Friday, February 20, 2009

Crusoe Processor

Transmeta released its Very Long Instruction Word (VLIW) processor Known as the Crusoe processor, it is a hardware-software hybrid that uses a code morphing technique to emulate the x86 architecture. Here software known as Code Morphing Software converts the normal x86 instructions into the native VLIW code. In this technique, software is loaded from the ROM upon boot up and used to control the scheduling of instructions. Compatibility with x86 applications is assured because this software is able to insulate programs from the hardware engine s native VLIW instruction set.

The code morphing technique keeps the core logic design of the Crusoe processor simple and provides a solution for the problems posed by traditional architectures. Avery low power consumption is one of the resultant benefits and this makes the Crusoe most suited for internet appliances and mobile applications.

As modern CPUs became more complex, they tend to have more hardware, and perform more functions than their early RISC predecessors. All that hardware requires lots of power though, and the more power a CPU draws the hotter it gets. When Transmeta designed the Crusoe system they went back to basics. They looked at the entire picture they did not just say how fast could we make this system they said, How efficient can we possibly make this, and still have it run x86 applications acceptably . So instead of having in the past one primary directive they had two. So certain things would have to be traded off to make this the best system possible. The three main things they wanted the system to have was:

1. Full x86 compatibility

2. The lowest possible power consumption

3. A level of x86 application performance that provides for a reasonably good user experience.

imode

The imode is the NTT Do Como s new Internet access system. It is an advanced intelligent messaging service for digital mobile phones and other mobile terminals that will allow you to see Internet content in special text format on special imode-enabled mobile phones. Enabling information access from handheld devices requires a deep understanding of both technical and market issues that are unique to the wireless environment. The imode specification was developed by the industry s best minds to address these issues. Wireless devices represent the ultimate constrained computing device with limited CPU, memory and battery life and a simple user interface. Wireless networks are constrained by low bandwidth, high latency and unpredictable availability and stability.

The imode specification addresses these issues by using the best of existing standards and developing new extensions when needed. The imode solution leverages the tremendous investment in web servers, web development tools, web programmers and web applications while solving the unique problems associated with the wireless domain. The specification ensures that this solution is fast, reliable and secure. The imode specification is developed and supported by the wireless telecommunication community so that the entire industry and its subscribers can benefit from a single, open specification.

NTT DoCoMo: The Creators of imode

NTT DoCoMo is a subsidiary of Japan s incumbent telephone operator NTT. The majority of NTT-DoCoMo s shares are owned by NTT, and the majority of NTT s shares are owned by the Japanese government. NTT-DoCoMo s shares are separately listed on the Tokyo Stock Exchange and on the Osaka Stock Exchange, and NTT-DoCoMo s market value (capitalization) makes it one of the world s most valued companies.

Goals of the imode.

The goals of the imode forum are listed as follows. >>To bring Internet content and advanced data services to wireless phones and other wireless terminals.

>>To develop a global wireless protocol specification that works across all wireless network technologies.

>>To enable the creation of content and applications that scale across a wide range of wireless bearer networks and device types, i.e. to maintain device and bearer independence.

>>To embrace and extend existing standards and technology whenever possible and appropriate.

Web Spoofing

This paper describes an Internet security attack that could endanger the privacy of World Wide Web users and the integrity of their data. The attack can be carried out on today s systems, endangering users of the most common Web browsers, including Netscape Navigator and Microsoft Internet Explorer.

1.1 HISTORY

The concept of IP spoofing was initially discussed in academic circles in the 1980 s. It was primarily theoretical until Robert Morris, whose son wrote the first Internet Worm, discovered a security weakness in the TCP protocol known as sequence prediction. Another infamous attack, Kevin Mitnick s Christmas day, crack of Tsutomu Shimomura s machine, employed the IP spoofing and TCP sequence prediction techniques. While the popularity of such cracks has decreased due to the demise of the services they exploited, spoofing can still be used and needs to be addressed by all security administrators.

1.2 WHAT IS SPOOFING?

Spoofing means pretending to be something you are not. In Internet terms it means pretending to be a different Internet address from the one you really have in order to gain something. That might be information like credit card numbers, passwords, personal information or the ability to carry out actions using someone else’s identity.

IP spoofing attack involves forging one s source address. It is the act of using one machine to impersonate another. Most of the applications and tools in web rely on the source IP address authentication. Many developers have used the host based access controls to secure their networks. Source IP address is a unique identifier but not a reliable one. It can easily be spoofed.

Web spoofing allows an attacker to create a shadow copy of the entire World Wide Web. Accesses to the shadow Web are funneled through the attacker s machine, allowing the attacker to monitor the all of the victim s activities including any passwords or account numbers the victim enters. The attacker can also cause false or misleading data to be sent to Web servers in the victim s name, or to the victim in the name of any Web server. In short, the attacker observes and controls everything the victim does on the Web.

The various types of spoofing techniques that we discuss include TCP Flooding, DNS Server Spoofing Attempts, web site names, email ids and link redirection.

DELAY tolerant networks

Increasingly, network applications must communicate with counterparts across disparate networking environments characterized by significantly different sets of physical and operational constraints; wide variations in transmission latency are particularly troublesome. The proposed Interplanetary Internet (IPN), which must encompass both terrestrial and interplanetary links, is an extreme case. An architecture based on a protocol that can operate successfully and reliably in multiple disparate environments would simplify the development and deployment of such applications.

The Internet protocols are ill suited for this purpose. They are, in general, poorly suited to operation on paths in which some of the links operate intermittently or over extremely long propagation delays. The principle problem is reliable transport, but the operations of the Internet’s routing protocols would also raise troubling issues.

It is this analysis that leads us to propose an architecture based on Internet-independent middleware: use exactly those protocols at all layers that are best suited to operation within each environment, but insert a new overlay network protocol between the applications and the locally optimized stacks. This new protocol layer, called the bundle layer, ties together the region-specific lower layers so that application programs can communicate across multiple regions.

The DTN architecture implements store-and-forward message switching.

A DTN is a network of regional networks, where a regional network is a network that is adapted to a particular communication region, wherein communication characteristics are relatively homogeneous. Thus, DTNs support interoperability of regional networks by accommodating long delays between and within regional networks, and by translating between regional communication characteristics.

Java Ring

A Java Ring is a finger ring that contains a small microprocessor with built-in capabilities for the user, a sort of smart card that is wearable on a finger. Sun Microsystem s Java Ring was introduced at their JavaOne Conference in 1998 and, instead of a gemstone, contained an inexpensive microprocessor in a stainless-steel iButton running a Java virtual machine and preloaded with applets (little application programs). The rings were built by Dallas Semiconductor.

Workstations at the conference had ring readers installed on them that downloaded information about the user from the conference registration system. This information was then used to enable a number of personalized services. For example, a robotic machine made coffee according to user preferences, which it downloaded when they snapped the ring into another ring reader.

Although Java Rings aren t widely used yet, such rings or similar devices could have a number of real-world applications, such as starting your car and having all your vehicle s components (such as the seat, mirrors, and radio selections) automatically adjust to your preferences.

The Java Ring is an extremely secure Java-powered electronic token with a continuously running, unalterable real-time clock and rugged packaging, suitable for many applications. The jewel of the Java Ring is the Java iButton -- a one-million transistor, single chip trusted microcomputer with a powerful Java Virtual Machine (JVM) housed in a rugged and secure stainless-steel case.

The Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in diameter, that houses a 1-million-transistor processor, called an iButton. The ring has 134 KB of RAM, 32 KB of ROM, a real-time clock and a Java virtual machine, which is a piece of software that recognizes the Java language and translates it for the user s computer system.

The Ring, first introduced at JavaOne Conference, has been tested at Celebration School, an innovative K-12 school just outside Orlando, FL. The rings given to students are programmed with Java applets that communicate with host applications on networked systems. Applets are small applications that are designed to be run within another application. The Java Ring is snapped into a reader, called a Blue Dot receptor, to allow communication between a host system and the Java Ring.

Designed to be fully compatible with the Java Card 2.0 standard the processor features a high-speed 1024-bit modular exponentiator fro RSA encryption, large RAM and ROM memory capacity, and an unalterable real time clock. The packaged module has only a single electric contact and a ground return, conforming to the specifications of the Dallas Semiconductor 1-Wire bus. Lithium-backed non-volatile SRAM offers high read/write speed and unparallel tamper resistance through near-instantaneous clearing of all memory when tampering is detected, a feature known as rapid zeroization.

Data integrity and clock function are maintained for more than 10 years. The 16-millimeter diameter stainless steel enclosure accomodates the larger chip sizes needed for up to 128 kilobytes of high-speed nonvolatile static RAM. The small and extremely rugged packaging of the module allows it to attach to the accessory of your choice to match individual lifestyles, such as key fob, wallet, watch, necklace, bracelet, or finger ring.


NAS

Information Technology (IT) departments are looking for cost-effective storage solutions that can offer performance, scalability, and reliability. As users on the network increase and the amounts of data generated multiply, the need for an optimized storage solution becomes essential. Network Attached Storage (NAS) is becoming a critical technology in this environment.

The benefit of NAS over the older Direct Attached Storage (DAS) technology is that it separates servers and storage, resulting in reduced costs and easier implementation. As the name implies, NAS attaches directly to the LAN, providing direct access to the file system and disk storage. Unlike DAS, the application layer no longer resides on the NAS platform, but on the client itself. This frees the NAS processor from functions that would ultimately slow down its ability to provide fast responses to data requests.

In addition, this architecture gives NAS the ability to service both Network File System (NFS) and Common Internet File System (CIFS) clients. As shown in the figure below, this allows the IT manager to provide a single shared storage solution that can simultaneously support both Windows*-and UNIX*-based clients and servers. In fact, a NAS system equipped with the right file system software can support clients based on any operating system.

NAS is typically implemented as a network appliance, requiring a small form factor (both real estate and height) as well as ease of use. NAS is a solution that meets the ever-demanding needs of today s networked storage market.


DNA Computing in security

In today’s world where no modern encryption algorithms are spared of the security breach, the world of information security is on the look out for fresh ideas. Thus came up the new theory of DNA computing in the fields of cryptography and steganography.

Though researches have been done to demonstrate DNA computing and its use in the areas of cryptography, steganography and authentication, the limitations of sophisticated lab requirements, along with high labour cost has still kept DNA computing at bay from today’s security world. But on the other hand DNA authentication has become a great boon.

LonWorks Protocol

A technology initiated by the Echelon Corporation in 1990, the LonWorks provides a platform for the for building industrial, transportation, home automation and public utility control networks to communicate with each other. Built on the Local Operating Network, it uses the LonTalk protocol, in order to have a peer to peer communication with each other, with out actually having a gateway or other hardware.

CELL PHONE VIRUSES AND SECURITY

As cell phones become a part and parcel of our life so do the threats imposed to them is also on the increase. Like the internet, today even the cell phones are going online with the technologies like the edge, GPRS etc. This online network of cellphones has exposed them to the high risks caused by malwares viruses, worms and Trojans designed for mobile phone environment. The security threat caused by these malwares are so severe that a time would soon come that the hackers could infect mobile phones with malicious software that will delete any personal data or can run up a victim s phone bill by making toll calls.

All these can lead to overload in mobile networks, which can eventually lead them to crash and then the financial data stealing which poises risk factors for smart phones. As the mobile technology is comparatively new and still on the developing stages compared to that of internet technology, the anti virus companies along with the vendors of phones and mobile operating systems have intensified the research and development activities on this growing threat, with a more serious perspective.