for high-speed data transmission.
It provides faster data speeds and lower latency compared to previous generations like 3G.
LTE is commonly used for mobile internet access, video streaming, and VoIP services.
Examples of LTE networks include Verizon, AT&T, and T-Mobile in the United S
5G in telecom refers to the fifth generation of wireless technology, promising faster speeds, lower latency, and increased capacity for mobile networks.
5G is the next generation of mobile network technology after 4G LTE.
It promises faster download and upload speeds, lower latency, and increased capacity for more connected devices.
5G uses higher frequency bands to achieve these improvements, but with shorter range compa...
I applied via Company Website and was interviewed in Jul 2024. There was 1 interview round.
Salary is the payment or compensation an employee receives from an employer in exchange for work performed.
Salary is typically paid on a regular basis, such as monthly or bi-weekly.
It can be a fixed amount or vary based on factors like performance or seniority.
Salaries can include additional benefits such as health insurance, retirement contributions, and bonuses.
A Network Field Engineer is responsible for designing, implementing, and maintaining communication networks for organizations.
Designing and implementing network solutions
Troubleshooting network issues
Configuring network devices
Collaborating with other IT professionals
Providing technical support to end users
Job back and if field refers to the tasks and responsibilities of a network field engineer.
Job back involves troubleshooting network issues in the field
Field work includes installing and configuring network equipment
Network field engineers may also perform maintenance and upgrades on existing networks
ES6, also known as ECMAScript 2015, is the sixth major release of the JavaScript language that introduced new features and syntax improvements.
Introduced let and const for variable declarations
Added arrow functions for more concise syntax
Included classes for object-oriented programming
Introduced template literals for easier string interpolation
Added default parameters and rest parameters for functions
Hoisting is a JavaScript mechanism where variable and function declarations are moved to the top of their containing scope during compilation.
Variable and function declarations are hoisted to the top of their scope.
Only declarations are hoisted, not initializations.
Function declarations take precedence over variable declarations.
I applied via Naukri.com and was interviewed in May 2024. There were 3 interview rounds.
Expected CTC and take home should be based on industry standards and the candidate's experience and skills.
Expected CTC should be in line with industry standards for the position and the candidate's experience level.
Take home pay should be calculated after deductions like taxes and insurance.
Candidates can research average salaries for similar roles in the industry to get an idea of what to expect.
Negotiation is common...
I applied via Walk-in and was interviewed in Jun 2024. There was 1 interview round.
Top trending discussions
Some of the top questions asked at the Tejas Networks interview -
The duration of Tejas Networks interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 82 interviews
Interview experience
based on 414 reviews
Rating in categories
7-15 Yrs
Not Disclosed
4-9 Yrs
Not Disclosed
R&D Engineer
268
salaries
| ₹5.5 L/yr - ₹17.5 L/yr |
Network Engineer
161
salaries
| ₹2 L/yr - ₹6 L/yr |
Senior Engineer
154
salaries
| ₹5 L/yr - ₹20 L/yr |
Engineer
121
salaries
| ₹2.9 L/yr - ₹13 L/yr |
Software Engineer
92
salaries
| ₹7.5 L/yr - ₹19 L/yr |
Sterlite Technologies
HFCL Limited
Vihaan Networks
Bharti Airtel