Introduction to Multimedia
There are three main components of this course. The first part of the course will focus on multimedia data types and motivate the need for compression. We will cover basic compression technologies (Huffman, arithmetic, LZW), image compression (JPEG, GIF, PNG), video compression (H.261, H.263, MPEG-1, MPEG-2, MPEG-4), audio compression (u-law, A-law, MP3). The second part of the course will focus on systems support for multimedia. The third part of the course will focus on streaming video technologies and the need for adaptation algorithms for streaming media.
Cryptography
A course on Modern Cryptography, the course covered topics on block ciphers, pseudorandom functions
and permutations, symmetric (secret-key) encryption, cryptographic hash
functions, message authentication, authenticated encryption, asymmetric (public-key)
encryption, digital signatures, stream ciphers, one-way functions,
and pseudorandom generators.
Term paper on Does encryption with redundancy provide authenticity?
by Jee Hea An and Mihir Bellare.
Report in PDF  Format (112KB) (Fall 2004)
TCP/IP Internals
We develop a filter to classify packets as TCP, UDP, ICMP or OTHER
and maintain a counter for each. This filter performs complex filtering based on the user
requirements. The user could specify the particular protocol, source/destination
IP address and/or ports whose packets s/he is interested in. This filter can also
look for virtual connections.In this study we will be using two ACEs namely, Ingress ACE and Filter ACE.
Ingress ACE is the default implementation provided with the Intel SDK.
We develop a custom Filter ACE.
Report in PDF  Format (74KB) (Spring 2003)
Operating System Internals
This document describes our design for a cryptographic filesystem for Linux that meets the
requirements of providing cryptographic protection and being modular, inode based and persistent.
Our design is based on the ext2 filesystem and is called CryptExt2.
We also describe the implementation of some of our design goals.
Report in PDF  Format (237KB) (Spring 2002)
The Network lab has 6 Cisco routers, three Cisco switches, one Intel switch,
and 5 (or more) host boxes running FreeBSD and Linux. I did OSPF configuration for Cisco routers.
OSPF Basic Configuration1, 
OSPF Basic Configuration2, 
Diagram
Virtual Link Case1, 
Diagram
Virtual Link Case2, 
Diagram 
Stub Area, 
Diagram
MD5 Authentication, 
Diagram
Summarization of Routers, 
Diagram
Intelligent Home Network (INTELHOMENET)
INTELHOMENET is a network of home and office gadgets and any controllable devices, which affects the day-to-day life of people.
With emerging technologies like Bluetooth, 3rd generation wireless, Personal Digital Assistants and smart mobile phones capable of
providing ubiquitous connectivity, numerous applications come to fore, we propose COM based architecture to provide a smart
network of home appliances. We have identified dependability, extensibility & user-friendly interface as key feature of
our architecture.
Report in TXT  Format, PDF  Format (226KB) (Winter 2001)
Surevey of Ad-Hoc Multicast Routing Protocols
Ad Hoc Networks (AHNs) are envisioned to have dynamic, sometimes rapidly changing,
random, multihop topologies that are composed of relatively bandwidth-constrained wireless
links. Individual nodes and even whole networks of nodes may continuously move, or disappear,
leading to highly dynamic topologies. Multicast protocols for AHNs have to be designed keeping
aforesaid characteristics of the nodes. Most of the Multicasting protocols are either tree based
or mesh based. Some of the protocols e.g. AMRoute, ODMRP, AMRIS, CAMP and IMAHN are compared in this paper.
Report in TXT  Format, PDF  Format (55KB) (Fall 2000)
Implementation of reliable protocol called "RUP" for Reliable Udp Protocol
RUP provides a packet oriented protocol that is totally
reliable on top of UDP. The problem with UDP is that packet arrival
can suffer from the following flaws:
- lost; never delivered
- partially destroyed (data corruption)
- delivered out of order
- duplicated.
Report  in txt Format (55KB) (Fall 2000)
Implementation of HomeBrew File System Service (hbfs)
HBFS implement a FTP-like remote file system, using a client-server architecture.
The salient feature of the architecture is that it has following clearly
differentiated layers:
- a client and server at the application layer.
- a remote procedure call layer.
- a transport mechanism.
Report  in txt Format (8KB) (Fall 2000)
MIPS architecture with projects in SPIM, Verilog (Ripple carry adder glitch assessment)
and analysed the input and output bit streams of the units, and discussed the possibility of
power saving in reducing the number of flips between 0s and 1s.
Operating System
Implementation of mini command shell interpreter (mish). The shell interpreter is similar to the
Bourne shell or the C shell/bash of UNIX. Goal is to learn process creation,
implementation of pipes, input/output redirection, background processes, signals, interrupt handling, and
use of various system calls.
Implementation of mailbox in NACHOS using semaphores, locks and condition variables.