i
BT E
Serv
Filter interviews by
I appeared for an interview before Jul 2024, where I was asked the following questions.
The OSI model is a conceptual framework used to understand network communication in seven layers.
Layer 1: Physical - Deals with the physical connection (e.g., cables, switches).
Layer 2: Data Link - Manages node-to-node data transfer (e.g., Ethernet).
Layer 3: Network - Handles routing of data (e.g., IP addresses).
Layer 4: Transport - Ensures complete data transfer (e.g., TCP, UDP).
Layer 5: Session - Manages sessions bet...
FTTP (Fiber to the Premises) delivers fiber optic connections to buildings, while FTTH (Fiber to the Home) specifically targets residential homes.
FTTP encompasses both residential and commercial connections.
FTTH is a subset of FTTP, focusing solely on residential homes.
Both technologies provide high-speed internet, but FTTH is more common in residential areas.
Example: FTTP can connect offices and schools, while FTTH co...
Lease lines are dedicated, private telecommunications circuits for data transmission between two locations.
Lease lines provide a constant, reliable connection, unlike traditional broadband.
They are often used by businesses for secure data transfer and internet access.
Examples include T1 and E1 lines, which offer different bandwidth options.
Lease lines can be symmetrical, providing equal upload and download speeds.
The 'bt' command is used in computing to manage Bluetooth devices and connections.
Used to scan for nearby Bluetooth devices.
Can connect or disconnect from Bluetooth devices.
Example: 'bt scan' to find devices, 'bt connect <device>' to connect.
Top trending discussions
I appeared for an interview in Aug 2024.
Concurrency is the ability of a system to run multiple tasks simultaneously. Performance of applications can be checked using profiling tools. Concurrency can be handled using synchronization techniques like mutexes and channels.
Concurrency allows multiple tasks to run concurrently, improving performance and responsiveness.
Performance of applications can be checked using profiling tools like Go's built-in 'pprof' packa...
To ensure no vulnerabilities, follow secure coding practices, conduct regular security audits, use encryption, and stay updated on security threats.
Follow secure coding practices such as input validation, output encoding, and parameterized queries.
Conduct regular security audits to identify and address vulnerabilities in the code.
Use encryption to protect sensitive data in transit and at rest.
Stay updated on security t...
I applied via Referral
posted on 4 Jul 2022
I applied via Company Website and was interviewed in Jun 2022. There were 2 interview rounds.
posted on 18 Apr 2024
Construction and relevant questions
posted on 31 Oct 2022
I appeared for an interview before Oct 2021.
I have 5 years of experience in project engineering in the construction industry.
Managed multiple construction projects simultaneously
Coordinated with architects, contractors, and suppliers
Created and maintained project schedules
Ensured compliance with safety regulations
Resolved project issues and conflicts
Completed projects within budget and on schedule
IPRAN solution stands for Internet Protocol Radio Access Network, which is a network architecture that combines IP/MPLS and mobile technologies.
IPRAN solution is used to provide high-speed internet access to mobile users.
It helps in optimizing network resources and improving network performance.
Examples of IPRAN solution providers include Cisco, Huawei, and Juniper Networks.
Different types of L2VPN include Ethernet VPN (EVPN), Virtual Private LAN Service (VPLS), and Layer 2 Tunneling Protocol (L2TP).
Ethernet VPN (EVPN) - Uses BGP as the control plane protocol for distributing MAC addresses across the network.
Virtual Private LAN Service (VPLS) - Extends a LAN over the network, allowing multiple sites to appear as if they are on the same LAN segment.
Layer 2 Tunneling Protocol (L2TP) - Creat...
posted on 21 Jun 2024
I applied via Referral and was interviewed before Jun 2023. There was 1 interview round.
VPN stands for Virtual Private Network. It allows users to securely access a private network over a public network.
VPN creates a secure and encrypted connection between the user's device and the private network
It masks the user's IP address and encrypts data to ensure privacy and security
Common types of VPN include SSL VPN, IPsec VPN, and PPTP VPN
VPN can be used to access company networks remotely, bypass geo-restricti...
BGP (Border Gateway Protocol) is an exterior gateway protocol used to route traffic between different autonomous systems. OSPF (Open Shortest Path First) is an interior gateway protocol used to route traffic within a single autonomous system.
BGP is used to connect different autonomous systems and make routing decisions based on network policies.
OSPF is used within a single autonomous system to determine the best path f...
posted on 3 Oct 2024
I applied via Job Portal and was interviewed in Sep 2024. There was 1 interview round.
The rating of llop refers to the Load Line Operating Power of a network device.
Rating of llop is a measure of the maximum power a network device can operate at.
It is important for ensuring the device does not exceed its power limits.
For example, a switch may have a rating of llop of 250W, meaning it can operate at a maximum power of 250 watts.
The maximum number of sectors that can run on a tower depends on various factors such as tower capacity, network traffic, and hardware specifications.
The maximum number of sectors that can run on a tower is typically determined by the tower's capacity and the network traffic it needs to handle.
Factors such as hardware specifications, signal strength, and interference can also impact the maximum number of sectors that c...
posted on 28 Jul 2025
I appeared for an interview in Jun 2025, where I was asked the following questions.
A network is a collection of interconnected devices that communicate and share resources.
Networks can be wired (e.g., Ethernet) or wireless (e.g., Wi-Fi).
They enable resource sharing, such as printers and files.
Common types include LAN (Local Area Network) and WAN (Wide Area Network).
Protocols like TCP/IP govern data transmission across networks.
Examples include home networks connecting computers and smartphones.
TCP is connection-oriented and reliable, while UDP is connectionless and faster but less reliable.
TCP establishes a connection before data transfer, ensuring reliability.
UDP sends data without establishing a connection, making it faster but less reliable.
TCP guarantees data delivery and order, while UDP does not guarantee delivery or order.
Examples: TCP is used for web browsing (HTTP), while UDP is used for video strea...
A VLAN (Virtual Local Area Network) segments a physical network into multiple logical networks for improved management and security.
Improves network performance by reducing broadcast domains.
Enhances security by isolating sensitive data traffic (e.g., finance department).
Facilitates easier network management and organization (e.g., grouping users by department).
Allows for better resource allocation and traffic prioriti...
Switch configuration involves setting up network switches for optimal performance and security using various methods.
Access the switch via console, SSH, or web interface.
Use command-line interface (CLI) commands to configure settings.
Set up VLANs to segment network traffic (e.g., 'vlan 10' for a specific VLAN).
Configure port settings, such as speed and duplex (e.g., 'interface gig0/1' followed by 'speed 1000').
Implemen...
based on 2 interview experiences
Difficulty level
Duration
based on 6 reviews
Rating in categories
Associate
72
salaries
| ₹1.8 L/yr - ₹4.6 L/yr |
Service Reliability Engineer
70
salaries
| ₹3.9 L/yr - ₹8.8 L/yr |
Design Engineer
56
salaries
| ₹14.4 L/yr - ₹25 L/yr |
Network Engineer
55
salaries
| ₹4 L/yr - ₹8.9 L/yr |
Project Coordinator
48
salaries
| ₹3.6 L/yr - ₹7.1 L/yr |
Reliance Communications
ZTE Corporation
Teleysia Networks
MobileComm Technologies India