Pages


Welcomes you for the new dimension of career

Welcome for the new dimension of your academic, personal as well as career exposure. I am very glad to be a part of your each and every enthusiastic and energetic step towards your career. I request all the students of various discipline to watch it whenever you have time and give us your valuable feedback. I, on behalf of KSRCE, wish you to share your innovative creation of ideas or knowledge and do healthy discussion about it. The topic may be about bioinformatics, networking, data mining, career choices, Higher studies in abroad, Research, Placement activity, ... and so on.I request you for posting and the healthy discussion on any career oriented topic.
Some inspirational quotes for your life are

"Education is not preparation for life; education is life itself".
"The object of education is to prepare the young to educate themselves throughout their lives".
“Life is relationship"
"Twenty years from now you will be more disappointed by the things that you didn't do than by the ones you did do. So throw off the bowlines. Sail away from the safe harbor. Catch the trade winds in your sails. Explore. Dream. Discover."

Please mail at it.career.solution2010@gmail.com for posting new topic. - Adhithan.S.V.

Friday, September 17, 2010

Resume writting Tips

The first thing anyone writing a resume should understand is the purpose of the resume itself. A resume is an advertisement. The sole purpose of a resume is to get an interview. There is no other purpose. The resume’s aim is to wet the appetite of the reader. The reader should finish the resume feeling that this product (you) would offer them direct specific benefits.

Great resumes have four sections:

1. This is where you make assertions about your abilities, qualities and achievements. You want powerful, concise advertising copy here. Make sure all the information and assertions are accurate. The reader should see someone special while reading this.

2. The evidence section. Here you back up your assertions with evidence that you did what you said you did. Here is where job history, education, certifications obtained and that sort of thing go. This is the information you are obliged to include.

3. The summary where you reinforce that you are the best person for the job with the most pertinent examples.

4. Skills and Accomplishments


We will save the evidence section for another day. Today we will concentrate on assertions, skills and accomplishments and summaries.

The person reading this resume is a real person. Not some anonymous mystery person buried deep in some corporate headquarter. This person is responsible for the productivity of the person they hire. They call deeply how well the job will be done. Write your resume to appeal directly to them.

Ask yourself: What would the perfect candidate look like to this type of person? What does the employer really want? What special abilities and attributes would this person have? What is the difference between a truly exceptional candidate and one that is merely good? If you don’t know these things in detail, consider calling the employer and asking them?

After determining attributes and abilities a perfect candidate would have for a particular job you should prioritize, starting with the most important. Scour your background for examples that demonstrate that you have these attributes and abilities. If you don’t have enough evidence in your professional life, add examples from your personnel life. If leadership is required and you were on the board of trustees at your church, use that. If teaching is required the little league team you coached was undefeated, use that.

After reading your resume the reader should want to pick up the phone a talk to this person. Often is best to only hint at some things. Leave the reader wanting more. That way, they have even more reason to reach for the phone. The assertions section usually has two sections. In both of them you want to communicate, assert and convey that you are the best possible candidate for the job.

The assertion section breaks down into the objective the summary and your skills and accomplishments.

Let’s start with the objective. Ideally, your resume should be pointed toward conveying why you are the perfect candidate for one specific job or job title. Good advertising is directed toward a very specific target audience.

Let's look at a real world example. Suppose the owner of a wireless integration company advertises for an experienced wireless sales person. A week later they have received 200 resumes. The candidates have a wide variety of backgrounds. The employer has no way of knowing whether any of them are really interested in wireless integration.

They remember all the jobs they applied for that they didn't really want. They know that many of the resumes they received are from people who are just using a shotgun approach, casting their seed to the winds. Then they come across a resume in the pile that starts with the following:

"OBJECTIVE – a wireless integration sales position in an organization seeking an extraordinary record of generating new accounts, exceeding sales targets and enthusiastic customer relations.

They are immediately interested. This first sentence conveys some very important and powerful messages: "I want exactly the job you are offering. I am a superior candidate because I recognize the qualities that are most important to you, and I have them. I want to make a contribution to your company." This works well because the employer knows that someone who wants to do exactly what they are offering will be much more likely to succeed than someone who doesn't. This candidate has done a good job of establishing why they are the perfect candidate in their first sentence. They have thought about what qualities would make a candidate stand out. They have started communicating that they are that person immediately. What's more, they are communicating from the point of view of making a contribution to the employer.

They are not writing from a self-centered point of view. Even when people are sharp enough to have an objective, they often make the mistake of saying something like, "a position where I can hone my skill as a scissors sharpener." or something similar. The employer is interested in hiring you for what you can do for them, not for fulfilling your private goals and agenda.

This is how you write your objective.

First of all, decide on a specific job title for your objective. Go back to your list of answers to the question "How can I demonstrate that I am the perfect candidate?" What are the two or three qualities, abilities or achievements that would make a candidate stand out as truly exceptional for that specific job?

The person in the above example recognized that the prospective employer, being a wireless integration company, would be very interested in candidates with an ability to generate new accounts. So they made that the very first point they got across in their resume.

The objective needs to stick to the point. Avoid phrases that are obvious or do not mean anything, such as: "the ability to enhance potential and utilize experience in new challenges." An objective may be broad and still somewhat undefined in some cases, such as: "a mid-level management position in the wireless or networking industry."

Remember, your resume will only get a few seconds attention, at best! You have to generate interest right away, in the first sentence they lay their eyes on. Having an objective statement that really sizzles is highly effective. And it's simple to do. One format is:

OBJECTIVE: An AAA position in an organization where BBB and CCC would be needed AAA is the name of the position you are applying for. BBB and CCC are the most compelling qualities, abilities or achievements that will really make you stand out above the crowd of applicants. Your previous research to find out what is most important to the employer will provide the information to fill in BBB and CCC.

The "Summary" consists of concise statements that focus the reader's attention on the most important qualities, achievements and abilities you have to offer. Those qualities should be the most compelling demonstrations of why they should hire you instead of the other candidates. It gives you a brief opportunity to cover a few of your best qualities. It may be your only chance to attract and hold their attention, to get across what is most important, and to entice the employer to keep reading.

The "Summary" is the one place to include professional characteristics (extremely energetic, a gift for solving complex problems in a fast-paced environment, a natural salesman, exceptional interpersonal skills, etc.) which may be helpful in winning the interview. Gear every word in the Summary to your targeted goal.

How to write a "Summary"? Go back to your lists that answer this question. What would make someone the ideal candidate? Look for the qualities the employer will care about most. Then look at what you wrote about why you are the perfect person to fill their need. Pick the stuff that best demonstrates why they should hire you. Put this together in your "Summary" section.

The most common ingredients of a well-written "Summary" are as follows.

o A short phrase describing your profession
o Followed by a statement of broad or specialized expertise
o Followed by two or three additional statements related to any of the following:
+ breadth or depth of skills
+ unique mix of skills
+ range of environments in which you have experience
+ a special or well-documented accomplishment
+ a history of awards, promotions, or superior performance commendations
o One or more professional or appropriate personal characteristics

The last section of your resume is your skills and accomplishments. You are still writing to sell yourself to the reader, not to inform them. Basically, you do exactly what you did in the previous section, except that you go into more detail.

In the summary, you focused on your most special highlights. Now you tell the rest of the best of your story. Let them know what results you produced, what happened as a result of your efforts, what you are especially gifted or experienced at doing. Flesh out the most important highlights in your summary.

You are still writing to do what every good advertisement does, communicating the following: if you buy this product, you will get these direct benefits. If it doesn't contribute to furthering this communication, don't bother to say it. Remember, not too much detail. Preserve a bit of mystery. Don't tell them everything.

Here is a good way to structure your “Skills and Accomplishments”

1. A listing of skills or accomplishments or a combination of both, with bullets

Example:

SELECTED SKILLS AND ACCOMPLISHMENTS

o Created dozens of teaming agreements with the industries major suppliers.
o Conducted legal research the Federal and State Government markets
o Coordinated creation of Government Sales Board among members of the wireless networking community.

2. A listing of major skill headings with accomplishments under each. The accomplishments can be a bulleted list or in paragraph form. The material under the headings should include mention of accomplishments which prove each skill.

Example:

SELECTED ACCOMPLISHMENTS

Program Design: Meeting Government needs

As part of the Wireless Training Board developed the program to merge suppliers, integrators and government purchasing authorities into a unified strategic force. Contracts awarded to integrators in our group increased 280% in 2006.

3. A list of bulleted accomplishments or skill paragraphs under each job (in a chronological resume).

Example:

Director of Federal Sales and Marketing

XYZ Wireless of Georgia

o Promoted from Sales Representative within one year of joining company to Director of Sales and Marketing. Responsible for all sales in the Federal, State and Local government markets.

o Recruited, trained and managed sales staff. Developed marketing strategy, prepared sales projections and established quotas. Selected and contracted with overseas sub-agents to achieve international market penetration.

o Negotiated and finalized long-term contractual agreements with suppliers on behalf of clients. Oversaw all aspects of transactions, federal guidelines, set aside quotas, federal compliance issues.

o Planned and administered sales and marketing budget, and maintained sole profit/loss responsibility. Within first year, doubled company's revenues, and produced $17 million in annual sales during the next three years.



In later sections of this series we will cover the evidence section of the resume as well as guidelines for quality presentations, determining if a particular job is best for you and other issues.

Good luck and good job hunting.

Factors to Consider while Evaluating a Wireless Security Solution - http://www.cwnp.com/index/cwnp_wifi_blog/10447

Hope this article will help you to expose more about wireless security solution


Factors to Consider while Evaluating a Wireless Security Solution - By Hemant Chaskar

Wi-Fi proliferation and increased awareness about associated security risks is prompting many organizations to install Wi-Fi security monitoring systems, for which the industry term is WIPS (wireless intrusion prevention system). Protection from rogue APs, WiPhishing, corporate client connections to neighborhood APs, mis-configurations of authorized Wi-Fi, wireless DoS attacks, spoofing, and zero-day attacks are some of the commonly cited reasons to install WIPS. There are many WIPS solutions available in the market today, including those offered by WLAN infrastructure vendors and those offered by dedicated security vendors. However, WIPS being a relatively new security technology, organizations often face challenges in evaluating these solutions to determine what best suits them. More so, many end-users may not have the level of dedicated wireless skills and resources required to thoroughly test a WIPS. In this light, this article lays out some high level considerations that are important while evaluating a WIPS solution.

1) What types of rogue APs on the network is the WIPS designed to detect?

Rogue APs on the network are the mother of all Wi-Fi threats, and protecting from them should be on the list of Wi-Fi security objectives for every organization. Rogue APs often get connected to the enterprise network, either by an unassuming employee or by malicious insiders. Such rogue APs on the network can provide access to the enterprise network for outsiders. From the wireless side, a wireless connection between the rogue AP on the network and the outsider client looks like a connection between two MAC addresses which do not belong to the enterprise Wi-Fi, much like a wireless connection between a neighborhood client and a legitimate AP of the neighbor (whose MAC addresses also don’t belong to enterprise Wi-Fi). But what differentiates the former (threat) from the latter (friendly neighborhood activity) is the wired connectivity of the AP to the enterprise network in the former case. Hence detection of wired connectivity of rogue APs to the enterprise network becomes important to detect the threat of rogue APs on network.

APs differ in nature on many dimensions such as:

* bridges vs. routers
* using wireless encryption vs. using open wireless links
* default state vs. having configuration changes done on them
* wired and wireless network interface properties
* hardware APs vs. software APs instantiated on end user devices
* APs connected to different VLANs (subnets) in the network.

Different permutations and combinations of these properties present different types of challenges for WIPS in detecting if that AP is connected to the monitored enterprise network. That is, some of the scenarios can be detected by wired only scanning while some necessarily require wireless side scanning, some can be detected by passive traffic correlation while others require active probing, even with active probing there are several ways in which it is done.

So, it is first essential to define the types of rogue APs on network that are considered potential candidates in the organization’s network and then to ensure that the WIPS properly detects them all.

2) Does the WIPS integrate into managed switching infrastructure, or does it operate independent of it?

Not only is it important to examine the types of rogue APs on the network that the WIPS detects, but it is equally important to assess how the WIPS performs detection of rogues on the wired network. Broadly, there are two types of techniques available to detect rogue APs on network. First is based on using information in network switches to perform traffic correlation between wired and wireless domains to detect rogue APs on the network. This requires maintenance of switch properties in the WIPS, so that the WIPS can poll the switches for information (Is the MAC address of the client connected to a rogue AP visible in the wired domain?). The second technique is based on information gathered by the WIPS itself from traffic in the wired network to perform traffic correlation between wired and wireless domains. Some systems also actively generate special rogue detecting packets in the network. The second method does not require maintenance of switch properties in the WIPS.

Depending on factors such as how security and network operation teams operate (in close collaboration, or more or less independent), the size of network, availability of managed switches to the edge, vendor mix in the switching infrastructure etc., a judicious choice of rogue detection architecture must be made.

3) If automatic wireless threat remediation (also called over-the-air blocking) is required, what are implications of false alarms in the WIPS?

Different organizations have different perceptions about the window of time in which a potential wireless threat should persist. For those who want this window to close instantly (rather than waiting for manual administrator remediation), automatic remediation is important. Further, most wireless threats can only be blocked over-the-air, notably ad hoc connections, WiPhishing, corporate clients connections to neighborhood APs and even many types of rogue APs on the network whose wired side connection point (switch port) cannot be precisely determined.

In over-the-air blocking, the false alarms consideration becomes important. There are two types of false alarms: false positives and false negatives. A false positive means incorrect tagging of a benign neighborhood activity as a threat to the enterprise assets. If automatic over-the-air blocking gets triggered on a false positive, the WIPS can disrupt benign neighborhood communications, such as normal client/AP activity or ad hoc networks. Such accidental neighbor disruption is totally unacceptable in the over-the-air prevention.

On the other hand, a false negative means incorrect tagging of a credible threat as a benign activity or a threat of lesser severity. The false negative may result in automatic prevention not triggering when it should, leaving the enterprise assets exposed to the threat. A typical example of the false negative is a rogue AP on the wired enterprise network not tagged as on-network by the WIPS.

To analyze false alarms, it is essential to let the system run in a production environment for at least one week, since all the dynamic wireless environment parameters that trigger false alarms cannot be simulated in a controlled lab setup. Many of the false alarm triggers are statistical in nature and manifest when the system is “worked up” in busy production environment.

4) What types of wireless threat remediation techniques are used by the WIPS?

One more thing to keep in mind with regards to wireless threat remediation is that even though all Wi-Fi devices follow the same IEEE 802.11 standard (and may even be Wi-Fi Certified), nuances in their implementations often pose challenges in over-the-air blocking of their communication. To cite an example, commonly used over-the-air blocking with forced de-authenticate messages may work on ad hoc connections with Dlink Wi-Fi client cards, but the same may not work on ad hoc connections with Centrino Wi-Fi clients. This is true even if Dlink Wi-Fi clients can form an ad hoc connection with Centrino Wi-Fi clients.

Hence, it is important for the WIPS to demonstrate that it has wireless threat remediation techniques that will cover all different violation scenarios and devices that the organization’s security policy demands. It is also worthwhile to measure the capacity of WIPS in terms of being able to block multiple simultaneous threats on multiple channels, since violations such as mis-associations often happen in bulk on multiple channels.

5) How many alarms does the WIPS generate?

Broadly, there are two types of approaches to wireless intrusion prevention. The first approach sends fine grained alerts to a user for every event that appears suspicious. On the other hand, the second approach processes fine grained details on suspicious events, draws concrete inferences, and raises alerts to a user only when the result of analysis points to a security threat or vulnerability.

The first of the above approaches may be machine-error proof, but it requires manual intervention and analysis on a continuous basis. This is because perturbations to wireless traffic (your own as well as in your neighborhood) constantly happen even in smooth running networks. On the other hand, if one wants to go with the second approach, it is necessary to evaluate how the WIPS’s logic of filtering alarms works and to ensure that it will not filter alarms that administrators want to know about. In general, when it comes to “alarms volume”, I would recommend focusing on security and operational objectives, rather than mechanical “more alarms equals more security” approach.

6) How much configuration does the WIPS expose to the end-user?

Here again, there are two types of approaches. The first approach relies on receiving detailed configuration from the user regarding how the system should behave. The system then executes user defined rules and performs user defined actions. For example, the system may ask the user to define rules to be matched with properties of APs to classify them into threatening or friendly classifications. On the other hand, the second approach provides built-in policy rules, with only fine-tuning options. For example, in this approach, the system may have built in rule sets regarding which APs should be called threat posing (e.g., unmanaged APs connected to enterprise network are threat posing) vs. which should be called friendly (e.g., neighborhood APs that do not attract wireless clients are friendly).

At first sight it looks like the first approach gives greater control over the system behavior. The flip side, however, is that it takes considerable skill to define those rules, and requires a process and resources for maintaining them in dynamic wireless environments. On the other hand, if you want to go with the second approach, you must evaluate why the system’s built-in rules have sound security underpinnings and if the less flexible approach of preset, automated, vendor techniques meet your requirements.

7) How does the WIPS facilitate ease of day-to-day operation?

From a day-to-day security management perspective, the WIPS may need to provide some useful features. For example, some WIPS deployments can get very large – spanning different networks, buildings, and campuses. To cater to this scale, the WIPS may need to provide a location context sensitive security console which can be managed independently by different administrators at different locations, while providing a bird’s eye view for the super-administrator at the top.

For some organizations, periodic reporting for regulatory/standards compliance is essential. The WIPS then needs to provide automated report generation so that the administrator is relieved of this task on a day-to-day basis and there are no lapses.

Also, administrators often have to look at previously collected data to analyze events/incidents of the past. For this, the WIPS will need to provide forensics capability to facilitate the administrators to search, sort, and correlate security events/incidents of the past.

The various selection factors described above can serve as guideposts for the WIPS evaluators. End-users can then expand on these criteria with their own application-specific criteria and network needs to come up with their own test scripts and criteria to evaluate a particular wireless security solution.

(CWNP Editorial Note: Hemant is the Director of Technology for a leading WIPS vendor. To avoid bias, he refrained from discussing the topic of overlay vs. integrated WIPS. That is one of the most important factors when evaluating a WIPS because there are significant tradeoffs with either approach.)

Know about CWNE which will give you the bright future???

CWNE

Certified Wireless Network Expert


The CWNE (Certified Wireless Network Expert®) credential is the final step in the CWNP Program. By successfully completing the CWNE requirements, you will have demonstrated that you have the most advanced skills available in today’s enterprise Wi-Fi market.

The CWNE certification assures that you have mastered all relevant skills to administer, install, configure, troubleshoot, and design wireless network systems. Protocol analysis, intrusion detection and prevention, performance and QoS analysis, spectrum analysis and management, and advanced design are some of the areas of expertise you will need to know.

There are currently 82 elite individuals worldwide who have earned the prestigious CWNE certification.


About the CWNE Certification

* Learn about the requirements for your CWNE certification
* Download the CWNE Application and Endorsement Forms (PDF)
* The CWNE exam objectives (PDF)
* Exam PW0-300 at all Pearson VUE testing centers
* Official CWNE practice test Questions
* Resources to prepare for taking the CWNE exam


CWNE (PW0-300) Exam Summary

* Exam Number: PW0-300
* Cost: $395.00 U.S.
* Availability: A completed, approved CWNE application is required to take the exam
* Duration: 180 minutes (3 hours)
* Questions: 70
* Question Types: Multiple choice / multiple answer real world scenario
* Passing Score: 75%
* Available Languages: English


CWNE Exam Description

This certification exam measures your ability design, install, secure, troubleshoot, and optimize wireless LANs. Before taking the exam, you should understand everything about wireless LANs.

The main subject areas covered on the CWNE exam are:

* 802.11 Physical Layer Technologies
* 802.11 MAC Frames and Exchange Processes
* 802.11 Spectrum Management
* 802.11 QoS Terms and Features
* WMM Certifications, Features, and Configuration
* Designing Voice/Data Networks
* 802.11 Wireless LAN Protocol Analyzer Use and Trace Interpretation


To know more about it please visit
http://www.cwnp.com/index/certifications/cwne/cwne-requirements

Job oriented Training course conducted by BSNL with nexgtech - (CWNE)Certfied Wireless Network Engineer from BSNL & Nexgtech (Chennai)

A Comprehensive 1 year program is conducted by BSNL with NEXTGTECH with hands-on training and project management. It is a 100% employment based program.

Eligibility: B.E/B.Tech(IT/CSE/ECE/EEE/EIE).

Certfied by BSNL RGM-TTC & CWRCD.
Pls visit
http://www.chennaiclassic.com/1_Chennai/posts/3_Jobs/20_Engineers_Technical/1212317_Certfied_Wireless_Network_Engineer_CWNE_from_BSNL_amp_Nexgtech.html
for further details

Regards,
S.V.Adhithan

ONE DAY VISIT AND ORIENTATION PROGRAM FOR STUDENTS AT BSNL

Being the premiere training institute of BSNL and forms part of Tamil Nadu Telecom circle,BSNL is certified Institution and train Engineers recruited for DOT/ BSNL since 1960s. Now spreads its wings to impart knowledge and training to students to enhance Student Industry Relationship through educational institutions at moderate charges with an aim of ‘MISSION BEST TRAINING ”.

Location

GST road (Grand Southern Trunk Road), Meenambakkam, Chennai-27.
Opposite to Old Airport abetting Meenambakkam Post Office. 5 minutes walk from Meenambakkam Railway station.

Infrastructure:
They have Labs of State of Art Technologies like GSM Mobile, WLL CDMA, Broad Band, Networking, Computers, Optic Fibre, Access Technologies, MPLS, MLLN and other labs.

Procedure for Enrolment:
A letter from the Principal of the college requesting for Oneday Visit with year of study, Branch, Number of students and convenient date for visit
The letter to be addressed to “ The Principal, RGM TTC, BSNL, Meenambakkam, Chennai-600027”
On receipt of the DD, Communication will be sent from RGM TTC regarding the Date of visit
Contact:
Help Desk : 22317540
G.Shankar PRO: 9486100466
Dominic Savio: 9486100457

For further details pls visit URL: http://61.1.197.244/iv/iv.html

Regards,
S.V.Adhithan

Inplant training for College Students at BSNL - Don't miss the chance if you are intersted

Course Details:

The training will be provided by Rajiv Gandhi Memorial Telecommunication Training Centre (RGM TTC), Meenambakkam, GST Road, Chennai-600 027.

RGM TTC, a Premiere Telecom Training Institute of BSNL, offers training in Telecom Basics to college students. The training centre located on the GST Road, Meenambakkam (opposite to the OLD AIRPORT), is conducting training to the engineers of BSNL since 1960.

The training on State of the Art Technology equipments will be given by experienced and specialised trainers in BSNL Training Centre.

The training will be conducted in sessions every day for 5 days in a week.
Venue:

Rajiv Gandhi Memorial Telecom Training Centre, Meenambakkam, Adjacent to Meenambakkam Post office (Opposite to OLD AIRPORT) GST Road, Chennai.27.

Course Fee per Student
1 Week Rs.1000/- (Inclusive of all Taxes)
2 Weeks Rs.2000/- (Inclusive of all Taxes)
3 Weeks Rs.3309/- (Inclusive of all Taxes)
4 Weeks Rs.4412/- (Inclusive of all Taxes)
6 Weeks Rs.6618/- (Inclusive of all Taxes)
Demand Draft (DD) to be drawn in favour of
"Senior A.O.(Cash), O/o The CGMT, BSNL, TN Circle, Chennai-2." Payable at Chennai.

Procedure for enrollment, course curriculum, Course Duration,and Terms & Conditions,
pls visit the URL http://61.1.197.244/professionaltraining/default.aspx

Regards,
S.V.Adhithan

Academic Project Reg- @ ZOHO- Don't miss the chance to be an Employee of ZOHO & BSNL offer projects to students

Dear Students,
You might be busy with searching projects. I want to share few informations which I know where they are providing project for free.

1) You can submit their details by clicking the following link.The selected students will be absorbed by the company peoples once they complete their task. The selection procedure for the project will be itself like selecting them as their employee.So ask the students to prepare well and go for the attending the formalities.

https://creator.zoho.com/jevitha/project-trainee/

Few points to highlight:
a. They offer only full time curriculum project (eg., MCA - Final semester) The project tenure will be 5 to 6 months, starting from December (after the university exams)

b. During the project work the candidate must come to ZOHO regularly and follow all rules and regulations of ZOHO like an employee.

c. Project Trainees need not pay any amount as fees to do the project.

d. Recruitment process of Project Trainee would be as good as recruiting an Engineer Trainee. Their intention of offering curriculum project is to retain the candidate as an employee upon completing the Project successfully, provided they do have requirement of employees at that point of time.


2) BSNL offer project to students

BSNL is a premiere training institute of BSNL, forming part of Tamil Nadu Telecom circle training Engineers recruited for DOT/ BSNL since 1960.

Location:
GST road (Grand Southern Trunk Road), Meenambakkam, Chennai-27.
Opposite to Old Airport adjacent to Meenambakkam Post Office.
5-10 minutes walk from Meenambakkam/Pallavanthangal Railway station

Few points to be highlighted
a) Infrastructure:

Labs of State of Art Technologies like
GSM Mobile, WLL CDMA, Broad Band, Networking, Computers, Fibre Optics, Access Technologies, MPLS, MLLN, and Telecom Switching & Transmission labs.

b)About Projects
Who are all eligible?

Students doing Graduation / Post Graduation in Engineering/MBA / MCA /Diploma/ Science and Arts

Duration:
4 to 12 weeks as per the project needs.

Total duration of 30 hours of Personal Contact Sessions (PCS) with the Guide is ensured.

Project Fee:
Pl Contact 22317540 for details

Students can also form into Groups for doing the Project Charges are per student basis only

Project Topics:
Access Technologies
Broadband
CDMA Technology
Computers and Programming
Fibre Optics
GSM Technology
Management
Networking
Switching

Procedure for Enrolment:

Enroll online and Meet our PRO with Bonafide letter from College Authorities requesting "The Principal, RGM TTC, BSNL, Meenambakkam, Chennai-600027" to permit the student for doing a project on a specified topic.

Select your project from the given list on the Technologies/Subjects in consultation with the Nominated faculty (GUIDE) of our Institute.

On finalisation of the topic, the students shall confirm the suitability of the project from their college and remit the project fees through DD.

On receipt of the DD, Offer Letter for doing the project will be communicated to the college by BSNL.

Contact persons:
Help Desk: 22317540 22348527

All the best!!!

S.V.Adhithan. AP/MCA