Posts

Showing posts from July 10, 2010

Routing Protocols

Image
ROUTING BASICS The term routing is used for taking a packet from one device and sending it through the network to another device on a different network      For routing a router must know following things Ø   Destination address Ø   Neighbour routers from which it can learn about remote networks, Possible routes to all remote networks Ø   The best route to each remote network Ø   How to maintain and verify routing information Ø   They are the set of rules used by a router when it communicates routing information between neighboring router Ø   Routing protocols use metrics to evaluate what path will be the best for a packet to travel Ø     A metric is a standard of measurements; such as path bandwidth, reliability, delay, current load on that path etc; i.e  used by routing algorithms to determine the optimal path to a destination. Desirable properties of a router •        Correctness and simplicity: The packets are to be correctly delivered. Simpler the routing algorithm, it is bette

AUDIO SPOTLIGHTING

Image
INTRODUCTION n   Audio spot lighting is a very recent technology that creates focused beams of sound similar to light beams coming out of a flashlight. By ‘shining’ sound to one location, specific listeners can be targeted with sound without others nearby hearing it, ie to focus sound into a coherent and highly directional beam. It uses a combination of non-linear acoustics and some fancy mathematics. But it is real and is fine to knock the socks of any conventional loud speaker. n   The Audio Spotlight & Hyper Sonic Sound Technology (developed by American Technology Corporation), uses ultrasonic energy to create extremely narrow beams of sound that behave like beams of light. Audio spotlighting exploits the property of non-linearity of air. When inaudible ultrasound pulses are fired into the air, it spontaneously converts the inaudible ultrasound into audible sound tones, hence proved that as with water, sound propagation in air is just as non-linear, and can be calculated math

Encryption

Image
Introduction •        Cryptography is a method of storing and transmitting data in a form that only those it is intended for can read and process. It is a science of protecting information by encoding it into an unreadable format. Cryptography is an effective way of protecting sensitive information as it is stored on media or transmitted through network communication paths. Although the ultimate goal of cryptography, and the mechanisms that make it up, is to hide information from unauthorized individuals, most algorithms can be broken and the information can be revealed if the attacker has enough time, desire, and resources. So a more realistic goal of cryptography is to make obtaining the information too work-intensive to be worth it to the attacker •        Encryption is the conversion of data into a form, called cipher text,  that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form , called plaintext