Filter interviews by
BGP protocol is used for routing between autonomous systems.
BGP is used to exchange routing information between different autonomous systems (AS).
It is a path vector protocol that selects the best path based on policies and attributes.
BGP is used by Internet Service Providers (ISPs) to connect their AS to the Internet.
It provides scalability and redundancy in large networks.
BGP can be used for traffic engineering and l...
I applied via Recruitment Consulltant and was interviewed in Mar 2024. There was 1 interview round.
SD-WAN architecture is a software-defined approach to managing wide area networks.
SD-WAN uses software to control the connectivity, management, and services between data centers and remote branches.
It allows for centralized control and automation of network traffic.
SD-WAN can prioritize critical applications and optimize bandwidth usage.
Examples of SD-WAN vendors include Cisco, VMware, and Silver Peak.
STP selection process determines the root bridge and designated ports in a network.
STP selection process starts by electing a root bridge based on the lowest bridge ID.
Each switch then determines the best path to the root bridge.
Designated ports are selected on each segment based on the lowest path cost to the root bridge.
Non-designated ports are put in blocking state to prevent loops in the network.
OSPF LSA types include Router LSA, Network LSA, Summary LSA, and ASBR Summary LSA, each serving different purposes in OSPF routing.
Router LSA: Describes the router's directly connected links.
Network LSA: Represents multi-access networks and lists all routers connected to the network.
Summary LSA: Summarizes routes from one area to another.
ASBR Summary LSA: Summarizes external routes injected into OSPF by an ASBR.
LSA typ...
BGP states refer to the different stages a BGP session goes through during establishment and maintenance.
Idle state: Initial state when BGP process starts
Connect state: Attempting to establish a TCP connection
OpenSent state: Sending an OPEN message to peer
OpenConfirm state: Waiting for an OPEN message from peer
Established state: BGP peers are fully synchronized and exchanging routing information
I applied via Naukri.com and was interviewed in May 2024. There was 1 interview round.
VRF stands for Virtual Routing and Forwarding. It is a technology that allows multiple instances of a routing table to coexist within the same router.
VRF enables multiple virtual routers to exist within a single physical router
Each VRF instance maintains its own routing table and forwarding information
VRF is commonly used in MPLS networks to segregate customer traffic
VRF provides network segmentation and isolation for
HSRP stands for Hot Standby Router Protocol, a Cisco proprietary redundancy protocol used to provide high availability for network services.
HSRP is used to provide redundancy for routers in a network by allowing multiple routers to work together in a group.
One router is elected as the active router, handling traffic for the virtual IP address, while the other routers in the group act as standby routers.
If the active ro...
I applied via Referral and was interviewed in Sep 2023. There was 1 interview round.
BGP is used in Banking customer for secure and reliable communication between branches and data centers.
BGP provides secure and reliable communication between branches and data centers in a banking network.
It allows for efficient routing of traffic and automatic failover in case of network issues.
BGP helps in maintaining high availability and ensuring data confidentiality in banking operations.
Yes, multiple BGP can be configured on the same router for redundancy and load balancing.
Multiple BGP instances can be configured on the same router to handle different peers or address families.
Each BGP instance will have its own configuration and routing table.
This setup can provide redundancy and load balancing for network traffic.
For example, one BGP instance can be used for IPv4 routing while another is used for I
MPLS links are required in Banking customer for secure and reliable communication.
MPLS provides secure and reliable communication for sensitive banking data
Helps in prioritizing traffic for critical banking applications
Ensures low latency and high performance for real-time transactions
Supports seamless connectivity between multiple bank branches and data centers
ARP generates and sends packets to map IP addresses to MAC addresses in a network.
ARP request is broadcasted to all devices on the network
The device with the matching IP address responds with its MAC address
ARP table is updated with the IP-MAC mapping
ARP packets have source and destination MAC addresses, IP addresses, and ARP operation code
CSMA/CD stands for Carrier Sense Multiple Access with Collision Detection. It is a network protocol used in Ethernet networks to avoid data collisions.
CSMA/CD is used in Ethernet networks to regulate access to the network medium.
Before sending data, a device using CSMA/CD listens to the network to check if it is busy.
If the network is clear, the device sends the data. If a collision is detected, the device stops transm...
I applied via Company Website and was interviewed in Jun 2023. There were 7 interview rounds.
Coding is a most important in computer
Aptitude test online mode for the mcq
Group discussion in a company details for tha gd
Assignment test for tha mcq test online
I applied via Naukri.com and was interviewed in Nov 2023. There were 2 interview rounds.
Assessment test ,gd etc
I applied via Referral and was interviewed in Aug 2022. There were 2 interview rounds.
BGP routing tables store information about routes to different networks and the best path to reach them.
BGP uses a path-vector routing protocol to determine the best path for a packet to reach its destination.
BGP routing tables contain information about the network prefixes, the next hop to reach them, and the path attributes that determine the best path.
BGP routers exchange routing information with their neighbors to ...
NAT is a technique used to map private IP addresses to public IP addresses. Port numbers are used to identify specific applications.
NAT stands for Network Address Translation
It is used to allow devices with private IP addresses to access the internet using a public IP address
Port numbers are used to identify specific applications or services
Common port numbers include 80 for HTTP, 443 for HTTPS, and 22 for SSH
Default single port range when neither port range in source NAT pools nor default port range are configured.
When neither port range in source NAT pools nor default port range are configured, the default single port range is 1024 through 63,487.
This range is used for outbound traffic initiated by the device.
It is important to configure the port range to avoid conflicts with other devices on the network.
For example, if m...
MSS in TCP refers to the maximum segment size, which is the largest amount of data that can be sent in a single TCP segment.
MSS is negotiated during the TCP three-way handshake
It is determined by the maximum transmission unit (MTU) of the network
MSS can be adjusted by the sender or receiver using TCP options
A smaller MSS can help prevent fragmentation and improve network performance
Packet drops can be caused by various factors. Troubleshooting involves identifying the root cause and implementing a solution.
Check for network congestion or bandwidth limitations
Verify if the packet is being dropped at the source or destination
Inspect network devices for errors or misconfigurations
Use packet capture tools to analyze the traffic
Consider implementing Quality of Service (QoS) policies
Update firmware or
To check port and duplex setting, MSS and MTU, and link utilization in network engineering.
Use command 'show interface' to check port and duplex setting.
Use command 'ping -f -l
Use command 'netstat -s' to check MSS.
Use command 'show interface' or 'show interfaces utilization' to check link utilization.
I applied via Approached by Company and was interviewed in Apr 2022. There were 4 interview rounds.
The interview was very good as they asked me my experiences(good & bad) from the day I am professional. How to handle the situations when a senior person makes a mistake. What are the ways of learning that you prefer.
I have worked with a variety of tools as a Network Engineer.
Cisco Packet Tracer
Wireshark
SolarWinds Network Performance Monitor
Nmap
GNS3
Ping
Traceroute
I have worked on a variety of technologies as a Network Engineer.
Cisco networking equipment
Routing and switching protocols (e.g. OSPF, BGP)
Firewalls and security appliances (e.g. Cisco ASA, Palo Alto)
Network monitoring and management tools (e.g. SolarWinds, Wireshark)
Virtualization technologies (e.g. VMware, Hyper-V)
Load balancers (e.g. F5, Citrix NetScaler)
Wireless networking (e.g. Cisco Meraki, Aruba)
Network troubles
based on 1 review
Rating in categories
Network Engineer
8
salaries
| ₹2.5 L/yr - ₹3.7 L/yr |
Desktop Support Engineer
4
salaries
| ₹2.2 L/yr - ₹3.5 L/yr |
Network Security Engineer
4
salaries
| ₹4 L/yr - ₹6.8 L/yr |
Desktop Technical Support Engineer
4
salaries
| ₹3 L/yr - ₹3 L/yr |
Senior Business Development Manager
3
salaries
| ₹23.3 L/yr - ₹31.5 L/yr |
Hexagonal Technologies
Octagon Enterprises
Trapper Technology
TCS