Thursday, 14 March 2019

Looking for difference between TACACS+ and RADIUS??

The Advantages of TACACS+ for Administrator Authentication Centrally manage and secure your network devices with one easy to deploy solution. IT departments are responsible for managing many routers, switches, firewalls, and access points throughout a network. They need to be able to implement policies to determine who can log in to manage each device, what operations they can run, and log all actions taken. Managing these policies separately on each device can become unmanageable and lead to security incidents or errors that result in loss of service and network downtime. Most compliance requirements and security standards require using standardized tools to centralize authentication for administrative management. Some vendors offer proprietary management systems, but those only work on that vendor's devices, and can be very expensive. Many IT departments choose to use AAA (Authentication, Authorization and Accounting) protocols RADIUS or TACACS+ to address these issues. These protocols enable you to have all network devices managed by a single platform, and the protocols are already built in to most devices. For more information, visit www.tacacs.net. | © 2011 TACACS.net 1 Protocol Differences RADIUS was designed to authenticate and log dial-up remote users to a network, and TACACS+ is used most commonly for administrator access to network devices like routers and switches. This is indicated in the names of the protocols. RADIUS stands for Remote Access Dial-In User Service, and TACACS+ stands for Terminal Access Controller Access Control Service Plus. The primary functional difference between RADIUS and TACACS+ is that TACACS+ separates out the Authorization functionality, where RADIUS combines both Authentication and Authorization. Though this may seem like a small detail, it makes a world of difference when implementing administrator AAA in a network environment.

RADIUS can include privilege information in the authentication reply; however, it can only provide the privilege level, which means different things to different vendors. Because there is no standard between vendor implementations of RADIUS authorization, each vendor’s attributes often conflict, resulting in inconsistent results. Even if this information were consistent, the administrator would still need to manage the privilege level for commands on each device. This will quickly become unmanageable. RADIUS doesn’t log the commands used by the administrator. It will only log the start, stop, and interim records of that session. This means that if there are two or more administrators logged at any one time, there is no way to tell from the RADIUS logs which administrator entered which commands.

RADIUS was designed for subscriber AAA, and TACACS+ is designed for administrator AAA. RADIUS can still be used for small network administrator AAA, but only if authorization is not required, or if it is a homogeneous network (all one vendor). In any scenario where there is a heterogeneous environment or authorization policies are required for network devices, TACACS+ is the best option.  

Summary

  • RADIUS is designed for subscriber AAA, 
  • TACACS+ is designed for administrator AAA. 
  • TACACS+ includes per-command authorization and logging. 
  • TACACS+ enables you to set access policies by user, device, location, or time of day. 
  • The TACACS+ protocol is supported by most enterprise and carrier-grade devices. 
  • TACACS+ and RADIUS services should not be installed on the same server because it can reduce security and increase complexity and licensing costs. 
  • TACACS+ should be deployed in a fully-trusted, internal network to increase security and simplify management. 
  • TACACS+ should be installed as close to the user database as possible, preferably on the same server to minimize points of failure and increase performance.
Reference : https://tacas.net and https://freeradius.org

Friday, 14 September 2018

How to add live pages, timeliness and create polls in presentation??


This presentation has been made on MS PowerPoint with add on installed Office Timelines and Liveslide. Test your internet connectivity before using live webpages and Poll.





Go to the Office Timeline tab and click on import data from excel in which project timeliness are prepared.




Choose from the templates available in this tab and chart is plotted accordingly.



Now got to the Liveslides tab, click live slide, Copy the url of the webpage.



After clicking Insert the slide should look like this.



Once you go to the slide show the webpage should appear as per the connectivity speed.


Similarly we can create audience poll by clicking poll slide, for first time users pls create your account. A temporary link is created for creating poll page.





During presentation click on activate in order to start polling and results can be viewed live.






Thursday, 6 September 2018

Bhangra for Beginners

Class 1:
Single Dhamal
Motion is divided in 2 parts.
Upper Body- You need to a huge U with yours Arms and hand with OM position of fingers.
Lower Body-  Roll Your Left Knee in 45 degree and tap your right keg and then flip.


Working with SNMP and SNMP Traps

You may wonder that how to monitor the Huge servers, storage's, network devices and other critical IT infrastructure!!

There come SNMP  to our rescue. Simple Network Management Protocol (SNMP) is an application-layer protocol used to manage and monitor network devices and their functions. SNMP provides a common language for network devices to relay management information within single- and multivendor environments in a local area network (LAN) or wide area network (WAN).

If count on fingures we can monitor routers, switches and wireless access points to endpoints like printers, scanners and internet of things (IoT) devices etc to DNS, Network managers etc. How does SNMP works??

Simply we need three things:
1. Agent on Device/End Point/Apllication

2.  SNMP Server (NMS) to collect information/Traps

3. Management Information Base (MIB)- This database is a text file (.mib) that itemizes and describes all objects used by a particular device that can be queried or controlled using SNMP. This database must be loaded into the NMS so that it can identify and monitor the status of these properties. Each MIB item is assigned an object identifier (OID).

# We are mapping the Object (like Ping Response, UpTime etc) in the server and establishing connections between the agent installed on the end device. 

SNMP agents send UDP/TCP packet to NMS wrt to the OID mapped.Following messages are sent :

  • GET: Generated by the SNMP manager and sent to an agent to obtain the value of a variable, identified by its OID, in an MIB .
  • RESPONSE: Sent by the agent to the SNMP manager, issued in reply to a GET request. Contains the values of the requested variables.
  • GETNEXT: Sent by the SNMP manager to agent to retrieve the values of the next OID in the MIB's hierarchy.
  • GETBULK: Sent by the SNMP manager to the agent to obtain large tables of data by performing multiple GETNEXT commands.
  • SET: Sent by the SNMP manager to the agent to issue configurations or commands.
  • TRAP: An asynchronous alert sent by the agent to the SNMP manager to indicate a significant event, such as an error or failure, has occurred.
The SNMPv1 SMI defines highly structured MIB tables that are used to group objects that contain multiple variables. Tables contain zero or more rows, which are indexed, so SNMP can retrieve or alter an entire row with a supported command.

SNMPv2c functions within the specifications of SMI. MIB modules contain definitions of interrelated managed objects. The operations that are used in SNMPv1 are similar to those that are used in SNMPv2. The SNMPv2 trap operation, for example, serves the same function as that used in SNMPv1, but it uses a different message format and replaces the SNMPv1 trap.

The most recent iteration of SNMP, version 3, includes security enhancements that authenticate and encrypt SNMP messages as well as protect packets during transit. 

References:
  1. https://searchnetworking.techtarget.com/definition/SNMP
  2. https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cucm/managed_services/8_6_1/cucm/managed_services/snmp.pdf

Tuesday, 31 July 2018

Design & Analysis of Low Power VCO for VLSI & Communication System Complete Book

The explosive growth in portable systems, laptops and cellular networks has intensified the research efforts in low-power microelectronics. This is because VLSI technology allows circuits with more and more functionality to be integrated in a single chip. Such rapid technology developments revolutionized digital electronics, thereby fuelling one of the fastest growing markets ever observed. This revolution has also benefitted communication devices as well, such as amplifiers, Voltage Control Oscillators (VCO), filters etc, although at a slower pace due to the many challenges in adapting to degrading device characteristics. The common performance parameter to be improvised is power requirement. In particular, the tough requirements imposed by cellular phone applications have been a key driver for VCO research. So VCO is still a challenging component for designers. In light of the above trends, the main goal of this work would be to identify successful measures for narrow band and wideband low-power, low-noise frequency synthesis.


The complete book is available on the link given below:


  1. https://www.amazon.fr/Design-Analysis-Power-Communication-System/dp/6139892007
  2. https://www.lap-publishing.com/catalog/details/store/es/book/978-613-9-89200-6/design-analysis-of-low-power-vco-for-vlsi-communication-system?search=dhrub
  3. https://www.amazon.com.br/Design-Analysis-Power-Communication-System/dp/6139892007


Wednesday, 20 June 2018

Using Cluster URL for Failover & Load Balancing

                           Using Cluster URL for Failover & Load Balancing


URLs used on the WWW uses protocol specified by :, for example, "http:"

A CORBA (JAVA) product may optionally support the "http:" formats. 
All CORBA products must support "corbaloc:" and "corbaname:", which are two URLs defined. The purpose of these is to provide a url address which can be read by Human.

Some examples of corbaloc URLs are shown below:

  • corbaloc:iiop:Host1:2809,iiop:Host2:2809/FileNet/Engine-- This URL can be used for the two or more different host URL.
  •  iiop then the default version of IIOP that is used is 1.0. It is advisable to specify the most recent version of IIOP that is understood by both the client and server application.
  • The default port number is 2809.
  • Similary this can be used for a host and virtual url for a cluster.Example is given below:
  • corbaloc:iiop:Host1:2809,iiop:Cluster Virtual Host:9810/cell/clusters/ECM_Cluster/FileNet/Engine
  • The default port number for cluster url is 9810.

Thanks
Dhrub Solanki




Reference:
  1. http://www.ciaranmchale.com/corba-utilities/the-corbaloc-and-corbaname-urls.html




Sunday, 14 September 2014

http://post.jagran.com/Drinking-tea-in-plastic-cup-makes-you-vulnerable-to-cancer-1301388298

Drinking tea in plastic cup makes you vulnerable to cancer
Do you take tea in a plastic cup which is brought in colourful polythene bags? Do you consume food which is packed in polythene? If it is so, shun this practice, otherwise you will contract serious liver and kidney disease or even cancer.
Polythene bags or plastic cups available in markets are re-cycled which is made with the help of a poisonous chemical-Bisphenol-A. According to various tests conducted so far, this compound has been proved cancerous.
Apart from Bisphenol-A, other chemicals that are used in giving colour to plastics are also toxic. Whether it is keeping hot tea or a cold item in a plastic cup, both are equally harmful and the toxic chemicals get mixed with them.
According to Dr Bir Singh in AIIMS Community Medicine Department, consuming stuff in colourful and white recycled plastic jars or cups can also be hazardous.
The Bisphenol-A is harmful for children as well as pregnant women. It can lead to breast cancer in women and also become a reason for miscarriages. It can affect fertility in males as well.
Former AIIMS Neuro specialist who is presently with Artimus Hills Institute in Gurgaon, Dr Praveen Gupta said that toxic chemicals enter body through consuming foods packed in plastic bags. It affects the brain activity. This can also affect memory power in children, he said.
Kindly show your responsibility towards a clean bharat by just saying no to plastic, in any form. Further if u have any innovative idea regarding same please spread it.

Regards
Responsible Bharatiya


Follow: http://chaitanyabharat414.blogspot.in/     Courtesy:   Jagran Post Editorial, 29 Mar 2011 

Friday, 15 June 2012

Design and Analysis of LC-VCO Using MEMS Spiral Inductor

This paper presents an integrated inductance-capacitance voltage controlled oscillator (LC-VCO) design. The design of the spiral inductor has been optimized. Thereafter, it is integrated with the main circuit. VCO is designed so that it provides high degree of functionality while maximizing performance over environmental conditions. The VCO model provides a low phase noise, low power and high frequency solution. The designed VCO shall be useful for ultra wideband and communication application.

Keywords: Inductance Capacitance- Voltage Controlled Oscillator, Low power, MEMS Inductor.

Author : Dhrub Solanki, Rajeevan Chandel, Tafseer Alam and Atul Nishad
Volume : No.2 (2011) Issue No. :1 (2011)
Pages : 47-51
Paper Link: http://www.serialsjournals.com/articles.php?volumesno_id=276&journals_id=148&volumes_id=461

Sunday, 1 May 2011

Design of LC-VCO for low power narrowband electronic applications


Abstract:

A low power, low phase-noise Inductance Capacitance voltage controlled 
oscillator (LC-VCO) is demonstrated on 180 nm CMOS Technology node. 
By using external current biasing it is not feasible to obtain low power 
and noise characteristic simultaneously. Therefore, low power and low phase 
noise characteristics are achieved by using the current mirror is being used. 
Also to reduce the power modifications is being done in the traditional LC-VCO structure. 
The VCO designed is operating at 12.5 GHz with tuning range of 7.75% which will useful for
wireless narrowband applications. The phase noise attained is -117 dBc/Hz at 1 kHz offset 
from 12.5 GHz oscillation frequency. The power dissipation is 0.1114 mW for 1.8 V supply 
voltage. The figure of merit for this LC-VCO is nearly 175. The present oscillator is the 
best amongst the various CMOS oscillators referred to from literature in terms of the power dissipation.



INTRODUCTION

According to recent developments in the design of radio frequency (RF) front-end modules 
is implementation of low power, low phase noise voltage controlled oscillators (VCOs). 
So it is said that there is immense scope of research for design of LC-VCO [1]–[3]. 
Long has used NMOS as a biasing current source to design 2.4GHz Low-Power Low-Phase VCO [4]. 
Bond wire inductor is being utilized by Ahrens and Lee for a 1.4GHz, 3mW CMOS LC low phase noise
VCO [5]. Ham and Hajimiri, proposed an optimized LC-VCO with just 2GHz oscillating frequency [6]. 
5.8 GHz fully integrated low power, low phase noise designed by Bhattacharjee et al [7]. 
Song and Yoon demonstrated a 1-V 5 GHz Low Phase Noise LC-VCO by Using Voltage-Dividing 
and Bias-Level Shifting Technique [8]. Moon et al used a Small VCO-Gain Variation to design 
4.39–5.26 GHz LC-Voltage-Controlled Oscillator [9]. Very recently Issa et al demonstrated 
Graphical Optimization and optimized a 4GHz CMOS LC-VCO [10]. But all above LC-VCO dissipates 
the power in some mill-watts. Our work would be to reduce the power as below as possible.
 As if it results in the lower tuning range also it will particularly useful for the low power 
 applications as well as the cellphone industrial applications.





Details @ https://ieeexplore.ieee.org/document/5940827/

Published in: 2011 2nd International Conference on Wireless Communication, Vehicular Technology, 
Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE)

Date of Conference: 28 Feb.-3 March 2011

Date Added to IEEE Xplore: 05 July 2011

ISBN Information:



INSPEC Accession Number: 12094491

DOI: 10.1109/WIRELESSVITAE.2011.5940827

Publisher: IEEE