• Vaguely Related to ETC

    Cyber Security

    Cybercrime may emerge from local, remote, domestic or foreign sources. Security Breach A security breach is defined as leakage of information, digital data that’s supposed to be private to a person. Whenever this data is compromised, due to malicious or accidental attack the integrity of the data is compromised. Privacy Key Dimensions Informational privacy Personal privacy Communication privacy Territorial privacy…

  • Vaguely Related to ETC

    Memorising Stuff In Computer Networks

    OSI Layers All People Some Time Need Data Processing MAC Frame Paula Shouted Directly Saying Let’s Dance Cargo? Blutooth Layers Bluetooth Frame format Classful Addressing IPv4 Header Virginia Helen Decides Today In France Flying to Portugal Had Significant Debts Opened TCP Header mnemonics : Should Dean Scold All Hundred Righteous Folks, We Could Urgently Take Them Down Unskilled = URGAttackers…

  • Vaguely Related to ETC

    Network Security : Master Post

    IP security : IPSec is a collection of protocols designed by the internet engineering task force to provide security for a packet at the network level. IPSec operates in one of two different modes: transport mode or tunnel mode. IPSec in transport mode does not protect the IP header, it only protects the payload coming from transport layer. The sending…

  • Vaguely Related to ETC

    Data Security : Master Post

    Information hidden from unauthorised access – Confidentiality Information protected from unauthorised change – Integrity Information entity from unauthorised bandwitdth hijacking – Availability Threat to Confidentiality Snooping – Someone wants to look through your data Traffic Analysis Threat to Intrgrity Modification Masquerading Replaying Repudiation Threat to Availability Denial of Service DoS Ceasar Cipher is one of the examples of Symmetric cipher.…

  • Vaguely Related to ETC

    Transport and Application: Master Post

    TCP features Numbering System – Sequence number and the acknowledgment number refer to the byte number Byte Number TCP numbers all data bytes that are transmitted in a connection Sequence Number After the bytes have been numbered, TCP assigns a sequence number to each segment that is being sent. The sequence number for each segment is the number of the…

  • Vaguely Related to ETC

    Verilog: Master Post

    Data Types Register variables store the last value that was procedurallyassigned to them wire variables represent physical connections between structural entities such as gates – does not store anything, only a label on a wire Verilog Constructs and Modeling Styles You can write module at four levels of abstractions Behavioural (Algorithmic like C) Dataflow (How data flows between resistors) Gate…

  • Vaguely Related to ETC

    Parasitic Capacitance Models

    Capacitance generated between Channel(Source, Drain, Bulk) and Gate. In cutoff there isn’t any channel present and therefore there is Cgc between gate and body. In linear region inversion layer if formed. The Layer is between source and drain. Thus gate to body capacitance is 0 and total Cgc is distributed evenly between source and drain. In saturation mode, channel is…

  • Vaguely Related to ETC

    Programmable Logical Device

    Programmable Logical Device : A programmable logic device (PLD) is an electronic component used to build reconfigurabledigital circuits. Unlike integrated circuits (IC) which consist of logic gates and have a fixed function, a PLD has an undefined function at the time of manufacture.[1] Before the PLD can be used in a circuit it must be programmed (reconfigured) by using a specialized program CPLDs can replace thousands, or even hundreds of thousands,…