i
Tejas Networks
Filter interviews by
Code for producer-consumer problem using mutex
Create a shared buffer between producer and consumer
Use mutex to lock the buffer while accessing it
Producer adds data to buffer and signals consumer
Consumer waits for signal and consumes data from buffer
Repeat until all data is produced and consumed
Mutex is used for mutual exclusion while Semaphore is used for signaling and synchronization.
Mutex is used to protect a shared resource from simultaneous access by multiple threads.
Semaphore is used to signal between threads or to limit the number of threads accessing a shared resource.
Mutex can only be locked and unlocked by the thread that locked it.
Semaphore can be signaled and waited on by different threads.
Mutex i...
Mutex and Semaphores serve different purposes in managing concurrent access to shared resources.
Mutex is used to provide exclusive access to a shared resource, while Semaphores can be used to control access to a shared resource by multiple threads.
Mutex is binary in nature, meaning it can only be in two states - locked or unlocked, while Semaphores can have multiple states.
Mutex is typically used for protecting critica...
Deadlock is a situation where two or more processes are unable to proceed because they are waiting for each other to release resources.
Occurs in multi-threaded or multi-process environments
Can lead to system freeze or crash
Prevention techniques include resource ordering and timeouts
Example: Process A holds resource X and waits for resource Y, while Process B holds resource Y and waits for resource X
Deadlock can be prevented by using techniques like resource allocation, avoidance, and detection.
Use a resource allocation algorithm to ensure resources are allocated in a safe manner.
Avoidance can be achieved by ensuring that resources are only requested when they are available.
Detection involves periodically checking for deadlock and taking action to resolve it if it is detected.
Implementing timeouts can also help pr...
Virtual addressing is a memory management technique that allows a program to use more memory than physically available.
Virtual addresses are mapped to physical addresses by the operating system.
Virtual addresses are allocated to a program during its execution.
Virtual addressing allows for efficient use of memory resources.
Virtual addressing enables the use of shared memory and memory protection.
Examples of virtual addr
Linker links object files and libraries to create an executable file. Loader loads the executable file into memory and executes it.
Linker resolves external references and generates an executable file
Loader loads the executable file into memory and performs relocation
Linker and loader are part of the toolchain used to build and run programs
Example: gcc uses linker and loader to compile and run C programs
Test_and_Set program is used to ensure mutual exclusion in concurrent systems.
Test_and_Set is a hardware instruction that sets a memory location to a value and returns its old value.
The program uses a loop to repeatedly execute the Test_and_Set instruction until it returns 0.
The program then enters the critical section and sets the memory location back to 0 when done.
Example code: while(Test_and_Set(&lock)); //critica
Program to merge two sorted linked lists in sorted order
Create a new linked list to store the merged result
Compare the first nodes of both lists and add the smaller one to the result list
Move the pointer of the list with the smaller node to the next node
Repeat until one of the lists is empty, then add the remaining nodes of the other list to the result
Return the merged list
Program to find the duplicate in an array using binary tree or hash table
Create a binary tree or hash table
Iterate through the array and insert each element into the tree or table
If an element already exists, it is a duplicate
Virtual memory is still necessary even with large physical memory. Paging helps manage memory usage.
Virtual memory allows for efficient use of physical memory by swapping data between RAM and storage devices.
Paging helps manage memory usage by dividing memory into smaller chunks called pages, which can be swapped in and out of physical memory as needed.
Even with large physical memory, virtual memory can still be useful...
Time complexity of building a heap using linked list and arrays
Building a heap using a linked list takes O(nlogn) time complexity
Building a heap using an array takes O(n) time complexity
Linked list implementation is slower than array implementation
Arrays are better for random access while linked lists are better for insertion and deletion
To find the middle of a linked list, use two pointers - one moving at twice the speed of the other.
Initialize two pointers - slow and fast
Move the slow pointer one step at a time and the fast pointer two steps at a time
When the fast pointer reaches the end of the list, the slow pointer will be at the middle
If the list has even number of nodes, there will be two middle nodes. In that case, return the second middle node
I was interviewed in Jan 2025.
The first round consisted of an aptitude and coding assessment. It included several aptitude questions and technical multiple-choice questions on networking. Additionally, there was one straightforward coding question that needed to be solved using Python.
Lists, sets, and tuples are data structures in Python used to store collections of items.
Lists are ordered, mutable, and allow duplicate elements. Example: [1, 2, 3]
Sets are unordered, mutable, and do not allow duplicate elements. Example: {1, 2, 3}
Tuples are ordered, immutable, and allow duplicate elements. Example: (1, 2, 3)
Multiprogramming involves running multiple programs on a single processor, while multitasking involves executing multiple tasks within a single program.
Multiprogramming allows multiple programs to be loaded into memory and executed concurrently.
Multitasking involves switching between different tasks within a single program, giving the illusion of parallel execution.
Examples of multiprogramming include time-sharing syst...
Threads in programming are independent paths of execution within a program.
Threads allow for concurrent execution of tasks within a program.
Threads share the same memory space, allowing for communication and data sharing between them.
Examples of using threads include multi-threaded web servers, parallel processing, and background tasks in applications.
Use two pointers to compare characters from start and end of the string.
Initialize two pointers, one at the start of the string and one at the end.
Compare characters at both pointers, move towards the center while checking for equality.
If all characters match, the string is a palindrome.
To rotate a 3x3 matrix 270 degrees anti-clockwise, transpose the matrix and then reverse the rows.
Transpose the matrix by swapping elements across the diagonal
Reverse the rows of the transposed matrix
Use a Set to remove duplicate elements from an array of strings.
Create a Set from the array to automatically remove duplicates
Convert the Set back to an array to get the unique elements
Example: const array = ['apple', 'banana', 'apple', 'orange']; const uniqueArray = [...new Set(array)];
Conventions like naming variables, using comments, and following indentation are typically followed when writing a program.
Use meaningful variable names to improve code readability
Include comments to explain complex sections of code
Follow consistent indentation for better code organization
A subnet mask is used to divide an IP address into network and host portions.
Defines the network portion of an IP address
Helps determine which part of the IP address is the network ID and which part is the host ID
Used in conjunction with IP addresses to route traffic within a network
Common subnet masks include 255.255.255.0 for a Class C network
The OSI model consists of seven layers that define the different functions of a network communication system.
Physical layer: Deals with physical connections and transmission of raw data.
Data link layer: Manages data transfer between devices on the same network.
Network layer: Handles routing and forwarding of data packets.
Transport layer: Ensures reliable data transfer between end systems.
Session layer: Manages communic...
NumPy is a library in Python used for numerical computing, providing support for large, multi-dimensional arrays and matrices.
NumPy stands for Numerical Python.
It is widely used for scientific computing and data analysis.
NumPy arrays are more efficient than Python lists for numerical operations.
Example: import numpy as np
Example: arr = np.array([1, 2, 3])
An IP address is a unique numerical label assigned to each device connected to a computer network.
IP address stands for Internet Protocol address.
It is used to identify and locate devices on a network.
There are 5 classes of IP addresses: A, B, C, D, and E.
Each class has a different range of possible addresses.
For example, Class A addresses range from 1.0.0.0 to 126.255.255.255.
VPNs are secure networks that allow users to access the internet privately and securely.
VPNs encrypt internet traffic to protect data from hackers and surveillance.
They can be used to access region-restricted websites or bypass censorship.
Common VPN protocols include OpenVPN, L2TP/IPsec, and IKEv2.
VPN services like NordVPN, ExpressVPN, and CyberGhost offer secure connections.
Businesses often use VPNs to allow remote em
A router gateway is a device that connects different networks and routes data between them.
Acts as an entry and exit point for data traffic between networks
Provides security by filtering incoming and outgoing traffic
Assigns IP addresses to devices on the network
Controls the flow of data packets between networks
I have worked on various projects including designing solar panel systems for residential and commercial buildings.
Designed and implemented solar panel systems for residential homes
Managed the installation of solar panels on commercial buildings
Optimized solar panel layouts for maximum energy efficiency
Collaborated with architects and engineers to integrate solar panels into building designs
My hobbies include hiking, reading, and playing the guitar.
Hiking: I enjoy exploring nature trails and challenging myself physically.
Reading: I love getting lost in a good book, especially fiction and mystery genres.
Playing the guitar: I find playing music to be a relaxing and creative outlet.
I currently reside in a cozy apartment in downtown Seattle.
Reside in downtown Seattle
Live in a cozy apartment
Current place of residence
I am interested in Tejas Networks due to their innovative technology and strong reputation in the industry.
Innovative technology: Tejas Networks is known for their cutting-edge solutions in the field of optical networking.
Strong reputation: Tejas Networks has a proven track record of delivering high-quality products and services to their customers.
Career growth opportunities: I believe that working at Tejas Networks wi...
Yes, I am open to any role that aligns with my skills and interests.
I am flexible and willing to learn new skills if needed
I am open to exploring different roles within the engineering field
I believe in taking on new challenges and opportunities
For example, I have experience in mechanical engineering but am open to roles in electrical engineering as well
I applied via Recruitment Consulltant and was interviewed in Dec 2024. There were 2 interview rounds.
STM-1 link refers to a Synchronous Transport Module level 1 link used in telecommunications for transmitting data.
STM-1 link operates at a data rate of 155.52 Mbps.
It is commonly used in SDH (Synchronous Digital Hierarchy) networks.
STM-1 link can carry multiple DS3 or E3 circuits.
It is equivalent to 63 E1 channels or 28 DS1 channels.
An IP address is a unique numerical label assigned to each device connected to a computer network, while a subnet mask is used to divide an IP network into subnetworks.
IP address identifies a device on a network, like 192.168.1.1
Subnet mask determines the network portion of an IP address, like 255.255.255.0
Subnet mask is used to separate the network and host portions of an IP address
OSI and TCP/IP models are networking models that define how data is transmitted over a network.
OSI model has 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, Application.
TCP/IP model has 4 layers: Network Interface, Internet, Transport, Application.
OSI model is theoretical while TCP/IP model is practical and widely used.
OSI model is a reference model while TCP/IP model is a protocol stack.
Examp...
Requirements and capacity of stm-1 link implementation
Requirements include fiber optic cables, SDH equipment, and proper configuration
Capacity of stm-1 link is 155.52 Mbps
STM-1 link is commonly used in telecommunications for high-speed data transmission
An IP address is a unique numerical label assigned to each device connected to a computer network. IPv4 uses 32-bit addresses, while IPv6 uses 128-bit addresses.
IP address is a unique identifier for devices on a network.
IPv4 uses 32-bit addresses, represented in decimal format (e.g. 192.168.1.1).
IPv6 uses 128-bit addresses, represented in hexadecimal format (e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334).
VLAN stands for Virtual Local Area Network. VLAN ID is a unique identifier assigned to a VLAN.
VLAN is a logical grouping of devices on the same network segment.
VLANs help in segmenting network traffic for security and performance reasons.
VLAN ID is a number assigned to each VLAN to differentiate it from others.
For example, VLAN 10 might be used for finance department while VLAN 20 for marketing.
Layer-2 and layer-3 services refer to different levels of network services in the OSI model.
Layer-2 services operate at the data link layer and include functions like MAC address assignment and Ethernet switching.
Layer-3 services operate at the network layer and include functions like IP address assignment and routing.
The main difference between layer-2 and layer-3 services is the level at which they operate in the OSI...
SDH structure refers to the hierarchy of synchronous digital signals, while SDH frame is the basic unit of data transmission in SDH networks.
SDH structure includes various levels such as STM-1, STM-4, STM-16, etc.
SDH frame consists of a fixed number of bytes, with overhead for management and error correction.
SDH frame structure includes sections, lines, and paths for data transmission.
Example: STM-1 is a common level i...
DCCR stands for Data Center Control Room and DCCM stands for Data Center Construction Manager.
DCCR is a centralized location within a data center where operators monitor the performance of servers, networks, and other equipment.
DCCM is responsible for overseeing the construction and maintenance of data center facilities.
Examples: DCCR helps in ensuring smooth operations of data centers by monitoring and managing resour...
IPv4 address of Google DNS server is 8.8.8.8 and IPv6 address is 2001:4860:4860::8888.
IPv4 address: 8.8.8.8
IPv6 address: 2001:4860:4860::8888
Subnet mask is used to divide an IP network into subnetworks, determining the network and host portions of an IP address.
Subnet mask is a 32-bit number that separates the network and host portions of an IP address.
To calculate the number of usable IPs in a subnet, subtract 2 from the total number of IPs in the subnet.
Network host IP is the first IP address in a subnet, while broadcast IP is the last IP address in a sub...
Different kinds of cards used in Tejas 1400 and 1600 mux include line cards, switch cards, and power cards.
Line cards: used for connecting the mux to external devices
Switch cards: used for routing data within the mux
Power cards: used for providing power to the mux
Examples: STM-1 line card, STM-4 switch card, power supply card
The main difference between xa60g and xa20g cards is the processing power and memory capacity.
xa60g card has higher processing power and memory capacity compared to xa20g card
xa60g card is more suitable for high-performance computing tasks
xa20g card may be more cost-effective for less demanding applications
GPON technology is a type of passive optical network that uses fiber-optic cables to deliver high-speed internet, TV, and phone services.
GPON stands for Gigabit Passive Optical Network
It uses a point-to-multipoint architecture, where a single optical fiber serves multiple users
GPON architecture includes an Optical Line Terminal (OLT) at the service provider's central office and Optical Network Terminals (ONTs) at the c...
Nodes can be added and deleted in NMS by using the management interface or command line interface.
Nodes can be added through the management interface by selecting the 'Add Node' option and providing the necessary information such as IP address, hostname, and SNMP credentials.
Nodes can also be added through the command line interface by using specific commands to add a new node to the network management system.
To delete...
To upgrade software in OLT, ONT, and Tejas 1400 locally and from NMS, follow these steps.
Locally: Use a USB drive to transfer the software update file to the device. Access the device's management interface and initiate the upgrade process.
From NMS: Use the Network Management System (NMS) to remotely push the software update to the devices. Schedule the upgrade during off-peak hours to minimize disruption.
Ensure compat...
Different types of alarms in Tejas equipments include power alarms, temperature alarms, and communication alarms.
Power alarms: indicate issues with power supply or voltage levels
Temperature alarms: alert when equipment temperature exceeds safe limits
Communication alarms: signal problems with data transmission or network connectivity
VCG stands for Voltage Controlled Gain and VCAT stands for Voltage Controlled Attenuator.
VCG is a circuit that adjusts the gain of an amplifier based on a control voltage.
VCAT is a circuit that adjusts the attenuation of a signal based on a control voltage.
Both VCG and VCAT are commonly used in electronic devices to control signal levels.
Example: VCG can be used in audio amplifiers to adjust the volume based on user in...
MPLS stands for Multiprotocol Label Switching. It is a protocol used in high-performance telecommunications networks.
Advantages of MPLS include improved performance, scalability, quality of service, and traffic engineering capabilities
MPLS allows for efficient packet forwarding based on labels instead of IP addresses
MPLS can support different types of traffic, such as voice, video, and data, with different service leve...
Easy like time speed distance ,time and work
Above average like dynamic progrmming and arrays
Tejas Networks interview questions for popular designations
Very good but easy
easy question long question
Get interview-ready with Top Tejas Networks Interview Questions
There were 3 sections. 1st was aptitute 10 questions and 2nd section was technical 10 questions then 3rd section had 3 coding questions which were of easy level.
LTE stands for Long-Term Evolution and is a standard for wireless broadband communication.
LTE is a 4G wireless communication standard used for high-speed data transmission.
It provides faster data speeds and lower latency compared to previous generations like 3G.
LTE is commonly used for mobile internet access, video streaming, and VoIP services.
Examples of LTE networks include Verizon, AT&T, and T-Mobile in the United S
5G in telecom refers to the fifth generation of wireless technology, promising faster speeds, lower latency, and increased capacity for mobile networks.
5G is the next generation of mobile network technology after 4G LTE.
It promises faster download and upload speeds, lower latency, and increased capacity for more connected devices.
5G uses higher frequency bands to achieve these improvements, but with shorter range compa...
I applied via Company Website and was interviewed in Jul 2024. There was 1 interview round.
Salary is the payment or compensation an employee receives from an employer in exchange for work performed.
Salary is typically paid on a regular basis, such as monthly or bi-weekly.
It can be a fixed amount or vary based on factors like performance or seniority.
Salaries can include additional benefits such as health insurance, retirement contributions, and bonuses.
A Network Field Engineer is responsible for designing, implementing, and maintaining communication networks for organizations.
Designing and implementing network solutions
Troubleshooting network issues
Configuring network devices
Collaborating with other IT professionals
Providing technical support to end users
Job back and if field refers to the tasks and responsibilities of a network field engineer.
Job back involves troubleshooting network issues in the field
Field work includes installing and configuring network equipment
Network field engineers may also perform maintenance and upgrades on existing networks
ES6, also known as ECMAScript 2015, is the sixth major release of the JavaScript language that introduced new features and syntax improvements.
Introduced let and const for variable declarations
Added arrow functions for more concise syntax
Included classes for object-oriented programming
Introduced template literals for easier string interpolation
Added default parameters and rest parameters for functions
Hoisting is a JavaScript mechanism where variable and function declarations are moved to the top of their containing scope during compilation.
Variable and function declarations are hoisted to the top of their scope.
Only declarations are hoisted, not initializations.
Function declarations take precedence over variable declarations.
I applied via Naukri.com and was interviewed in May 2024. There were 3 interview rounds.
Expected CTC and take home should be based on industry standards and the candidate's experience and skills.
Expected CTC should be in line with industry standards for the position and the candidate's experience level.
Take home pay should be calculated after deductions like taxes and insurance.
Candidates can research average salaries for similar roles in the industry to get an idea of what to expect.
Negotiation is common...
I applied via Walk-in and was interviewed in Jun 2024. There was 1 interview round.
Top trending discussions
Some of the top questions asked at the Tejas Networks interview -
The duration of Tejas Networks interview process can vary, but typically it takes about less than 2 weeks to complete.
based on 82 interviews
Interview experience
based on 414 reviews
Rating in categories
7-15 Yrs
Not Disclosed
15-20 Yrs
Not Disclosed
R&D Engineer
268
salaries
| ₹0 L/yr - ₹0 L/yr |
Network Engineer
161
salaries
| ₹0 L/yr - ₹0 L/yr |
Senior Engineer
154
salaries
| ₹0 L/yr - ₹0 L/yr |
Engineer
121
salaries
| ₹0 L/yr - ₹0 L/yr |
Software Engineer
92
salaries
| ₹0 L/yr - ₹0 L/yr |
Sterlite Technologies
HFCL Limited
Vihaan Networks
Bharti Airtel