- Including necessary files
- Use appropriate namespace
- Set simulation time resolution
- Enable logging for different modules
- Creating codes
- Create net devices with MAC and PHY
- Attach Net devices to nodes and set interconnections
- Install protocol stack in nodes
- Set network address for interfaces
- Setup routing
- Install applications in nodes
- Setup tracing
- Set application start and stop time
- Set simulation start time
- Run simulation
- Release resources at end of the simulation
Sunday, November 29, 2020
Procedures to writing script in ns3
Wednesday, November 25, 2020
Install ns-3.32 on Ubuntu 20.04
$ sudo apt-get update
$ sudo apt-get upgrade
$ sudo add-apt-repository ppa:rock-core/qt4
$ sudo apt update
$ sudo apt upgrade
$ sudo apt-get install gcc g++ python python-dev libgtk-3-dev wireshark gnuplot
$ sudo apt install qt4-dev-tools libqt4-dev
$ sudo apt install libqtcore4 libqtgui4
$ sudo apt install doxygen valgrind sqlite3
$ sudo apt-get install libgsl-dev
$ sudo apt-get install pkg-config
$ sudo apt-get install graphviz
$ sudo apt-get install libgcrypt20-dev
$ sudo apt-get install lldpd snmp
$ sudo apt-get install dpdk-dev libdpdk-dev dpdk
$ sudo apt-get install castxml
$ sudo apt-get install mpi
$ pip3 install pygccxml
$ pip3 install graphviz
$ pip3 install kiwi
$ tar xjf ns-allinone-3.32.tar.bz2
$ cd ns-allinone-3.32
$ cd ns-3.32
$ export CPPFLAGS="-Wno-error"
$ ./waf configure --enable-examples --enable-tests
$ ./waf build
Friday, November 06, 2020
Codes and Ciphers
- American Sign Language
- Morse Code
- Navajo and other unwritten ancient languages
- Picture codes
The rise of Cybercrime in India
The rise of Cybercrime in India - Key statistics and facts
Internet users across the globe are increasing at an alarming rate. More people are getting dependent on the internet every year where India stands loud on the usage of the internet. According to reports, India crossed a benchmark of 500 million internet users in the year 2018.
Thursday, November 05, 2020
A primer on RSA
Homomorphic Encryption is a way of performing computations on encrypted data. Both RSA and ElGamal encryption techniques possess multiplicative homomorphic properties. These algorithms support only one operation (multiplication) on encrypted data and so they are termed as partial homomorphic encryption schemes. By using RSA and ElGamal, the encrypted data could be multiplied together without performing decryption. If needed, the results after such computations could be returned in decrypted form. This scheme reduces computation time and increases the security and privacy of data being processed. Many organizations rely on third-party to outsource their large amount of electronic data for storage. It may be needed to perform some computations on the encrypted data on the server-side provided by an untrusted third party. Homomorphic Encryption will be much useful in such applications.