Aug 4, 2021
Cilium Identity Handling
Cilium is an Identity-aware network policy CNI. Cilium adopts a very different approach at deriving the identities and validating those identities in the data path using eBPF.
Mar 5, 2021
Introduction to Linux Security Modules (LSMs)
LSMs provide rich primitives to enforce system policy settings. This blogs provides introduction to LSMs and covers the core rationale for using it for system's policy enforcement.
Mar 5, 2021
eBPF Groundtruths
eBPF basics, dissecting instruction sets/bytecode, tools ecosystem
Jun 15, 2019
RPL Multi Instances vs Multi-DODAGs
RPL routing protocol has a notion of multiple instances and multiple DAGs. It is easy to get confused between the two. The post goes into the details of differences with use-cases.
Jul 7, 2018
Testing true WiFi speeds
Wifi routers claim Gigabits speed, but is it really possible to get that kind of speeds. I tried checking in local network what is the best speed that can be achieved in regular home conditions.
Jul 7, 2018
Sequence numbers and the use of Lollipop Counters
Lollipop counters are used in network protocols (especially routing protocols) for sequence number operations. The blog talks about the operation of lollipop counter, its advantages and an implementation experience.
Apr 1, 2018
Posix msgq vs SysV msgq
There are key differences between posix msgq and sysv msgq and its hard to tell which one is better. Even though posix msgqs have appeared on the scene later, there are some important design elements in sysv msgq which are not covered in posix msgqs.
Mar 4, 2018
IoT protocol compression
IoT protocols need to be tailored for constrained networks. 6LoWPAN, SCHC, RoHC and other compression schemes are explained.
Dec 8, 2017
Art of WSN Simulation for mesh networks
WSN simulation is an important aspect for IoT network protocol or application development. I ll talk about existing simulation techniques, pit-falls, and then introduce Whitefield-framework I developed.