Introduction to Multimedia

There are three main components of this course. The first part of the course will focus on multimedia data types and motivate the need for compression. We will cover basic compression technologies (Huffman, arithmetic, LZW), image compression (JPEG, GIF, PNG), video compression (H.261, H.263, MPEG-1, MPEG-2, MPEG-4), audio compression (u-law, A-law, MP3). The second part of the course will focus on systems support for multimedia. The third part of the course will focus on streaming video technologies and the need for adaptation algorithms for streaming media.

Cryptography

A course on Modern Cryptography, the course covered topics on block ciphers, pseudorandom functions and permutations, symmetric (secret-key) encryption, cryptographic hash functions, message authentication, authenticated encryption, asymmetric (public-key) encryption, digital signatures, stream ciphers, one-way functions, and pseudorandom generators.

Term paper on Does encryption with redundancy provide authenticity? by Jee Hea An and Mihir Bellare.

Report in PDF  Format (112KB) (Fall 2004)



TCP/IP Internals

We develop a filter to classify packets as TCP, UDP, ICMP or OTHER and maintain a counter for each. This filter performs complex filtering based on the user requirements. The user could specify the particular protocol, source/destination IP address and/or ports whose packets s/he is interested in. This filter can also look for virtual connections.In this study we will be using two ACEs namely, Ingress ACE and Filter ACE. Ingress ACE is the default implementation provided with the Intel SDK. We develop a custom Filter ACE.

Report in PDF  Format (74KB) (Spring 2003)



Operating System Internals

This document describes our design for a cryptographic filesystem for Linux that meets the requirements of providing cryptographic protection and being modular, inode based and persistent. Our design is based on the ext2 filesystem and is called CryptExt2. We also describe the implementation of some of our design goals.

Report in PDF  Format (237KB) (Spring 2002)



Internet Routing

The Network lab has 6 Cisco routers, three Cisco switches, one Intel switch, and 5 (or more) host boxes running FreeBSD and Linux. I did OSPF configuration for Cisco routers.

  • OSPF Basic Configuration1OSPF Basic Configuration2Diagram
  • Virtual Link Case1Diagram
  • Virtual Link Case2Diagram 
  • Stub AreaDiagram
  • MD5 AuthenticationDiagram
  • Summarization of RoutersDiagram

    Bulding Software Systems with Components

    Intelligent Home Network (INTELHOMENET)

    INTELHOMENET is a network of home and office gadgets and any controllable devices, which affects the day-to-day life of people. With emerging technologies like Bluetooth, 3rd generation wireless, Personal Digital Assistants and smart mobile phones capable of providing ubiquitous connectivity, numerous applications come to fore, we propose COM based architecture to provide a smart network of home appliances. We have identified dependability, extensibility & user-friendly interface as key feature of our architecture.

    Report in TXT  Format, PDF  Format (226KB) (Winter 2001)



    Advance Networks

    Surevey of Ad-Hoc Multicast Routing Protocols

    Ad Hoc Networks (AHNs) are envisioned to have dynamic, sometimes rapidly changing, random, multihop topologies that are composed of relatively bandwidth-constrained wireless links. Individual nodes and even whole networks of nodes may continuously move, or disappear, leading to highly dynamic topologies. Multicast protocols for AHNs have to be designed keeping aforesaid characteristics of the nodes. Most of the Multicasting protocols are either tree based or mesh based. Some of the protocols e.g. AMRoute, ODMRP, AMRIS, CAMP and IMAHN are compared in this paper.

    Report in TXT  Format, PDF  Format (55KB) (Fall 2000)



    Internetworking Protocols (TCP/IP)

    Implementation of reliable protocol called "RUP" for Reliable Udp Protocol

    RUP provides a packet oriented protocol that is totally reliable on top of UDP. The problem with UDP is that packet arrival can suffer from the following flaws:
    1. lost; never delivered
    2. partially destroyed (data corruption)
    3. delivered out of order
    4. duplicated.

    Report  in txt Format (55KB) (Fall 2000)

    Implementation of HomeBrew File System Service (hbfs)

    HBFS implement a FTP-like remote file system, using a client-server architecture. The salient feature of the architecture is that it has following clearly differentiated layers:
    1. a client and server at the application layer.
    2. a remote procedure call layer.
    3. a transport mechanism.

    Report  in txt Format (8KB) (Fall 2000)



    Computer Architecture

    MIPS architecture with projects in SPIM, Verilog (Ripple carry adder glitch assessment) and analysed the input and output bit streams of the units, and discussed the possibility of power saving in reducing the number of flips between 0s and 1s.



    Operating System

    Implementation of mini command shell interpreter (mish). The shell interpreter is similar to the Bourne shell or the C shell/bash of UNIX. Goal is to learn process creation, implementation of pipes, input/output redirection, background processes, signals, interrupt handling, and use of various system calls.

    Implementation of mailbox in NACHOS using semaphores, locks and condition variables.