-
Update Service Protocol :
Designed, Implemented and Evaluated an application-level protocol that periodically
sends an update message from the server to a group of registered clients via the
Internet.
-
Smart Switch :
Developed and Evauated an algorithm using csim for trading-off between performance (delay)
and energy comsumption in a system that consists of two links (100Mbps drawing
1W and 1Gbps drawing 10W).
-
Broadcast Traffic Characterization :
Characterized the broadcast traffic received on the Ethernet port of the campus LAN,
focusing on the overhead on the network bandwidth and processing delays at the host.
-
Translation Lookaside Buffer (TLB):
By determining the time taken to access the TLB (recording both hits and misses), the
size of the TLB was ascertained.Developed in C, this project focused on the TLB hierarchy,
disabling compiler optimization to get accurate results and determine the size of the TLB.
-
File System Parameters:
The underlying file system plays a key role in the performance of the system. In this
project, the various file system parameters were determined such as block size of the
disk, the number of direct pointers, file cache size and size of the prefetched data has
been recorded, using C. Based on these results, one could determine the file system
being used.
-
Optimized Search in large databases:
Developed an algorithm in Java, that used quad trees to optimally search for a particular
element in a large unsorted database. By constructing a k-d tree from the unsorted data,
the search was restricted to only those buckets that contained the element. Gene and MRA
data for a sample set of people was used to test the algorithm and Pearsons coefficient was
used as distance measure.
-
Buffer Management in Postgres SQL:
Implemented the Least Recently Used (LRU) policy for buffer management in Postgres SQL, which
replaced the clock replacement policy that was already implemented in Postgres 8.2.1.
-
Network Interdiction in cybersecurity
Investigated the various interdition models in graph theory and their application in cybersecurity.
Implemented a branch and bound algorithm using iGraphs, that solves the shortest path network interdiction model -
focusing on the application of such an approximation solution in cybersecurity in smart grids.
-
PA-UDP
Developed a UDP protocol that enabled high speed bulk data transfer, using a rate control algorithm. This
algorithm was developed in Java, in collaboration with the Aeronautical Defence Establishment, Bangalore as
a final year undergraduate project.