A technology enthusiast with 19+ years of comprehensive experience in technology, product design ,development and maintenance of distributed file systems, NAS Migration, cloud backup, product competitor analysis, Networking, Embedder systems, Protocol stack design, development, maintenance and Trustworthy-Cyber Security.
Working on the 802.1X L2 network access control protocol, it works by using a central authentication server to verify the identity of a connecting device (supplicant) before granting it access to the network, there by preventing unauthorized devices from gaining access to the network resources.
Worked on V2X stack (Vehicle 2 other device communication.
Platform Protocol Development:
24117-NP-001: Per supplicant groups server groups for authentication/ authorization/accounting