image source : www.flickr.com/photos/73919598@N00/377254103/
Saturday, October 11, 2008
Elephants and Humans
image source : www.flickr.com/photos/73919598@N00/377254103/
Friday, May 30, 2008
ACQP
ACQP or in other words Acquisitional Query Processing is a querying technique used in wireless sensor networks. When it comes to sensor networks, we all know it contains hundreds of spatially distributed sensor nodes which collect sensor data. Because of the distributed nature of these sensor nodes the data within them are inherently distributed.
One of the major considerations when it comes to sensor nodes is that they contain less amount of energy (battery power) and they contain very less storage. Therefore querying in sensor network environments is much different when compared with traditional query processing. With the database being distributed ACQP brings about a new dimension for query processing.
According to ACQP, querying is done on demand. Or in other words ACQP means collecting data as and when needed with specific sample rates.
As sensor networks function without human intervention for many months it is a must that the low battery energy of them is conserved as much as possible. Therefore by querying data on demand we could conserve energy on sensor nodes and also get relevant sensor data when we need them.
Wednesday, March 12, 2008
My Experience on Bed
Well gotcha naughty mind. I am not going to write anything on my experience on bed but I am here to give you all about my experience on DEB (HA HA HA :-) ) or for that matter debain based Linux distributions.
Well well well for those who know me, Surprise right? Girisha is speaking about Open source. Well it’s not because I failed my interview with Microsoft Research India or it's not because of me having any grudge over the Microsoft.I working in a lab where Microsoft products are extremely prohibited.(He He He)
From the lovely sweet world of Visual Studio and ASP.NET I have come into a world of VIM, Python, C, JSP and from the lovely world of WPF (Though I don’t know a shit about WPF) to “XServer” programming. Phew talking about some turn over right? To tell you guys the damn truth it taking me hell of a lot of time to get use to all these stuff.
Well to finish off telling you this, this experience is really getting a GEEK out of me!!!
Saturday, January 12, 2008
Bootstrapping in Compilers
Well primitive type of assemblers where implemented using machine code. This implies that by making a language a subset of another we could develop languages.
This process is known as BOOTSTRAPPING.
Just to explain in a much more simpler manner, BOOTSTRAPPING could be described as stated bellow.
"A simple language compiles a complicated program and this program in turn could compile a much more complicated program and so on...."
So folks thats it about bootstrapping... So for anyone of you, who still think "what the heck is a boot strapper" please don't mix it up with the boot straper in the Pirates of the caribbean (Wiliam's Father)...
Friday, January 11, 2008
IPSec
- Make sure that routing or a routing advertisement came from an authorized router.
- An redirect message came from the original router where the initial request was sent.
- Make sure that routing update was not forged.
1. Tunnel Mode
Encrypts the entier IP packet and authenticates the entire IP packet.Original IP header should be replaced by the new IP header which has the next hop router address. Slow and good for VPN's and gateway to gateway security
2. Transport Mode
Encrypts and authenticates the payload of the IP packet. The original IP packet stay intact. Faster than Tunnel mode and is used for traffic analysis purpose.
Benifts of IPSec over SSL/TSL
- Encrypts entire IP packet
- Independent of IP address
- No impact on security gateway to security gateway communications
- Protocol Independent
Pitfalls with IPSec
- Many way to configure and can be complex at times
- Can be configured in a wrong way
- Client security is an issue
- Use SHA1 over SHA and MD5
- Use 3DES AES or blowfish
- Never use DES
- Tunnel mode
- Encrypt entire packet
- Use certificates for key exchange