Sunday, November 29, 2020

Procedures to writing script in ns3

  1. Including necessary files
  2. Use appropriate namespace
  3. Set simulation time resolution
  4. Enable logging for different modules
  5. Creating codes
  6. Create net devices with MAC and PHY
  7. Attach Net devices to nodes and set interconnections
  8. Install protocol stack in nodes
  9. Set network address for interfaces
  10. Setup routing
  11. Install applications in nodes
  12. Setup tracing
  13. Set application start and stop time
  14. Set simulation start time
  15. Run simulation
  16. Release resources at end of the simulation


Wednesday, November 25, 2020

Install ns-3.32 on Ubuntu 20.04

 


  1. $ sudo apt-get update

  2. $ sudo apt-get upgrade

  3. $ sudo add-apt-repository ppa:rock-core/qt4

  4. $ sudo apt update

  5. $ sudo apt upgrade

  6. $ sudo apt-get install gcc g++ python python-dev libgtk-3-dev wireshark gnuplot

  7. $ sudo apt install qt4-dev-tools libqt4-dev

  8. $ sudo apt install libqtcore4 libqtgui4

  9. $ sudo apt install doxygen valgrind sqlite3

  10. $ sudo apt-get install libgsl-dev

  11. $ sudo apt-get install pkg-config

  12. $ sudo apt-get install graphviz

  13. $ sudo apt-get install libgcrypt20-dev

  14. $ sudo apt-get install lldpd snmp

  15. $ sudo apt-get install dpdk-dev libdpdk-dev dpdk

  16. $ sudo apt-get install castxml

  17. $ sudo apt-get install mpi

  18. $ pip3 install pygccxml

  19. $ pip3 install graphviz

  20. $ pip3 install kiwi

  21. download https://www.nsnam.org/releases/ns-3-32/

  22. $ tar xjf ns-allinone-3.32.tar.bz2

  23. $ cd ns-allinone-3.32

  24. $ cd ns-3.32

  25. $ export CPPFLAGS="-Wno-error"

  26. $ ./waf configure --enable-examples --enable-tests

  27. $ ./waf build

Friday, November 06, 2020

Codes and Ciphers

There are many different types of codes and ciphers. A code is a system where a symbol, picture, or group of letters represents a specific alphabetical letter or word. A cipher is where a message is made by substituting one symbol for a letter.

Some common codes that have been used by spies:
  • American Sign Language
  • Morse Code
  • Navajo and other unwritten ancient languages
  • Picture codes
Common ciphers:
  • Alphabet ciphers
  • Math based ciphers
  • Transposing or substituting letters

The rise of Cybercrime in India

The rise of Cybercrime in India - Key statistics and facts

Internet users across the globe are increasing at an alarming rate. More people are getting dependent on the internet every year where India stands loud on the usage of the internet. According to reports, India crossed a benchmark of 500 million internet users in the year 2018.

Thursday, November 05, 2020

A primer on RSA

Homomorphic Encryption is a way of performing computations on encrypted data. Both RSA and ElGamal encryption techniques possess multiplicative homomorphic properties. These algorithms support only one operation (multiplication) on encrypted data and so they are termed as partial homomorphic encryption schemes. By using RSA and ElGamal, the encrypted data could be multiplied together without performing decryption. If needed, the results after such computations could be returned in decrypted form. This scheme reduces computation time and increases the security and privacy of data being processed. Many organizations rely on third-party to outsource their large amount of electronic data for storage. It may be needed to perform some computations on the encrypted data on the server-side provided by an untrusted third party. Homomorphic Encryption will be much useful in such applications.