Sunteți pe pagina 1din 2

B.R.

SUMANTH

Email:sumanthcs80@gmail.com
Mobile: 91-7204998991
______________________________________________________________________________
CAREER OBJECTIVE
Looking forward to a challenging and competitive work atmosphere leading to a professional
experience with a dynamic and progressive organization where my skills, talents and abilities
will be utilized to the fullest for mutual benefit.
PROFESSIONAL SKILLS

Installing, configuration & maintenance of Microsoft products.


Desktop Support up to Client Level including Hardware, Software and Networking
issues.
Installation and configuration of modem and setting up Internet connections.
SMTP virtual servers Experienced in Windows 7 troubleshooting
Solving the problem of software, operating system, using Net meeting and Remote.
Strong skills in Server Hardware troubleshooting.
Knowledge in Ghosting and Data Recovery.
Working knowledge on switches, routers or Wireless - WAP, 802.11 a/b/g/n. Linksys,
AirNet, D link, belkin, and access point would be preferred.

EDUCATIONAL QUALIFICATION:

MTech (CSE) from Madanapalli insistitute of technology and science, Madanapalli in the
year 2012-2015, affiliated to JNTUA.

B.Tech (CSE) from Sri Sai institute of technology and science, Rayachoty in the year of
2008-2012, affiliated to JNTUA.

Intermediate from srinivasa Junior College, Rayachoty in the year of 2006-2008.

SSC from Raju high school, Rayachoty in the year of 2006-2008.

CORE COMPETENCES

Operating system
Servers

: WINDOWS 7&8,UBUNTU
:
Windows 2008&2012 Server.

TRAININGS COMPLETED
UNIX, MCSE -2012 Server, SQL.

PROJECT :
TITLE: MANAGEMENT OF SECUR IDS FOR MOBILE AD-HOC NETWORK
Description:
The Mobile ad-hoc network does not have any fixed infrastructure so they rely on their neighbors to relay
message. The mobile nodes can move around the network in free manner. Unlike wired networks, there is no fixed
and dedicated link available between the nodes. So any node can access any link between any nodes. This nature of
open medium of MANET they attracts malicious users. IDS techniques are used to detect malicious nodes. Here
they propose new Intrusion detection method called EAACK .EAACK handles three weakness of watch dog they
are:1) Receiver collision, 2) Limited transmission power, 3) False misbehavior. EAACK demonstrate higher
malicious- behavior detection rates in certain circumstances while does not greatly affect the network
performances .In proposed EAACK scheme they implemented both DSA and RSA.

PERSONAL DETAILS:
Name

B.R.Sumanth

Nationality

Indian

Language Known

English, Hindi, & Telugu

Current location

Bangalore.

Preferred location

Bangalore.

DECLARATION:
I do hereby declare that all statements made in this application are true, complete and
correct to the best of my knowledge.

Place: Bangalore
Date:

(B.R.SUMANTH)