Premium Employer

i

This company page is being actively managed by Tejas Networks Team. If you also belong to the team, you can get access from here

Tejas Networks Verified Tick

Compare button icon Compare button icon Compare

Filter interviews by

Tejas Networks Interview Questions, Process, and Tips

Updated 12 Feb 2025

Top Tejas Networks Interview Questions and Answers

View all 73 questions

Tejas Networks Interview Experiences

Popular Designations

75 interviews found

Interview Questions & Answers

user image Anonymous

posted on 6 Apr 2015

Interview Questionnaire 

14 Questions

  • Q1. Write the code for producer-consumer problem using mutex
  • Ans. 

    Code for producer-consumer problem using mutex

    • Create a shared buffer between producer and consumer

    • Use mutex to lock the buffer while accessing it

    • Producer adds data to buffer and signals consumer

    • Consumer waits for signal and consumes data from buffer

    • Repeat until all data is produced and consumed

  • Answered by AI
  • Q2. Differences between Mutex and Semaphore
  • Ans. 

    Mutex is used for mutual exclusion while Semaphore is used for signaling and synchronization.

    • Mutex is used to protect a shared resource from simultaneous access by multiple threads.

    • Semaphore is used to signal between threads or to limit the number of threads accessing a shared resource.

    • Mutex can only be locked and unlocked by the thread that locked it.

    • Semaphore can be signaled and waited on by different threads.

    • Mutex i...

  • Answered by AI
  • Q3. Why do we need Mutex if we have Semophers
  • Ans. 

    Mutex and Semaphores serve different purposes in managing concurrent access to shared resources.

    • Mutex is used to provide exclusive access to a shared resource, while Semaphores can be used to control access to a shared resource by multiple threads.

    • Mutex is binary in nature, meaning it can only be in two states - locked or unlocked, while Semaphores can have multiple states.

    • Mutex is typically used for protecting critica...

  • Answered by AI
  • Q4. What is Deadlock
  • Ans. 

    Deadlock is a situation where two or more processes are unable to proceed because they are waiting for each other to release resources.

    • Occurs in multi-threaded or multi-process environments

    • Can lead to system freeze or crash

    • Prevention techniques include resource ordering and timeouts

    • Example: Process A holds resource X and waits for resource Y, while Process B holds resource Y and waits for resource X

  • Answered by AI
  • Q5. How can we prevent Deadlock?
  • Ans. 

    Deadlock can be prevented by using techniques like resource allocation, avoidance, and detection.

    • Use a resource allocation algorithm to ensure resources are allocated in a safe manner.

    • Avoidance can be achieved by ensuring that resources are only requested when they are available.

    • Detection involves periodically checking for deadlock and taking action to resolve it if it is detected.

    • Implementing timeouts can also help pr...

  • Answered by AI
  • Q6. Explain the concept of virtual addressing and the allocation of virtual addresses during the execution of program
  • Ans. 

    Virtual addressing is a memory management technique that allows a program to use more memory than physically available.

    • Virtual addresses are mapped to physical addresses by the operating system.

    • Virtual addresses are allocated to a program during its execution.

    • Virtual addressing allows for efficient use of memory resources.

    • Virtual addressing enables the use of shared memory and memory protection.

    • Examples of virtual addr

  • Answered by AI
  • Q7. When would be the concept of virtual addressing comes into the picture(during compilation or run time)?
  • Q8. Explain the roles of linker and loader during the execution of the program
  • Ans. 

    Linker links object files and libraries to create an executable file. Loader loads the executable file into memory and executes it.

    • Linker resolves external references and generates an executable file

    • Loader loads the executable file into memory and performs relocation

    • Linker and loader are part of the toolchain used to build and run programs

    • Example: gcc uses linker and loader to compile and run C programs

  • Answered by AI
  • Q9. Write the Test_and_Set program
  • Ans. 

    Test_and_Set program is used to ensure mutual exclusion in concurrent systems.

    • Test_and_Set is a hardware instruction that sets a memory location to a value and returns its old value.

    • The program uses a loop to repeatedly execute the Test_and_Set instruction until it returns 0.

    • The program then enters the critical section and sets the memory location back to 0 when done.

    • Example code: while(Test_and_Set(&lock)); //critica

  • Answered by AI
  • Q10. Write the program to merge to sorted linked lists in sorted order
  • Ans. 

    Program to merge two sorted linked lists in sorted order

    • Create a new linked list to store the merged result

    • Compare the first nodes of both lists and add the smaller one to the result list

    • Move the pointer of the list with the smaller node to the next node

    • Repeat until one of the lists is empty, then add the remaining nodes of the other list to the result

    • Return the merged list

  • Answered by AI
  • Q11. Write a program to find the duplicate in the array(only one duplicate is present in the array).ANS: best way-using binary tree on hash table
  • Ans. 

    Program to find the duplicate in an array using binary tree or hash table

    • Create a binary tree or hash table

    • Iterate through the array and insert each element into the tree or table

    • If an element already exists, it is a duplicate

  • Answered by AI
  • Q12. Consider we have large amount of physical memory.Do we still need virtual memory?What is the use of paging in that situation
  • Ans. 

    Virtual memory is still necessary even with large physical memory. Paging helps manage memory usage.

    • Virtual memory allows for efficient use of physical memory by swapping data between RAM and storage devices.

    • Paging helps manage memory usage by dividing memory into smaller chunks called pages, which can be swapped in and out of physical memory as needed.

    • Even with large physical memory, virtual memory can still be useful...

  • Answered by AI
  • Q13. Time complexity of building a heap using linked list and arrays
  • Ans. 

    Time complexity of building a heap using linked list and arrays

    • Building a heap using a linked list takes O(nlogn) time complexity

    • Building a heap using an array takes O(n) time complexity

    • Linked list implementation is slower than array implementation

    • Arrays are better for random access while linked lists are better for insertion and deletion

  • Answered by AI
  • Q14. How do you find the middle of the linked list
  • Ans. 

    To find the middle of a linked list, use two pointers - one moving at twice the speed of the other.

    • Initialize two pointers - slow and fast

    • Move the slow pointer one step at a time and the fast pointer two steps at a time

    • When the fast pointer reaches the end of the list, the slow pointer will be at the middle

    • If the list has even number of nodes, there will be two middle nodes. In that case, return the second middle node

  • Answered by AI

Interview Preparation Tips

Round: Test
Experience: If you are from CS or CS related branches and if you are in no mood to take boring aptitude questions then probably this written test might be the one you are waiting for. The written test is easy for any one(any discipline) to crack if you are good at coding.1.Aptitude:The questions are easy to crack provided you understand the questions well.No need of in advance preparation required as most of them are puzzles.My suggestion:Solve aptitude within 15-20 mins as they don't concentrate much on your score in aptitude,however you need to cross the cutoff for aptitude which is generally high as the questions are easy.2.Technical Questions:Questions from Algorithms,Computer Networks,Data Structures,Database Management,Operating Systems(IMP).Most of the questions are just the basic stuff from the topics mentioned above.Also they concentrated mostly on pointers and structures(VERY IMP).IMP things to be noted to crack these questions:Given a c or c++ program with error,you should be able to tell whether the error is compilation error or Run time error-nearly 4-5 questions.Difference between compiler , assembler, linker and loader.Its better if you know the whole process of how the program gets executed if you compile and run the program.Concentrate on pointers in C.Again lots of questions on basic C stuff.Given a program you must be able to tell if there are any errors in the program or the program is error free,if there is an error,What type of error it is(Compilation error or run time error).Questions on different layers in Computer Networks(just basics).Questions on Process and Threads in OS(Very IMP).Time complexities of various sorts and searches in DSA.Time complexities on various questions related to Linked lists and binary trees. My suggestion:complete these 30 technical questions in 45 mins so that you can spend 1hr on coding questions which is very important.3.Coding Round: This is the most important one among the three and it carries most of the weightage for further rounds.If you crack this round with good score then you are almost through.Most of the questions are just the standard programming questions which can be solved if you are good at coding.You can use any programming language.Questions asked during my exam:
1.Write a program to print the no of digits in the binary form of the decimal number.
2.Write the functions to create a stack and to delete a node from the stack.
3.Write a program to return the Nth prime number from the Fibonacci series.
4.You are given a string and a number.Count the no of '-' characters in the string and return 1 if the count is equal to the number given or else return 0.
Tips: Don't neglect to practice some basic questions like finding GCD,LCM of 2 numbers, Fibonacci series,prime no,factorial of the given number etc.Some may waste their time during the exam thinking about how to solve these basic questions which is disastrous.
One question for sure on Binary trees,linked lists,stacks or queues.If you are asked to write only functions,write only functions,don't waste your time writing ‪#‎include‬,main function and sort of stuff.You may think that you don't need 1hr to code these questions and you start wasting your time on aptitude.Believe me you will regret if you don't spend at least 1hr on coding questions as they care about good coding practices and time complexity of your program.
Duration: 120 minutes

Round: Technical Interview
Experience: During my time,they have shortlisted 14 members out of 80 members participated for the exam.Technical Interview may lost for about 1hr to 2 hr.They mainly target DSA and OS.They don't ask questions on Database generally.They may ask questions on Computer Networks but they didn't ask any during my time. Binary trees,heap,hash and linked list are the IMP topics.They concentrate mainly on the OS topics like Semaphores,mutex,monitors,Deadlocks,virtual memory concepts,virtual addressing concepts,paging and segmentation etc.Technical Round 1-they check your problem solving skills(probability,permutations),concepts in operating system,compiler design and computer networks,basic programming skills in C/C++.Technical Round 2-Algorithmic Round-questions from linked list,binary tree algorithms and concepts of pointers.They stressed mostly on the OS during my 1:30hrs interview.(say 1hr on OS and 1/2 hr on DSA).In Technical questions were mostly from Digital Electronics(a lot of questions from setup time and hold time and max clock frequency). Some very basic questions on Oscillators and Communication.

Round: HR Interview
Experience: 2 hr inetrview,25-20 min,main foucs wetehr you are ready to work in bangalore o not ,rest all simple stuff,dont show you have any relocation problem,then it is esay to crack,remember hr was also deciding factor so dont take it lightly.In cse out of 8 hr. they took only 3 so it was also having the weightage .Generally higher pointers were chosen .

College Name: BIT MESRA

Skills evaluated in this interview

Interview Questions & Answers

user image Anonymous

posted on 12 Feb 2025

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I was interviewed in Jan 2025.

Round 1 - Aptitude Test 

The first round consisted of an aptitude and coding assessment. It included several aptitude questions and technical multiple-choice questions on networking. Additionally, there was one straightforward coding question that needed to be solved using Python.

Round 2 - Technical 

(15 Questions)

  • Q1. Tell me about yourself.
  • Q2. What are lists, sets, and tuples in Python?
  • Ans. 

    Lists, sets, and tuples are data structures in Python used to store collections of items.

    • Lists are ordered, mutable, and allow duplicate elements. Example: [1, 2, 3]

    • Sets are unordered, mutable, and do not allow duplicate elements. Example: {1, 2, 3}

    • Tuples are ordered, immutable, and allow duplicate elements. Example: (1, 2, 3)

  • Answered by AI
  • Q3. What is the difference between multiprogramming and multitasking?
  • Ans. 

    Multiprogramming involves running multiple programs on a single processor, while multitasking involves executing multiple tasks within a single program.

    • Multiprogramming allows multiple programs to be loaded into memory and executed concurrently.

    • Multitasking involves switching between different tasks within a single program, giving the illusion of parallel execution.

    • Examples of multiprogramming include time-sharing syst...

  • Answered by AI
  • Q4. What is your understanding of threads in programming?
  • Ans. 

    Threads in programming are independent paths of execution within a program.

    • Threads allow for concurrent execution of tasks within a program.

    • Threads share the same memory space, allowing for communication and data sharing between them.

    • Examples of using threads include multi-threaded web servers, parallel processing, and background tasks in applications.

  • Answered by AI
  • Q5. What is the code to check whether a string is a palindrome?
  • Ans. 

    Use two pointers to compare characters from start and end of the string.

    • Initialize two pointers, one at the start of the string and one at the end.

    • Compare characters at both pointers, move towards the center while checking for equality.

    • If all characters match, the string is a palindrome.

  • Answered by AI
  • Q6. What is the code to rotate a 3x3 matrix 270 degrees anti-clockwise?
  • Ans. 

    To rotate a 3x3 matrix 270 degrees anti-clockwise, transpose the matrix and then reverse the rows.

    • Transpose the matrix by swapping elements across the diagonal

    • Reverse the rows of the transposed matrix

  • Answered by AI
  • Q7. What is the code to remove duplicate elements from an array?
  • Ans. 

    Use a Set to remove duplicate elements from an array of strings.

    • Create a Set from the array to automatically remove duplicates

    • Convert the Set back to an array to get the unique elements

    • Example: const array = ['apple', 'banana', 'apple', 'orange']; const uniqueArray = [...new Set(array)];

  • Answered by AI
  • Q8. What conventions are typically followed when writing a program?
  • Ans. 

    Conventions like naming variables, using comments, and following indentation are typically followed when writing a program.

    • Use meaningful variable names to improve code readability

    • Include comments to explain complex sections of code

    • Follow consistent indentation for better code organization

  • Answered by AI
  • Q9. What is the purpose of a subnet mask in networking?
  • Ans. 

    A subnet mask is used to divide an IP address into network and host portions.

    • Defines the network portion of an IP address

    • Helps determine which part of the IP address is the network ID and which part is the host ID

    • Used in conjunction with IP addresses to route traffic within a network

    • Common subnet masks include 255.255.255.0 for a Class C network

  • Answered by AI
  • Q10. What are the different layers of the OSI model?
  • Ans. 

    The OSI model consists of seven layers that define the different functions of a network communication system.

    • Physical layer: Deals with physical connections and transmission of raw data.

    • Data link layer: Manages data transfer between devices on the same network.

    • Network layer: Handles routing and forwarding of data packets.

    • Transport layer: Ensures reliable data transfer between end systems.

    • Session layer: Manages communic...

  • Answered by AI
  • Q11. What is NumPy in Python?
  • Ans. 

    NumPy is a library in Python used for numerical computing, providing support for large, multi-dimensional arrays and matrices.

    • NumPy stands for Numerical Python.

    • It is widely used for scientific computing and data analysis.

    • NumPy arrays are more efficient than Python lists for numerical operations.

    • Example: import numpy as np

    • Example: arr = np.array([1, 2, 3])

  • Answered by AI
  • Q12. What is an IP address and what are its classes?
  • Ans. 

    An IP address is a unique numerical label assigned to each device connected to a computer network.

    • IP address stands for Internet Protocol address.

    • It is used to identify and locate devices on a network.

    • There are 5 classes of IP addresses: A, B, C, D, and E.

    • Each class has a different range of possible addresses.

    • For example, Class A addresses range from 1.0.0.0 to 126.255.255.255.

  • Answered by AI
  • Q13. What is your knowledge of Virtual Private Networks (VPNs)?
  • Ans. 

    VPNs are secure networks that allow users to access the internet privately and securely.

    • VPNs encrypt internet traffic to protect data from hackers and surveillance.

    • They can be used to access region-restricted websites or bypass censorship.

    • Common VPN protocols include OpenVPN, L2TP/IPsec, and IKEv2.

    • VPN services like NordVPN, ExpressVPN, and CyberGhost offer secure connections.

    • Businesses often use VPNs to allow remote em

  • Answered by AI
  • Q14. What is the function of a router gateway?
  • Ans. 

    A router gateway is a device that connects different networks and routes data between them.

    • Acts as an entry and exit point for data traffic between networks

    • Provides security by filtering incoming and outgoing traffic

    • Assigns IP addresses to devices on the network

    • Controls the flow of data packets between networks

  • Answered by AI
  • Q15. Can you provide more details about the projects you have worked on?
  • Ans. 

    I have worked on various projects including designing solar panel systems for residential and commercial buildings.

    • Designed and implemented solar panel systems for residential homes

    • Managed the installation of solar panels on commercial buildings

    • Optimized solar panel layouts for maximum energy efficiency

    • Collaborated with architects and engineers to integrate solar panels into building designs

  • Answered by AI
Round 3 - HR 

(5 Questions)

  • Q1. Tell me about yourself.
  • Q2. What are your hobbies?
  • Ans. 

    My hobbies include hiking, reading, and playing the guitar.

    • Hiking: I enjoy exploring nature trails and challenging myself physically.

    • Reading: I love getting lost in a good book, especially fiction and mystery genres.

    • Playing the guitar: I find playing music to be a relaxing and creative outlet.

  • Answered by AI
  • Q3. What is your current place of residence?
  • Ans. 

    I currently reside in a cozy apartment in downtown Seattle.

    • Reside in downtown Seattle

    • Live in a cozy apartment

    • Current place of residence

  • Answered by AI
  • Q4. What are the reasons for your interest in Tejas Networks?
  • Ans. 

    I am interested in Tejas Networks due to their innovative technology and strong reputation in the industry.

    • Innovative technology: Tejas Networks is known for their cutting-edge solutions in the field of optical networking.

    • Strong reputation: Tejas Networks has a proven track record of delivering high-quality products and services to their customers.

    • Career growth opportunities: I believe that working at Tejas Networks wi...

  • Answered by AI
  • Q5. Are you open for any role
  • Ans. 

    Yes, I am open to any role that aligns with my skills and interests.

    • I am flexible and willing to learn new skills if needed

    • I am open to exploring different roles within the engineering field

    • I believe in taking on new challenges and opportunities

    • For example, I have experience in mechanical engineering but am open to roles in electrical engineering as well

  • Answered by AI

Engineer Interview Questions & Answers

user image Anonymous

posted on 28 Dec 2024

Interview experience
5
Excellent
Difficulty level
Moderate
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Recruitment Consulltant and was interviewed in Dec 2024. There were 2 interview rounds.

Round 1 - Technical 

(4 Questions)

  • Q1. What is stm-1 link
  • Ans. 

    STM-1 link refers to a Synchronous Transport Module level 1 link used in telecommunications for transmitting data.

    • STM-1 link operates at a data rate of 155.52 Mbps.

    • It is commonly used in SDH (Synchronous Digital Hierarchy) networks.

    • STM-1 link can carry multiple DS3 or E3 circuits.

    • It is equivalent to 63 E1 channels or 28 DS1 channels.

  • Answered by AI
  • Q2. What is Ip address and subnet mask
  • Ans. 

    An IP address is a unique numerical label assigned to each device connected to a computer network, while a subnet mask is used to divide an IP network into subnetworks.

    • IP address identifies a device on a network, like 192.168.1.1

    • Subnet mask determines the network portion of an IP address, like 255.255.255.0

    • Subnet mask is used to separate the network and host portions of an IP address

  • Answered by AI
  • Q3. What is OSI and TCP/IP Model
  • Ans. 

    OSI and TCP/IP models are networking models that define how data is transmitted over a network.

    • OSI model has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, Application.

    • TCP/IP model has 4 layers: Network Interface, Internet, Transport, Application.

    • OSI model is theoretical while TCP/IP model is practical and widely used.

    • OSI model is a reference model while TCP/IP model is a protocol stack.

    • Examp...

  • Answered by AI
  • Q4. What are the requirements for the implementation of stm-1 link and what is the capacity of stm-1 link
  • Ans. 

    Requirements and capacity of stm-1 link implementation

    • Requirements include fiber optic cables, SDH equipment, and proper configuration

    • Capacity of stm-1 link is 155.52 Mbps

    • STM-1 link is commonly used in telecommunications for high-speed data transmission

  • Answered by AI
Round 2 - Technical 

(15 Questions)

  • Q1. What is ip address and difference between ipv4 and ipv6?
  • Ans. 

    An IP address is a unique numerical label assigned to each device connected to a computer network. IPv4 uses 32-bit addresses, while IPv6 uses 128-bit addresses.

    • IP address is a unique identifier for devices on a network.

    • IPv4 uses 32-bit addresses, represented in decimal format (e.g. 192.168.1.1).

    • IPv6 uses 128-bit addresses, represented in hexadecimal format (e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334).

  • Answered by AI
  • Q2. What is vlan and vlan-id
  • Ans. 

    VLAN stands for Virtual Local Area Network. VLAN ID is a unique identifier assigned to a VLAN.

    • VLAN is a logical grouping of devices on the same network segment.

    • VLANs help in segmenting network traffic for security and performance reasons.

    • VLAN ID is a number assigned to each VLAN to differentiate it from others.

    • For example, VLAN 10 might be used for finance department while VLAN 20 for marketing.

  • Answered by AI
  • Q3. What is layer-2 and layer-3 services. Also what is the difference between them.
  • Ans. 

    Layer-2 and layer-3 services refer to different levels of network services in the OSI model.

    • Layer-2 services operate at the data link layer and include functions like MAC address assignment and Ethernet switching.

    • Layer-3 services operate at the network layer and include functions like IP address assignment and routing.

    • The main difference between layer-2 and layer-3 services is the level at which they operate in the OSI...

  • Answered by AI
  • Q4. Explain sdh structure and sdh frame
  • Ans. 

    SDH structure refers to the hierarchy of synchronous digital signals, while SDH frame is the basic unit of data transmission in SDH networks.

    • SDH structure includes various levels such as STM-1, STM-4, STM-16, etc.

    • SDH frame consists of a fixed number of bytes, with overhead for management and error correction.

    • SDH frame structure includes sections, lines, and paths for data transmission.

    • Example: STM-1 is a common level i...

  • Answered by AI
  • Q5. What is DCCR and DCCM?
  • Ans. 

    DCCR stands for Data Center Control Room and DCCM stands for Data Center Construction Manager.

    • DCCR is a centralized location within a data center where operators monitor the performance of servers, networks, and other equipment.

    • DCCM is responsible for overseeing the construction and maintenance of data center facilities.

    • Examples: DCCR helps in ensuring smooth operations of data centers by monitoring and managing resour...

  • Answered by AI
  • Q6. What is ipv4 and ipv6 address of google dns server
  • Ans. 

    IPv4 address of Google DNS server is 8.8.8.8 and IPv6 address is 2001:4860:4860::8888.

    • IPv4 address: 8.8.8.8

    • IPv6 address: 2001:4860:4860::8888

  • Answered by AI
  • Q7. What is subnet mask and how to calculate the no. Of usable ip's. What is network host ip and broadcast ip
  • Ans. 

    Subnet mask is used to divide an IP network into subnetworks, determining the network and host portions of an IP address.

    • Subnet mask is a 32-bit number that separates the network and host portions of an IP address.

    • To calculate the number of usable IPs in a subnet, subtract 2 from the total number of IPs in the subnet.

    • Network host IP is the first IP address in a subnet, while broadcast IP is the last IP address in a sub...

  • Answered by AI
  • Q8. What are different kinds of cards used in tejas 1400 and 1600 mux.
  • Ans. 

    Different kinds of cards used in Tejas 1400 and 1600 mux include line cards, switch cards, and power cards.

    • Line cards: used for connecting the mux to external devices

    • Switch cards: used for routing data within the mux

    • Power cards: used for providing power to the mux

    • Examples: STM-1 line card, STM-4 switch card, power supply card

  • Answered by AI
  • Q9. What is difference between xa60g and xa20g card.
  • Ans. 

    The main difference between xa60g and xa20g cards is the processing power and memory capacity.

    • xa60g card has higher processing power and memory capacity compared to xa20g card

    • xa60g card is more suitable for high-performance computing tasks

    • xa20g card may be more cost-effective for less demanding applications

  • Answered by AI
  • Q10. What is gpon technology? Also explain briefly gpon architecture?
  • Ans. 

    GPON technology is a type of passive optical network that uses fiber-optic cables to deliver high-speed internet, TV, and phone services.

    • GPON stands for Gigabit Passive Optical Network

    • It uses a point-to-multipoint architecture, where a single optical fiber serves multiple users

    • GPON architecture includes an Optical Line Terminal (OLT) at the service provider's central office and Optical Network Terminals (ONTs) at the c...

  • Answered by AI
  • Q11. How to add and delete nodes in NMS?
  • Ans. 

    Nodes can be added and deleted in NMS by using the management interface or command line interface.

    • Nodes can be added through the management interface by selecting the 'Add Node' option and providing the necessary information such as IP address, hostname, and SNMP credentials.

    • Nodes can also be added through the command line interface by using specific commands to add a new node to the network management system.

    • To delete...

  • Answered by AI
  • Q12. How to upgrade software in olt, ont and tejas 1400 locally and from nms?
  • Ans. 

    To upgrade software in OLT, ONT, and Tejas 1400 locally and from NMS, follow these steps.

    • Locally: Use a USB drive to transfer the software update file to the device. Access the device's management interface and initiate the upgrade process.

    • From NMS: Use the Network Management System (NMS) to remotely push the software update to the devices. Schedule the upgrade during off-peak hours to minimize disruption.

    • Ensure compat...

  • Answered by AI
  • Q13. What are different types of alarms occuring in tejas equipments
  • Ans. 

    Different types of alarms in Tejas equipments include power alarms, temperature alarms, and communication alarms.

    • Power alarms: indicate issues with power supply or voltage levels

    • Temperature alarms: alert when equipment temperature exceeds safe limits

    • Communication alarms: signal problems with data transmission or network connectivity

  • Answered by AI
  • Q14. Explain VCG, VCAT
  • Ans. 

    VCG stands for Voltage Controlled Gain and VCAT stands for Voltage Controlled Attenuator.

    • VCG is a circuit that adjusts the gain of an amplifier based on a control voltage.

    • VCAT is a circuit that adjusts the attenuation of a signal based on a control voltage.

    • Both VCG and VCAT are commonly used in electronic devices to control signal levels.

    • Example: VCG can be used in audio amplifiers to adjust the volume based on user in...

  • Answered by AI
  • Q15. What is ipmpls? What are the advantages of MPLS? Which one is better mpls or traditional routing.
  • Ans. 

    MPLS stands for Multiprotocol Label Switching. It is a protocol used in high-performance telecommunications networks.

    • Advantages of MPLS include improved performance, scalability, quality of service, and traffic engineering capabilities

    • MPLS allows for efficient packet forwarding based on labels instead of IP addresses

    • MPLS can support different types of traffic, such as voice, video, and data, with different service leve...

  • Answered by AI

Top Tejas Networks Engineer Interview Questions and Answers

Q1. What are the requirements for the implementation of stm-1 link and what is the capacity of stm-1 link
View answer (1)

Engineer Interview Questions asked at other Companies

Q1. ❖ If a team member is unable to carry out his work, he is doing it repetitively, how would you handle it?, would you like to work only on lifing of components, or would you be ready to shift to other departments?
View answer (7)

Interview Questions & Answers

user image Anonymous

posted on 2 Jan 2025

Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Aptitude Test 

Easy like time speed distance ,time and work

Round 2 - Aptitude Test 

Above average like dynamic progrmming and arrays

Round 3 - Technical 

(3 Questions)

  • Q1. Based on resume
  • Q2. About project and your role
  • Q3. About skills mentioned
Round 4 - HR 

(2 Questions)

  • Q1. Time speed distance related
  • Q2. Arrays related questions

Tejas Networks interview questions for popular designations

 R&D Engineer

 (16)

 Senior Engineer

 (5)

 Software Developer

 (4)

 Technician

 (3)

 Software Engineer

 (3)

 Senior R&D Engineer

 (3)

 Consultant

 (3)

 Senior Software Engineer

 (2)

Interview experience
2
Poor
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Coding Test 

Very good but easy
easy question long question

Round 2 - Technical 

(2 Questions)

  • Q1. Java codingg on sql programming
  • Q2. Colection framework java concept

Software Engineer Interview Questions asked at other Companies

Q1. Bridge and torch problem : Four people come to a river in the night. There is a narrow bridge, but it can only hold two people at a time. They have one torch and, because it's night, the torch has to be used when crossing the bridge. Person... read more
View answer (197)

Get interview-ready with Top Tejas Networks Interview Questions

Software Developer Interview Questions & Answers

user image shyamli singh

posted on 18 Oct 2024

Interview experience
3
Average
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Aptitude Test 

There were 3 sections. 1st was aptitute 10 questions and 2nd section was technical 10 questions then 3rd section had 3 coding questions which were of easy level.

Round 2 - Technical 

(2 Questions)

  • Q1. Questions related to OS and CN and Core java were asked.
  • Q2. A coding question was also asked to to find the second largest number.

Software Developer Interview Questions asked at other Companies

Q1. Maximum Subarray Sum Problem Statement Given an array of integers, determine the maximum possible sum of any contiguous subarray within the array. Example: Input: array = [34, -50, 42, 14, -5, 86] Output: 137 Explanation: The maximum sum is... read more
View answer (42)
Interview experience
5
Excellent
Difficulty level
-
Process Duration
-
Result
-
Round 1 - Technical 

(2 Questions)

  • Q1. What is LTE in telecom.
  • Ans. 

    LTE stands for Long-Term Evolution and is a standard for wireless broadband communication.

    • LTE is a 4G wireless communication standard used for high-speed data transmission.

    • It provides faster data speeds and lower latency compared to previous generations like 3G.

    • LTE is commonly used for mobile internet access, video streaming, and VoIP services.

    • Examples of LTE networks include Verizon, AT&T, and T-Mobile in the United S

  • Answered by AI
  • Q2. What is the 5G in telecom.
  • Ans. 

    5G in telecom refers to the fifth generation of wireless technology, promising faster speeds, lower latency, and increased capacity for mobile networks.

    • 5G is the next generation of mobile network technology after 4G LTE.

    • It promises faster download and upload speeds, lower latency, and increased capacity for more connected devices.

    • 5G uses higher frequency bands to achieve these improvements, but with shorter range compa...

  • Answered by AI

Network Integration Engineer Interview Questions asked at other Companies

Q1. What is the 5G in telecom.
View answer (1)
Interview experience
5
Excellent
Difficulty level
Easy
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Company Website and was interviewed in Jul 2024. There was 1 interview round.

Round 1 - Technical 

(5 Questions)

  • Q1. What's is yours sellary
  • Q2. I agree job and accept
  • Q3. What is sellary
  • Ans. 

    Salary is the payment or compensation an employee receives from an employer in exchange for work performed.

    • Salary is typically paid on a regular basis, such as monthly or bi-weekly.

    • It can be a fixed amount or vary based on factors like performance or seniority.

    • Salaries can include additional benefits such as health insurance, retirement contributions, and bonuses.

  • Answered by AI
  • Q4. What is job role
  • Ans. 

    A Network Field Engineer is responsible for designing, implementing, and maintaining communication networks for organizations.

    • Designing and implementing network solutions

    • Troubleshooting network issues

    • Configuring network devices

    • Collaborating with other IT professionals

    • Providing technical support to end users

  • Answered by AI
  • Q5. What is job back and if field
  • Ans. 

    Job back and if field refers to the tasks and responsibilities of a network field engineer.

    • Job back involves troubleshooting network issues in the field

    • Field work includes installing and configuring network equipment

    • Network field engineers may also perform maintenance and upgrades on existing networks

  • Answered by AI

Interview Preparation Tips

Interview preparation tips for other job seekers - I am good network telecom field engineer and commissioning engineer

Network Field Engineer Interview Questions asked at other Companies

Q1. What is modem .old company details Name etc
View answer (1)

Software Engineer2 Interview Questions & Answers

user image Peeyush Dangi

posted on 8 Nov 2024

Interview experience
4
Good
Difficulty level
-
Process Duration
-
Result
-
Round 1 - One-on-one 

(2 Questions)

  • Q1. What is es6 in javascript language
  • Ans. 

    ES6, also known as ECMAScript 2015, is the sixth major release of the JavaScript language that introduced new features and syntax improvements.

    • Introduced let and const for variable declarations

    • Added arrow functions for more concise syntax

    • Included classes for object-oriented programming

    • Introduced template literals for easier string interpolation

    • Added default parameters and rest parameters for functions

  • Answered by AI
  • Q2. What is hoisting
  • Ans. 

    Hoisting is a JavaScript mechanism where variable and function declarations are moved to the top of their containing scope during compilation.

    • Variable and function declarations are hoisted to the top of their scope.

    • Only declarations are hoisted, not initializations.

    • Function declarations take precedence over variable declarations.

  • Answered by AI

Skills evaluated in this interview

Software Engineer2 Interview Questions asked at other Companies

Q1. - Given a water -tight orientable 2-manifold, how to find if a point is inside or outside its volume? - Given a bunch of points with their coordinates, how to merge closeby points together? - How to determine if the normals of the two trian... read more
View answer (1)
Interview experience
4
Good
Difficulty level
Moderate
Process Duration
Less than 2 weeks
Result
Selected Selected

I applied via Naukri.com and was interviewed in May 2024. There were 3 interview rounds.

Round 1 - Technical 

(2 Questions)

  • Q1. About Role and Responsibilities
  • Q2. Knowledge test on Resume
Round 2 - Technical 

(2 Questions)

  • Q1. Day to Day activities in previous Organisation
  • Q2. Hypothical Questions
Round 3 - HR 

(2 Questions)

  • Q1. Current CTC and take home
  • Q2. Expected CTC and take home
  • Ans. 

    Expected CTC and take home should be based on industry standards and the candidate's experience and skills.

    • Expected CTC should be in line with industry standards for the position and the candidate's experience level.

    • Take home pay should be calculated after deductions like taxes and insurance.

    • Candidates can research average salaries for similar roles in the industry to get an idea of what to expect.

    • Negotiation is common...

  • Answered by AI

Interview Preparation Tips

Topics to prepare for Tejas Networks Senior Engineer interview:
  • Quality Tools and methodology
  • RCA
  • 7Qc
  • 8D
  • 4M

Senior Engineer Interview Questions asked at other Companies

Q1. what is the meaning of M in M20,M25,M30 grade of concrete?
View answer (57)
Interview experience
4
Good
Difficulty level
Easy
Process Duration
2-4 weeks
Result
Selected Selected

I applied via Walk-in and was interviewed in Jun 2024. There was 1 interview round.

Round 1 - Technical 

(4 Questions)

  • Q1. Smt Reel part number
  • Q2. AOI Falls call details.
  • Q3. Mininium 10 Fallscall approved
  • Q4.  Smt components 0603JR10K

Interview Preparation Tips

Interview preparation tips for other job seekers - Technical related knowledge important and work improvement ideas.

Technical Associate Interview Questions asked at other Companies

Q1. Doctor Ninja's House Problem Statement In a network of 'N' cities with 'M' paths connecting them, Doctor Ninja aims to purchase a house in a city 'X' such that it is possible to reach every other city from city 'X'. Your task is to determin... read more
View answer (1)

Tejas Networks Interview FAQs

How many rounds are there in Tejas Networks interview?
Tejas Networks interview process usually has 2-3 rounds. The most common rounds in the Tejas Networks interview process are Technical, HR and Resume Shortlist.
How to prepare for Tejas Networks interview?
Go through your CV in detail and study all the technologies mentioned in your CV. Prepare at least two technologies or languages in depth if you are appearing for a technical interview at Tejas Networks. The most common topics and skills that interviewers at Tejas Networks expect are Ethernet, PGDCA, Aisc, NBFC and Program Management.
What are the top questions asked in Tejas Networks interview?

Some of the top questions asked at the Tejas Networks interview -

  1. Consider we have large amount of physical memory.Do we still need virtual memor...read more
  2. Write the code for producer-consumer problem using mu...read more
  3. Write a program to find the duplicate in the array(only one duplicate is presen...read more
How long is the Tejas Networks interview process?

The duration of Tejas Networks interview process can vary, but typically it takes about less than 2 weeks to complete.

Tell us how to improve this page.

Tejas Networks Interview Process

based on 82 interviews

Interview experience

4
  
Good
View more
Join Tejas Networks Powering Next- Generation Network

Interview Questions from Similar Companies

HCLTech Interview Questions
3.5
 • 3.8k Interviews
Jio Interview Questions
3.9
 • 1.7k Interviews
Bharti Airtel Interview Questions
4.0
 • 843 Interviews
Vodafone Idea Interview Questions
4.1
 • 553 Interviews
HFCL Limited Interview Questions
4.0
 • 60 Interviews
ITI Interview Questions
3.7
 • 34 Interviews
View all

Tejas Networks Reviews and Ratings

based on 414 reviews

4.0/5

Rating in categories

3.8

Skill development

3.7

Work-life balance

3.6

Salary

4.0

Job security

3.6

Company culture

3.3

Promotions

3.7

Work satisfaction

Explore 414 Reviews and Ratings
R&D Engineer
268 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Network Engineer
161 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Senior Engineer
154 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Engineer
121 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Software Engineer
92 salaries
unlock blur

₹0 L/yr - ₹0 L/yr

Explore more salaries
Compare Tejas Networks with

Sterlite Technologies

3.8
Compare

HFCL Limited

4.0
Compare

Vihaan Networks

3.9
Compare

Bharti Airtel

4.0
Compare
Did you find this page helpful?
Yes No
write
Share an Interview