Network Interview Questions
- 1of 1 vote
Answerswindowing in tcp
- logan July 05, 2018 in United States| Report Duplicate | Flag | PURGE
Adobe Site Reliability Engineer Network - 1of 1 vote
Answersstateful and stateless firewall
- logan July 05, 2018 in United States| Report Duplicate | Flag | PURGE
Adobe Site Reliability Engineer Network - 1of 1 vote
AnswersWrite a Java program to get the count of ipv6 address present in the provided address range.
- sant November 16, 2016 in United States
Ex: if we provide ipv6 address range 2001:db8::/124 then the program should display the range contains 16 IP's.Starting from 2001:db8:: to 2001:db8:0000:0000:0000:0000:0000:000f.| Report Duplicate | Flag | PURGE
Goldman Sachs Applications Developer Network - 0of 0 votes
AnswersA file is given which consists of 3 columns : date, city and temperature. For ex:
- Priyanka December 01, 2015 in India
Date City Temperature
09-11-2015 Delhi 45
09-11-2015 Bangalore 24
09-11-2015 Ranchi 28
and it should support following type of queries:
1) What is the temperature of Bangalore on 9th November?
2) Give 5 hottest/coldest cities name on 9th November
You can preprocess the data and keep it in way that above query can be done in minimal time.
Which data structure will you use and how will you store the data?| Report Duplicate | Flag | PURGE
Snapdeal Senior Software Development Engineer Network - 1of 1 vote
Answersdesign question:
- sameer November 22, 2015 in India for azure
I will request you to first read only upto Solution-2 only and try to think about your solution and then read other lines. If we read whole post(without thinking about your solution) then your brain will get polluted with my idea and you may not be able to think naturally.
----------------------------------------------------------------------------
One machine daily taking backup of its datatstore on some server machine, MINIMIZE network data transferred.
Solution -1 : Compress storage and then send over network
Solution - 2 : Take diff and send only diff(and not whole data daily)
Interviewer asked for better ideas as above two are well known ideas but I was stuck.
---------------------------------------------------------------------------------
So he gave me hint(no 1) and depending upon hint I devise following solution
Solution - 3: Divide storage into sequence of 1K bits so total number of possible patters are 2^1000. Now Using hashTable just store existing 1000bits-length pattern and all their sequence numbers. And, then transfer this hashTable to server. So for example datastore consists of "file1, file2, file3=file1+file2" then we can reduce network data by 50%
So interviewer asked why 1000bits and why not 100bits or 10000bits. Also, as we increase length of bit-pattern, probability of getting duplicate patterns reduces and if we decrease length of pattern we may not be able to effectively reduce network data transferred
Solution-4: Don't divided storage bits into equal length pattern but in variable length pattern so client tells server "Pattern-X(bit string) of length L exists at offsets 5, 10003, 363738, 42311, 43433.
Interviewer said how can check for variable length patterns on client machine as this will be computaionally inefficient. I suggested Trie, Huffman coding, file-by-file comparison but he straightway discarded those ideas :)
He gave final important hint that
somehow client should give indication to server that next bytes are going to be like this without tranferring those bytes and
then server should tell client that "OK don't send next 1000bits as I already have them from previously send/stored data at different section(like different file) in storage"
and asked me how to do it and how will be the handshake/protocol between server-client
Since, throughout interview I was stuck to my hashTable solution and not able to think beyond hashTable, as per HR I got negative feedback in this interview :(
Overall interviewer was helping lot and was really helpful. He gave lot of hints and time(never said "Ok thats enough let us move on"...Finally I myself gave up :) )| Report Duplicate | Flag | PURGE
Microsoft Network - 0of 0 votes
Answersdifference between shared tree and source specific tree in multicast
- capricornkmu October 17, 2015 in United States for OpenStack| Report Duplicate | Flag | PURGE
Ebay Software Developer Network - 0of 0 votes
Answersdesign routing table using trie
- capricornkmu October 17, 2015 in United States for Networking| Report Duplicate | Flag | PURGE
Hewlett Packard Software Engineer / Developer Network - 0of 0 votes
Answerwhat are the advantages of IPV6 over IPV4 other than the scale advantage ?
- capricornkmu October 17, 2015 in United States for Networking| Report Duplicate | Flag | PURGE
Hewlett Packard Software Engineer / Developer Network - 0of 0 votes
Answersdefine how packet reaches from one host to another host. Eg. in topology "host1 - router A - router B - host2" what happens in different layers
- capricornkmu October 17, 2015 in United States for Networking| Report Duplicate | Flag | PURGE
Hewlett Packard Software Engineer / Developer Network - 0of 0 votes
Answershow traceroute works
- capricornkmu October 17, 2015 in United States for Networking| Report Duplicate | Flag | PURGE
Hewlett Packard Software Engineer / Developer Network - 0of 0 votes
Answershow would you calculate path mtu
- capricornkmu October 17, 2015 in United States for Networking| Report Duplicate | Flag | PURGE
Hewlett Packard Software Engineer / Developer Network - 0of 0 votes
AnswersSuppose you are in the middle of Africa, each machine is on an Edge network, and each packet between the machines costs $1.00. Write a solution that minimizes the cost.
- shing.zhao February 03, 2015 in United States| Report Duplicate | Flag | PURGE
Google Software Engineer Network - 0of 0 votes
AnswersOSI layers
- helphand2015 January 22, 2015 in India| Report Duplicate | Flag | PURGE
McAfee SDET Network - 0of 0 votes
AnswerDiff between tcp and udp
- helphand2015 January 22, 2015 in India| Report Duplicate | Flag | PURGE
McAfee SDET Network - 0of 0 votes
Answers-How to mitigate that your software is the real one and not the stolen one.
- Eng.joumana November 26, 2014 in United States| Report Duplicate | Flag | PURGE
Network - 0of 0 votes
AnswerHow to steal a password when i have both public key and know the algorithm?
- Eng.joumana November 26, 2014 in United States| Report Duplicate | Flag | PURGE
Network - 0of 0 votes
AnswersIf i record the traffic when i write the username and password and redirect my page?
- Eng.joumana November 26, 2014 in United States| Report Duplicate | Flag | PURGE
Network