SlideShare a Scribd company logo
1 of 4
9.5 years of experience in Telecom, Networking, Optical Networks and Data Centre Software Development and
Maintenance
Professional Experience
Prateek
PROFESSIONAL SUMMARY
 Software Development experience in Optial networking, Server
Loadbalancer , L2~L7 server Healthchecks, L2~L7 Protocol Stack
Development.
 Customer support experience in CGN (Carrier Grade NAT), Server
Loadbalancer and GEPON.
 Good exposer in Design, Development and Testing phase of SDLC.
 Development experience in Agile software development process.
. Responsibilities:
 Senior Technical Lead in NEC to provide technical assistance to team.
 Individual Contributor to develop L2~L7 protocols.
 Exposer in Designing, Development, Unit testing, System Testing and
System Integration.
 Experience in SRS, SA, HLD, LLD, UT Plan, TOI etc. docs preparation and
review.
Software Environment:
 Language : C, C++
 Operating System : Linux, Unix, Windows
 Protocols : EAP, EAPOL, DPoE, IEEE802.1xAuthentication, VLAN,RIP,
MPLS, ARP, RARP, TCP, UDP, IPV4, IPV6, ICMP, ICMP6, NAT44,
NAPT44, NAT64, NAT444, Destination NAT, Source Dynamic NAT,
Deterministic NAT, PBA, DS-Lite, TACACS, SSH, RSA, HTTP, Radius,
DNS
 Concepts : UNIX internals, Operating System, Networking Concepts,
IPC, Multi Threading, Socket Programming, L2 Forwarding, L3
Forwarding, Router, Switch, Load Balancer, Optical PON Concepts,
Algorithms, Data Structure
 Traffic Generator : Ixia, Ixload, Ixexploror, Spirent,Schrenick
 Development Tools : Cscope, Astah, Enterprise Architect, Beyond
Compare, Source Insight, PC Lint, Coverity, Kloc Works, Code
Analyzer, Putty, GCC, GDB, Gcovx, Ut Master, Cpp Unit, NMT,
VMT, Varvel, CLOC
 CM Tools : SVN, Clear Case, Visual Source Safe
 Scripting Language : Shell
Prateek
+91-9654872451
Prateekm0711@gmail.com
EDUCATION
Bachelor of Engineering
(Computer Science) (Hons.)
Rajasthan University: 2006
(Aggregate 74%)
Senior Secondary Education
Rajasthan Board: 2001(80%)
Secondary Examination
Rajasthan Board : 1999(83%)
EXPERIENCE SUMMARY
NEC Technology, Noida Period: April 2015 To Till Date Designation: Senior Technical Lead
Brocode Communication,
Bangalore
Period: Feb 2013 To April 2015 Designation: Software Engineer 3
Juniper Networks, Bangalore Period: Aug 2010 To Feb 2013 Designation : Software Engineer2
Huawei Technology,
Bangalore
Period: Oct 2006 To Aug 2010 Designation : Software Engineer
Projects: NEC Technology, Noida
Project I
Name : 10-GEPON HSAN
Description : HSAN (High Speed Access Network) is a device at ISP network which connects to user network
via optical fiber and connects internet via Ethernet.In HSAN, I am leading Security FB Team.
Security FB includes ONU Authentication, DPoE Authentication and Encryption modules. I was
involved in designing, coding, UT, ST and SIT phases for Security FB. It Uses Arad and Poineer
chips to perform security functionalities.
Protocols: EAP, EAPOL, EPON OAMs, VLAN, Qos, DPoE
Projects: Brocade Communication, Bangalore
Project I
Name : Server Healthcheck
Description : Server healthchceks are used to have a context of availability of servers and services on it.
It include L2, L3 and L4~L7 healthchecks. For healthcheck, Serveriron ADXsends periodic
probs to real servers and based on server response updates context of available running service
on real server. SLB traffic would make use of these information and forward traffic accordingly.
Protocols: HTTP, DNS, LDAP, RADIUS, TCP, UDP
Project II
Name : Source NAT Enhancement
Description : While sending slb traffic source nat can be applied. We Increased support of SNAT to
256 Ips and also enhanced source port range to per IP. Super source nat concept is also
introduced. With this enhancement available source port range could be assigned to per
real server port.
Protocols: Source NAT
Projects: Juniper Networks, Bangalore
Project I
Name : Deterministic NAT
Description : Each subscriber could expect to have access to thousands of TCP/UDP ports at any
given time. Thus, as an alternative to logging each connection, CGNs could
deterministically map customer private addresses on the inside of the CGN to public
addresses on the outside of the CGN. This algorithm will allow an operator to identify a
subscriber internal IP address when provided the public side IP and port number
without having to examine the CGN translation logs. This prevents an operator from
having to transport and store massive amounts of session data from the CGN and then
process it to identify a subscriber.We implemented this technique to get rid of logging
details.
Protocols: Deterministic NAT
Project II
Name : DS-Lite
Description : DS-Lite(Dual Stack Lite) is a IPV4 depletion technique. It enables both continued
support for IPv4 services and incentives for the deployment of IPv6. Dual-Stack Lite
enables a broadband service provider to share IPv4 addresses among customers by
combining two technologies IP in IP (IPv4-in-IPv6) and NAT.
Protocols: IPv4 in IPv6 Tunneling
Project III
Name : EIM, EIF & APP
Description : EIM(End point independent mappings)When an internal endpoint opens an outgoing
session through a NAT, NAT assigns the session an external IP address and port
number.NAT maintains this mapping till mapping time out.So for any subsequent
connections from the same subscriber would be using same external IP and Port.
EIF(End point independent filtering): This is the feature which enables external public
host can communicate to internal host.EIF uses EIM mappings for NAT translation.
APP (Address Pooling paired):With this feature we maintains internal to external ip
mappings in NAT box till mappings timeout.So same user will always get same public
ip for each connection.
Protocols: NAT Flavors, TCP, UDP
Project IV
Name : PBA (Port Block Allocation)
Description : ISP currently tracks their subscribers using IP address (RADIUS or DHCP log). If they
use CGN, IP address will be shared by multiple subscribers. This will require them to
track IP address and port .NAT ports gets used and reused at a very high rate and if we
want to track users using log, there will be too many log messages to archive and
correlate to identify a subscriber. So in PBA, Ports will be allocated in blocks. Logs
messages would be generate only for allocating or deleting the port block in place of
generating logs for each port allocation.
Protocols: NAPT, TCP, UDP
Project V
Name : NAT64
Description : NAT64 is a mechanism using which IPv6-only hosts can talk to IPv4-only hosts. This
will help in IPv4 to IPv6 transition. Internet Service Provider can use IPv6 hosts and
give IPv6 addresses to its customers. NAT is also applied along with address
translation.
Protocols: NAT64
Projects: Huawei Technology, Bangalore
Project I
Name : HwTACACS
Description : TACACS+ (Terminal Access Controller Access-Control System Plus) is a protocol
which provides access control for routers, network access servers and other networked
computing devices via one or more centralized servers. TACACS+ provides separate
authentication, authorization and accounting services.Tacacs Provides encryption
mechanism for secure transmission.
Authentication refers to whether the user is authenticated, typically by providing
evidence such as a password and Digital signature.
The Authorization refers to whether a particular user is authorized to perform a given
activity, typically logging on to an application or service.
Accounting refers to the tracking of the consumption of network resources by users.
Protocols: TACACS+
Project II
Name : SSH
Description : SSH (Secure Shell) Protocol provides secure network services over an insecure
network. SSH is designed as a replacement for Telnet and other insecure remote shells.
The encryption used by SSH provides confidentiality and integrity of data. SSH
provides secure connection by server authentication, compression and client
authentication. SSH provides secure tunnel for various user connections.
SSH server and SSH client are developed as per RFC standards.
Protocols: SSH1.x, SSH2.0
Project III
Name : RSA
Description : RSA (Rivest, Shamir and Adleman) is an algorithm for cryptography. It is the first
algorithm known to be suitable for signing as well as encryption. RSA is widely used in
electronic commerce protocols and is believed to be secure given sufficiently long keys.
RSA is developed as a library. RSA is created as container which generates and stores all
the keys.
Protocols: RSA Algorithm
Technical
 Certified from IISC, Bangalore in “Unix Internals”.
 Topped ‘C++ Certification’ from Huawei Technology R&D center, India, Bangalore.
 Participation in “On the spot software programming” in ‘C’.
 Certified from Swati InfoTech, Jaipur in “Linux Networking”.
 HSAN Project onsite Support at Tokyo, Japan.
PERSONAL PROFILE
Date of Birth : 7th November 1983
Sex : Male
Marital Status : Married
Nationality : Indian
Language Known : English, Hindi
Passport : Yes
(Prateek Mathur)

More Related Content

What's hot

Vineyard Networks Product Overview
Vineyard Networks Product OverviewVineyard Networks Product Overview
Vineyard Networks Product Overviewlaurenjthomson
 
Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014Đồng Quốc Vương
 
An analysis of the skype peer to-peer
An analysis of the skype peer to-peerAn analysis of the skype peer to-peer
An analysis of the skype peer to-peerxiaoran815
 
An experimental study of the skype peer to-peer vo ip system
An experimental study of the skype peer to-peer vo ip systemAn experimental study of the skype peer to-peer vo ip system
An experimental study of the skype peer to-peer vo ip systemxiaoran815
 
Content aware p2 p video streaming with lowlatency
Content aware p2 p video streaming with lowlatencyContent aware p2 p video streaming with lowlatency
Content aware p2 p video streaming with lowlatencyxiaoran815
 
Data Networking Concepts
Data Networking ConceptsData Networking Concepts
Data Networking ConceptsPeter R. Egli
 
Sharing and Controlling the IoT
Sharing and Controlling the IoTSharing and Controlling the IoT
Sharing and Controlling the IoTAPNIC
 
Report on TCP vulnerabilities
Report on TCP vulnerabilitiesReport on TCP vulnerabilities
Report on TCP vulnerabilitiesPrakhar Bansal
 
Cisco discovery d homesb module 10 final exam - v.4 in english.
Cisco discovery   d homesb module 10 final exam - v.4 in english.Cisco discovery   d homesb module 10 final exam - v.4 in english.
Cisco discovery d homesb module 10 final exam - v.4 in english.igede tirtanata
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocolSaranyaK68
 
Sagar_Ware_Resume
Sagar_Ware_ResumeSagar_Ware_Resume
Sagar_Ware_ResumeSagar Ware
 
Investigation of dhcp packets using wireshark
Investigation of dhcp packets using wiresharkInvestigation of dhcp packets using wireshark
Investigation of dhcp packets using wiresharkjpratt59
 
6293213 sip-presentation
6293213 sip-presentation6293213 sip-presentation
6293213 sip-presentationJoe Trial
 

What's hot (20)

Vineyard Networks Product Overview
Vineyard Networks Product OverviewVineyard Networks Product Overview
Vineyard Networks Product Overview
 
Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014
 
VPN Theory
VPN TheoryVPN Theory
VPN Theory
 
An analysis of the skype peer to-peer
An analysis of the skype peer to-peerAn analysis of the skype peer to-peer
An analysis of the skype peer to-peer
 
An experimental study of the skype peer to-peer vo ip system
An experimental study of the skype peer to-peer vo ip systemAn experimental study of the skype peer to-peer vo ip system
An experimental study of the skype peer to-peer vo ip system
 
Content aware p2 p video streaming with lowlatency
Content aware p2 p video streaming with lowlatencyContent aware p2 p video streaming with lowlatency
Content aware p2 p video streaming with lowlatency
 
Data Networking Concepts
Data Networking ConceptsData Networking Concepts
Data Networking Concepts
 
Sharing and Controlling the IoT
Sharing and Controlling the IoTSharing and Controlling the IoT
Sharing and Controlling the IoT
 
TCP Vulnerabilities
TCP VulnerabilitiesTCP Vulnerabilities
TCP Vulnerabilities
 
Kalyani_Resume_latest
Kalyani_Resume_latestKalyani_Resume_latest
Kalyani_Resume_latest
 
Report on TCP vulnerabilities
Report on TCP vulnerabilitiesReport on TCP vulnerabilities
Report on TCP vulnerabilities
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
Ice
IceIce
Ice
 
Chapter#12
Chapter#12Chapter#12
Chapter#12
 
Cisco discovery d homesb module 10 final exam - v.4 in english.
Cisco discovery   d homesb module 10 final exam - v.4 in english.Cisco discovery   d homesb module 10 final exam - v.4 in english.
Cisco discovery d homesb module 10 final exam - v.4 in english.
 
Mobile internet protocol
Mobile internet protocolMobile internet protocol
Mobile internet protocol
 
Sagar_Ware_Resume
Sagar_Ware_ResumeSagar_Ware_Resume
Sagar_Ware_Resume
 
Investigation of dhcp packets using wireshark
Investigation of dhcp packets using wiresharkInvestigation of dhcp packets using wireshark
Investigation of dhcp packets using wireshark
 
Types of VPN
Types of VPNTypes of VPN
Types of VPN
 
6293213 sip-presentation
6293213 sip-presentation6293213 sip-presentation
6293213 sip-presentation
 

Viewers also liked

Viewers also liked (6)

Trudell_Resume_2015
Trudell_Resume_2015Trudell_Resume_2015
Trudell_Resume_2015
 
Ankit Vakil (1)
Ankit Vakil (1)Ankit Vakil (1)
Ankit Vakil (1)
 
VineeshKumar_Resume
VineeshKumar_ResumeVineeshKumar_Resume
VineeshKumar_Resume
 
Abhishek_cv
Abhishek_cvAbhishek_cv
Abhishek_cv
 
Resume_balmukund
Resume_balmukundResume_balmukund
Resume_balmukund
 
DIPAK INGLE_RESUME_final
DIPAK INGLE_RESUME_finalDIPAK INGLE_RESUME_final
DIPAK INGLE_RESUME_final
 

Similar to Profile_Prateek

Similar to Profile_Prateek (20)

Resume
ResumeResume
Resume
 
Aman Sharma
Aman SharmaAman Sharma
Aman Sharma
 
Resume_Appaji
Resume_AppajiResume_Appaji
Resume_Appaji
 
Private Network Project for Colleges
Private Network Project for CollegesPrivate Network Project for Colleges
Private Network Project for Colleges
 
Venkatesh_updated_Resume
Venkatesh_updated_ResumeVenkatesh_updated_Resume
Venkatesh_updated_Resume
 
Abhilash resume
Abhilash resumeAbhilash resume
Abhilash resume
 
Dinesh_Chandrawanshi_Networking
Dinesh_Chandrawanshi_NetworkingDinesh_Chandrawanshi_Networking
Dinesh_Chandrawanshi_Networking
 
V.S.VamsiKrishna
V.S.VamsiKrishnaV.S.VamsiKrishna
V.S.VamsiKrishna
 
Vinay's_profile
Vinay's_profileVinay's_profile
Vinay's_profile
 
chaitraresume
chaitraresumechaitraresume
chaitraresume
 
REEJA_CV1
REEJA_CV1REEJA_CV1
REEJA_CV1
 
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docxChapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
 
Leveraging the strength of OSGi to deliver a convergent IoT Ecosystem - O Log...
Leveraging the strength of OSGi to deliver a convergent IoT Ecosystem - O Log...Leveraging the strength of OSGi to deliver a convergent IoT Ecosystem - O Log...
Leveraging the strength of OSGi to deliver a convergent IoT Ecosystem - O Log...
 
Resume_Jayachandra
Resume_JayachandraResume_Jayachandra
Resume_Jayachandra
 
Testing
TestingTesting
Testing
 
Mcse question
Mcse questionMcse question
Mcse question
 
V P N
V P NV P N
V P N
 
TapanKr
TapanKrTapanKr
TapanKr
 
Phanidhar Gorrepati
Phanidhar GorrepatiPhanidhar Gorrepati
Phanidhar Gorrepati
 
PrakashSahoo
PrakashSahooPrakashSahoo
PrakashSahoo
 

Profile_Prateek

  • 1. 9.5 years of experience in Telecom, Networking, Optical Networks and Data Centre Software Development and Maintenance Professional Experience Prateek PROFESSIONAL SUMMARY  Software Development experience in Optial networking, Server Loadbalancer , L2~L7 server Healthchecks, L2~L7 Protocol Stack Development.  Customer support experience in CGN (Carrier Grade NAT), Server Loadbalancer and GEPON.  Good exposer in Design, Development and Testing phase of SDLC.  Development experience in Agile software development process. . Responsibilities:  Senior Technical Lead in NEC to provide technical assistance to team.  Individual Contributor to develop L2~L7 protocols.  Exposer in Designing, Development, Unit testing, System Testing and System Integration.  Experience in SRS, SA, HLD, LLD, UT Plan, TOI etc. docs preparation and review. Software Environment:  Language : C, C++  Operating System : Linux, Unix, Windows  Protocols : EAP, EAPOL, DPoE, IEEE802.1xAuthentication, VLAN,RIP, MPLS, ARP, RARP, TCP, UDP, IPV4, IPV6, ICMP, ICMP6, NAT44, NAPT44, NAT64, NAT444, Destination NAT, Source Dynamic NAT, Deterministic NAT, PBA, DS-Lite, TACACS, SSH, RSA, HTTP, Radius, DNS  Concepts : UNIX internals, Operating System, Networking Concepts, IPC, Multi Threading, Socket Programming, L2 Forwarding, L3 Forwarding, Router, Switch, Load Balancer, Optical PON Concepts, Algorithms, Data Structure  Traffic Generator : Ixia, Ixload, Ixexploror, Spirent,Schrenick  Development Tools : Cscope, Astah, Enterprise Architect, Beyond Compare, Source Insight, PC Lint, Coverity, Kloc Works, Code Analyzer, Putty, GCC, GDB, Gcovx, Ut Master, Cpp Unit, NMT, VMT, Varvel, CLOC  CM Tools : SVN, Clear Case, Visual Source Safe  Scripting Language : Shell Prateek +91-9654872451 Prateekm0711@gmail.com EDUCATION Bachelor of Engineering (Computer Science) (Hons.) Rajasthan University: 2006 (Aggregate 74%) Senior Secondary Education Rajasthan Board: 2001(80%) Secondary Examination Rajasthan Board : 1999(83%) EXPERIENCE SUMMARY NEC Technology, Noida Period: April 2015 To Till Date Designation: Senior Technical Lead Brocode Communication, Bangalore Period: Feb 2013 To April 2015 Designation: Software Engineer 3 Juniper Networks, Bangalore Period: Aug 2010 To Feb 2013 Designation : Software Engineer2 Huawei Technology, Bangalore Period: Oct 2006 To Aug 2010 Designation : Software Engineer
  • 2. Projects: NEC Technology, Noida Project I Name : 10-GEPON HSAN Description : HSAN (High Speed Access Network) is a device at ISP network which connects to user network via optical fiber and connects internet via Ethernet.In HSAN, I am leading Security FB Team. Security FB includes ONU Authentication, DPoE Authentication and Encryption modules. I was involved in designing, coding, UT, ST and SIT phases for Security FB. It Uses Arad and Poineer chips to perform security functionalities. Protocols: EAP, EAPOL, EPON OAMs, VLAN, Qos, DPoE Projects: Brocade Communication, Bangalore Project I Name : Server Healthcheck Description : Server healthchceks are used to have a context of availability of servers and services on it. It include L2, L3 and L4~L7 healthchecks. For healthcheck, Serveriron ADXsends periodic probs to real servers and based on server response updates context of available running service on real server. SLB traffic would make use of these information and forward traffic accordingly. Protocols: HTTP, DNS, LDAP, RADIUS, TCP, UDP Project II Name : Source NAT Enhancement Description : While sending slb traffic source nat can be applied. We Increased support of SNAT to 256 Ips and also enhanced source port range to per IP. Super source nat concept is also introduced. With this enhancement available source port range could be assigned to per real server port. Protocols: Source NAT Projects: Juniper Networks, Bangalore Project I Name : Deterministic NAT Description : Each subscriber could expect to have access to thousands of TCP/UDP ports at any given time. Thus, as an alternative to logging each connection, CGNs could deterministically map customer private addresses on the inside of the CGN to public addresses on the outside of the CGN. This algorithm will allow an operator to identify a subscriber internal IP address when provided the public side IP and port number without having to examine the CGN translation logs. This prevents an operator from having to transport and store massive amounts of session data from the CGN and then process it to identify a subscriber.We implemented this technique to get rid of logging details. Protocols: Deterministic NAT Project II Name : DS-Lite Description : DS-Lite(Dual Stack Lite) is a IPV4 depletion technique. It enables both continued support for IPv4 services and incentives for the deployment of IPv6. Dual-Stack Lite
  • 3. enables a broadband service provider to share IPv4 addresses among customers by combining two technologies IP in IP (IPv4-in-IPv6) and NAT. Protocols: IPv4 in IPv6 Tunneling Project III Name : EIM, EIF & APP Description : EIM(End point independent mappings)When an internal endpoint opens an outgoing session through a NAT, NAT assigns the session an external IP address and port number.NAT maintains this mapping till mapping time out.So for any subsequent connections from the same subscriber would be using same external IP and Port. EIF(End point independent filtering): This is the feature which enables external public host can communicate to internal host.EIF uses EIM mappings for NAT translation. APP (Address Pooling paired):With this feature we maintains internal to external ip mappings in NAT box till mappings timeout.So same user will always get same public ip for each connection. Protocols: NAT Flavors, TCP, UDP Project IV Name : PBA (Port Block Allocation) Description : ISP currently tracks their subscribers using IP address (RADIUS or DHCP log). If they use CGN, IP address will be shared by multiple subscribers. This will require them to track IP address and port .NAT ports gets used and reused at a very high rate and if we want to track users using log, there will be too many log messages to archive and correlate to identify a subscriber. So in PBA, Ports will be allocated in blocks. Logs messages would be generate only for allocating or deleting the port block in place of generating logs for each port allocation. Protocols: NAPT, TCP, UDP Project V Name : NAT64 Description : NAT64 is a mechanism using which IPv6-only hosts can talk to IPv4-only hosts. This will help in IPv4 to IPv6 transition. Internet Service Provider can use IPv6 hosts and give IPv6 addresses to its customers. NAT is also applied along with address translation. Protocols: NAT64 Projects: Huawei Technology, Bangalore Project I Name : HwTACACS Description : TACACS+ (Terminal Access Controller Access-Control System Plus) is a protocol which provides access control for routers, network access servers and other networked computing devices via one or more centralized servers. TACACS+ provides separate authentication, authorization and accounting services.Tacacs Provides encryption mechanism for secure transmission. Authentication refers to whether the user is authenticated, typically by providing evidence such as a password and Digital signature. The Authorization refers to whether a particular user is authorized to perform a given activity, typically logging on to an application or service. Accounting refers to the tracking of the consumption of network resources by users.
  • 4. Protocols: TACACS+ Project II Name : SSH Description : SSH (Secure Shell) Protocol provides secure network services over an insecure network. SSH is designed as a replacement for Telnet and other insecure remote shells. The encryption used by SSH provides confidentiality and integrity of data. SSH provides secure connection by server authentication, compression and client authentication. SSH provides secure tunnel for various user connections. SSH server and SSH client are developed as per RFC standards. Protocols: SSH1.x, SSH2.0 Project III Name : RSA Description : RSA (Rivest, Shamir and Adleman) is an algorithm for cryptography. It is the first algorithm known to be suitable for signing as well as encryption. RSA is widely used in electronic commerce protocols and is believed to be secure given sufficiently long keys. RSA is developed as a library. RSA is created as container which generates and stores all the keys. Protocols: RSA Algorithm Technical  Certified from IISC, Bangalore in “Unix Internals”.  Topped ‘C++ Certification’ from Huawei Technology R&D center, India, Bangalore.  Participation in “On the spot software programming” in ‘C’.  Certified from Swati InfoTech, Jaipur in “Linux Networking”.  HSAN Project onsite Support at Tokyo, Japan. PERSONAL PROFILE Date of Birth : 7th November 1983 Sex : Male Marital Status : Married Nationality : Indian Language Known : English, Hindi Passport : Yes (Prateek Mathur)