ENGINEERS | ENGINEERING JOBS | ENGINEERING COLLEGES

Monday 29 July 2013

REPORT ON CODNS REPORT

CLICK HERE TO DOWNLOAD REPORT ON CODNS REPORT
CODNS   Report Transcript
 INTRODUCTION Translation of names to network addresses is an essential predecessor to communication in networked systems. The Domain Name System (DNS) performs this translation on the Internet and constitutes a critical component of the Internet infrastructure. While the DNS has sustained the growth of the Internet through static, hierarchical partitioning of the namespace and wide-spread caching, recent increases in malicious behavior, explosion in client population, and the need for fast reconfiguration pose difficult problems. The existing DNS architecture is fundamentally unsuitable for addressing these issues. The foremost problem with DNS is that it is susceptible to denial of service (DoS) attacks.
This vulnerability stems from limited redundancy in name servers, which pro-vide name-address mappings and whose overload, failure or compromise can lead to low performance, failed lookups and misdirected clients. Approximately 80% of the domain names are served by just two name servers and a surprising 0.8% by only one. At the network level, all servers for 32% of the domain names are connected to the Internet through a single gateway, and can thus be compromised by a single failure. The top levels of the hierarchy are served by a relatively small number of servers,
which serve as easy targets for denial of service attacks. A recent DoS attack on the DNS crippled nine of the thirteen root servers at that time, while another recent DoS attack on Microsoft’s DNS servers severely affected the availability of Microsoft’s web services for several hours .DNS name servers are easy targets for malicious agents, partly because approximately 20% of name server implementations contain security flaws that can be exploited to take over the name servers. Second, name-address translation in the DNS incurs long delays. Recent studies have shown that DNS lookup time contributes more than one second for up to 30% of web object retrievals.
The explosive growth of the namespace has decreased the effectiveness of DNS caching. The skewed distribution of names under popular domains, such as .com, has attended the name hierarchy and increased load imbalance. The use of short timeouts for popular map-pings, as is commonly employed by content distribution net-works, further reduces DNS cache hit rates. Further, manual configuration errors, such as lame delegations, can introduce latent performance problems. Finally, widespread caching of mappings in the DNS prohibits fast propagation of unanticipated changes. Since the DNS does not keep track of the locations of cached map-pings, but relies on timeout-based invalidations of stale co-pies, it cannot guarantee cache coherency. Lack of cache coherency in the DNS implies that changes may not be visible to clients for long durations,
effectively preventing quick service relocation in response to attacks or emergencies. Fresh design of the legacy DNS provides an opportunity to address these shortcomings. A replacement for the DNS should exhibit the following properties. High Performance: Decouple the performance of DNS from the number of name servers. Achieve lower latencies than legacy DNS and improve lookup performance in the presence of high loads and unexpected changes in popularity Resilience to Attacks: Remove vulnerabilities in the system and provide resistance against denial of service attacks through decentralization and dynamic load balancing. Self-organize automatically in response to host and network failures.
Fast Update Propagation: Enable changes in name-address mappings to quickly propagate to clients. Support secure delegation to preserve integrity of DNS records, and prohibit rogue nodes from corrupting the system. This paper describes Cooperative Domain Name System (CoDoNS), a backwards-compatible replacement for the legacy DNS that achieves these properties. CoDoNS com-bines two recent advances, namely, structured peer-to-peer overlays and analytically informed proactive caching. Structured peer-to-peer overlays, which create and maintain a mesh of cooperating nodes, have been used previously to implement wide-area distributed hash tables (DHTs). While their self organization, scalability, and failure resilience provide a strong foundation for robust large-scale distributed services, their high lookup costs render them inadequate for demanding,
latency-sensitive applications such as DNS]. CoDoNS achieve high lookup performance on a structured overlay through an analytically-driven proactive caching layer. This layer, called Beehive, automatically replicates the DNS mappings throughout the network to match anticipated demand and provides a strong performance guarantee. Specially, Beehive achieves targeted average lookup latency with a minimum number of replicas. Overall, the combination of Beehive and structured overlays provides the requisite properties for a large scale name service, suitable for deployment over the Internet. 2. DNS: OPERATION AND PROBLEMS 2.1 Overview of Legacy DNS The legacy DNS is organized as a static, distributed tree. The namespace is hierarchically partitioned into non-overlapping regions called domains. For example, cs.cornell.edu is a sub-domain of the domain cornell.edu, which in turn is a sub-domain of the top-level domain edu. Top-level domains are sub-domains of a global root domain .Domain names, such as www.cs.cornell.edu, belong to name-owners Name Resolution in Legacy DNS: Resolvers translate names to addresses by following a chain of Delegations iteratively (2-5) or recursively (6-9). Extensible data structures, called resource records, are used to associate values of different types with domain names. These values may include the corresponding IP address, mail host, owner name and the like. The DNS query interface al-lows these records to be retrieved by a query containing a domain name and a type. The legacy DNS delegates the responsibility for each do-main to a set of replicated name servers called authoritative name servers. The authoritative name servers of a domain manage all information for names in that domain,
keep track of authoritative name servers of the sub-domains rooted at their domain, and are administered by namespace operators. At the top of the legacy DNS hierarchy are root name servers, which keep track of the authoritative name servers for the top level domains (TLDs). The top-level domain namespace consists of generic TLDs (gTLD), such as .com, .edu, and .net, and country-code TLDs (ccTLD), such as .uk, .tr, and .in. Name servers are statically configured with thirteen IP addresses for the root servers. BGP-level anycast is used in parts of the Internet to reroute queries destined for these thirteen IP addresses to a local root server. Resolvers in the legacy DNS operate on behalf of clients to map queries to matching resource records. Clients typically issue DNS queries to local resolvers within their own administrative domain. Resolvers follow a chain of authoritative name servers in order to resolve the query. The local resolver contacts a root name server to _nd the top-level domain name server. It then issues the query to the TLD name server and obtains the authoritative name server of the next sub-domain. The authoritative name server of the sub-domain replies with the response for the query. This process continues recursively or iteratively until the authoritative name server of the queried domain is reached. Figure 1 illustrates the different stages in the resolution of an example domain name www.cs.cornell.edu. While this figure provides a simple overview of the communication involved in name resolution, in practice, each query may trigger additional lookups to resolve intermediate name servers. Pursuing a chain of delegations to resolve a query naturally incurs significant delay. The legacy DNS incorporates aggressive caching in order to reduce the latency of query resolution.
The resolver cache responses to queries they is-sue, and use the cached responses to answer future queries. Since records may change dynamically, legacy DNS provides a weak form of cache coherency through a time-to-live (TTL) field. Each record carries a TTL assigned by the authoritative name server, and may be cached until TTL expires. 2.2 Problems with Legacy DNS Failure Resilience - Bottlenecks The legacy DNS is highly vulnerable to network failures, compromise by malicious agents, and denial of service at-tacks, because domains are typically served by a very small number of name servers. We first examine the delegation bottlenecks in DNS; a delegation bottleneck is the minimum number of name servers in the delegation chain of each do-main that need to be compromised in order to control that domain. Table 1 shows the percentage of domains that are bottlenecked on different numbers of name servers. 78.63% of domains are restricted by two name servers; the minimum recommended by the standard surprisingly, 0.82% of domains are served by only one name server. Even the highly popular domains are not exempt from severe bottlenecks in their delegation chains. Some domains (0.43%) spoof the minimum requirement by having two name servers map to the same IP address.
Overall, over 90% of domain names are served by three or fewer name servers and can be disabled by relatively small-scale DoS attacks. Failure and attack resilience of the legacy DNS is even more limited at the network level. We examined physical bottlenecks, that is, the minimum number of network gateways or routers between clients and name servers that need to be compromised in order to control that domain. We measured the physical bottlenecks by performing trace routes to 10,000 different name servers, which serve about 5,000 randomly chosen domain names, from fifty globally distributed sites on Planet Lab. Figure 2 plots the percentage of domains that have different numbers of bottlenecks at the network level, and shows that about 33% of domains are bottlenecked at a single gateway or router.
While this number is not surprising - domains are typically served by a few name-servers, all located in the same sub-network. It highlights that a large number of domains are vulnerable to network outages. These problems are significant and affect many top level domains and popular web sites. Recently, Microsoft suffered a DoS attack on its name servers that rendered its services unavailable. The primary reason for the success of this attack was that all of Microsoft’s DNS servers were in the same part of the network. Overall, a large portion of the namespace can be compromised by infiltrating a small number of gateways or routers. FIGURE-2 Failure Resilience - Implementation Errors The previous section showed that legacy DNS suffers from limited redundancy and various bottlenecks. In this section, we examine the feasibility of attacks that target these bottle-necks through known vulnerabilities in commonly deployed name servers. Early studies identified several implementation errors in legacy DNS servers that can lead to compromise. While many of these have been fixed, a significant percentage of name servers continue to use buggy implementations.
We surveyed 150,000 name servers to determine if they contain any known vulnerabilities, based on the Berkeley Internet Name Daemon (BIND) exploit list maintained by the Internet Systems Consortium (ISC). Table 2 summarizes the results of this survey. Approximately 18% of servers do not respond to version queries, and about 14% do not report valid BIND versions. About 2% of name serves have the tsig bug, which permits a buffer overflow that can enable malicious agents to gain access to the system. 19% of name serves have the negcache problem that can be exploited to launch a DoS attack by providing negative responses with large TTL value from a malicious name server. Overall, exploiting the bottlenecks identified in the previous section is practical. Table2-Vunrabilities in BIND Performance - Latency Name resolution latency is a significant component of the time required to access web services. . The low performance is due mainly to low cache hit rates, stemming from the heavy tailed, Zipf-like query distribution in DNS. It is well known from studies on Web caching that heavy-tailed query distributions severely limit cache hit rates. Wide-spread deployment of content distribution networks, which perform dynamic server selection, have further strained the performance of the legacy DNS. A study on impact of short TTLs on caching shows that cache hit rates decrease significantly for TTLs lower than fifteen minutes. Another study on the adverse effect of server selection reports that name resolution latency can increase by two orders of magnitude. Performance - Misconfigurations DNS performance is further affected by the presence of a large number of broken (lame) or inconsistent delegations. In our survey,
address resolution failed for about 1.1% of name servers due to timeouts or non-existent records, mostly stemming from spelling errors. For 14% of domains, authoritative name servers returned inconsistent responses; a few authoritative name servers reported that the domain does 334 not exist, while others provided valid records. Failures stemming from lame delegations and timeouts can translate into significant delays for the end-user. Since these failures and inconsistencies largely stem from human errors,
it is clear that manual configuration and administration of such a large scale system is expensive and leads to a fragile structure. Performance - Load Imbalance DNS measurements at root and TLD name servers show that they handle a large load and are frequently subjected to denial of service attacks. A massive distributed DoS attack in November 2002 rendered nine of the thirteen root servers unresponsive. Partly as a result of this attack, the root is now served by more than sixty name servers and is served through special-case support for BGP-level any-cast. While this approach fixes the superficial problem at the topmost level,
the static DNS hierarchy fundamentally implies greater load at the higher levels than the leaves. The special-case handling does not provide automatic replication of the hot spots, and sustained growth in client population will require continued future expansions. In addition to creating exploitable vulnerabilities, load imbalance poses performance problems, especially for lookups higher in the name hierarchy. Update Propagation Large-scale caching in DNS poses problems for maintaining the consistency of cached records in the presence of dynamic changes. Selection of a suitable value for the TTL is an administrative dilemma; short TTLs adversely affect the lookup performance and increase network load, while long TTLs interfere with service relocation. For instance, a popular on line brokerage firm uses a TTL of thirty minutes. Its users do not incur DNS latencies when accessing the brokerage for thirty minutes at a time, but they may experience outages of up to half an hour if the brokerage firm needs to relocate its services in response to an emergency. Nearly 40% of domain names use TTLs of one day or higher, which prohibits fast dissemination of unanticipated changes to records. 3. COOPERATIVE DOMAIN NAMESYSTEM 3.1 Overview of Beehive CoDoNS derives its performance characteristics from a proactive caching layer called Beehive . Beehive is a proactive replication framework that enables prefix-matching DHTs to achieve O(1) lookup performance. In these DHTs both objects and nodes have randomly assigned identifiers from the same circular space, and each object is stored at the nearest node in the identifier space, called the home node. Each node routes a request for an object, say 2101, by successively matching prefixes; that is, by routing the re-quest to a node that matches one more digit with the object until the home node, say 2100, is reached. Overlay routing by matching prefixes in this manner incurs O(logN) hops in the worst case to reach the home node. Figure 3 illustrates the prefix matching routing algorithm in Pastry.
A routing table of O(logN) size provides the overlay node with pointers to nodes with matching prefixes. In a large system, logN translates to several hops across the Internet and is not sufficient to meet the performance requirements of latency critical applications such as DNS. Beehive proposes a novel technique based on controlled proactive caching to reduce the average lookup latency of structured DHTs. Figure 3 illustrates how Beehive applies proactive caching to decrease lookup latency in Pastry.
In the example mentioned above, where a query is issued for the object 2101, Pastry incurs three hops to find a copy of the object. By placing copies of the object at all nodes one hop prior to the home node in the request path, the lookup latency can be reduced by one hop. In this example, the lookup latency can be reduced from three hops to two hops by replicating the object at all nodes that start with 21. Similarly, the lookup latency can be reduced to one hop by replicating the object at all nodes that start with 2. Thus, we can vary the lookup latency of the object between 0 and logN hops by systematically replicating the object more extensively. In Beehive, an object replicated at all nodes with i matching prefixes incurs i hops for a lookup, and is said to be replicated at level i.
Share this post
  • Share to Facebook
  • Share to Twitter
  • Share to Google+
  • Share to Stumble Upon
  • Share to Evernote
  • Share to Blogger
  • Share to Email
  • Share to Yahoo Messenger
  • More...

0 comments

:) :-) :)) =)) :( :-( :(( :d :-d @-) :p :o :>) (o) [-( :-? (p) :-s (m) 8-) :-t :-b b-( :-# =p~ :-$ (b) (f) x-) (k) (h) (c) cheer

Labels

.PDF (2) 3D TECHNOLOGY (1) 3G (1) 4G (1) 4G TECHNOLOGY (1) 8085 MICROPROCESSOR (2) A CASE STUDY ON METHOD STUDY (1) ABAP (1) AC SUPPLY SYSTEM (1) ADDRESSING MODE (1) ADITYA CEMENT (1) ADMIXTURES (2) ADO.NET (1) Advance Processor (1) AERODYNAMIC DESIGN (1) AES (1) AGGREGATES (1) AICTE (1) AIR & DRAFT SYSTEM (2) AIR POLLUTION AND ITS LEGISLATIONS (1) Air Traffic Control (1) Airtel Mobile Service (2) AJAX (3) ALCOHOL (1) AMF PANEL (1) ANALOG AND DIGITAL FILTERS (1) ANALOG TO DIGITAL (1) Android (4) ANGLE MODULATION (1) ANIMATION (1) ANTENNA FUNDAMENTALS (1) APPLICATION DEVELOPMENT (1) APPLICATION OF NON CONVENTIONAL AND RENEWABLE ENERGY SOURCES (1) Application Programming Java (1) APPLICATIONS OF ASP.NET (1) Aricent Technologies (1) ARITHMETIC OPERATORS (1) ARM ARCHITECTURE (1) ARM Instruction Sets And Programs (1) ARM Programming (1) ARP And RARP (1) Artificial Intelligence (3) Artificial Neural Networks (1) ASH HANDLING SYSTEM (1) ASP (2) ASP .NET (6) ASP.NET FUNDAMENTALS (1) ASP.NET OVERVIEW (1) ASP.NET WITH C# (1) ASSEMBLY LANGUAGE (1) ASTRA SITE TEST (1) Attendance Management System In ASP.NET (1) AUSTRALIA (1) AUTOCAD (1) AUTOMATED TESTING (1) AUTOMATIC BEVERAGE VENDING MACHINE (1) AUTOMATION (1) AUTOMATION MANUFACTURING (1) Automobile (1) AUTOMOBILE SECTOR OF INDIA (1) Auxiliary Steam System (1) AVR INTRODUCTION (1) AVR Microcontroller Family (1) AVR RISC (1) B-SPLINE (1) B-SPLINE NOTES (1) BAR CODE TECHNOLOGY (1) BARC (1) Barcode Tech. (1) BARCODING FOR BEGINNERS (1) Barriers To Communication (1) BIG DATA (1) BINARY CODES (1) BIOCHIPS (1) BIOFULES (1) BIOLOGICAL DENITRIFICATION (1) Biophotonics (1) BIRLA CEMENT (1) BIRLA CEMENT WORKS (1) BLACK BOX TESTING TECHNIQUES (1) BLACKBERRY DEVELOPMENT (1) BLENDED CEMENTS FOR DURABLE CONCRETE STRUCTURES (1) Blu Ray Disc (1) Blue Eye Technology (1) Bluetooth (1) BOILER (1) BOILER AND AUXILIARIES (1) Boiler Normal Shut Down to Cold (1) BOILERS FUNDAMENTALS (2) Boilers In Indian Industries (1) BOKARO STEEL PLANT (1) BPO (2) BPO/KPO Job (2) BRAIN FINGERPRINTING (1) BROADBAND NETWORK OPERATION SYSTEM (1) Browser RAD Tools (1) BSNL (1) BUGZILLA (1) Bus AMBA (1) C LANGUAGE (2) C# (1) C++ (6) CABLE MODEM (1) CABLES (1) CACHE MEMORY (1) CALIBER MANAGEMENT TOOL (1) CANADA (1) CAPTCHA (1) CARBON CREDITS (1) CARGO TANK ATMOSPHERE (2) Cascading Style Sheets (1) CAT / MAT (1) CCNA (2) CDMA (1) CEERI (2) CELLULOSE (1) CEMENT CONCRETE MIX DESIGN (1) CEMENT PLANTS (1) Chameleon Chips (1) CHAOTIC- MIMO TECHNIQUES (1) CHARGED DEFECTS GETTERING AND CRYSTAL GROWING PROCESSES (1) CHEBYSHEV FILTER (1) CHHABRA THERMAL POWER STATION (1) CHROMATOGRAPHIC (1) CHROMATOGRAPHY (1) CINEMAX (1) CIRCULATING WATER (1) CIVIL AVIATION (1) CIVIL SERVICES (1) CLASSES AND OBJECTS (1) CLIMATE CHANGE FOR BETTER LIVING (2) CLOUD COMPUTING (5) Cluster Analysis (1) Cluster Computing (1) CMOS (1) COAL (1) COAL HANDLING PLANT (1) COAL TRANSPORTATION AND HANDLING (1) COBOL (1) COCA COLA (1) CODA (1) CODE LOCK (1) CODNS REPORT (1) COGNITIVE RADIO (1) COGNITIVE RADIO NETWORKS (1) COGNOS (1) Combinational logic Design (1) COMBUSTION THEORY (2) COMMUNICATION (3) COMMUNICATION SYSTEM (2) COMPUTER (5) COMPUTER CODES (1) COMPUTER DATA (1) COMPUTER FUNDAMENTALS (1) COMPUTER GRAPHICS (1) Computer Hardware (2) COMPUTER MEMORY (1) COMPUTER NETWORK TOPOLOGY (1) Computer Networking (2) COMPUTER NETWORKS (2) COMPUTER NUMBER SYSTEM (1) COMPUTER OPERATING SYSTEM (1) COMPUTER SYSTEMS (1) COMPUTER VIRUSES (2) COMPUTER'S PERIPHERALS (1) COMPUTERS (1) CONDENSER PERFORMANCE (1) CONNECTING DEVICES (1) CONSTITUENTS AND APPLICATIONS IN CONCRETE (1) Control Panels (1) COOLING TOWER (1) COPROMO (1) COQUALMO (1) CORADMO (1) CORE JAVA (1) CORRELATION AND REGRESSION ANALYSIS (1) CORROSION IN METALS (1) COSTAR SOFTWARE (1) CRITICAL PATH METHOD (1) CRM (1) CRUISE CONTROL (1) CRYPTOGRAPHY (2) CRYSTAL STRUCTURE (1) CSS (3) CT UNIT IMPULSE (1) CURIOSITY ROVER (1) CYBER CRIME (2) Cyber Forensic Tools (1) Cyber Terrorism (1) DATA COMMUNICATION (1) DATA FLOW MODEL (1) DATA LINK LAYER (1) DATA MANAGEMENT (1) Data Mining Classification and Prediction (1) Data Mining Concepts and Techniques (1) Data Mining Primitives (1) Data Preprocessing (1) Data Warehouse (1) DATA WAREHOUSING (1) DATABASE AND DATA WARAEHOUSE FUNDAMENTALS (1) Databases And DBMS (1) DATALINK LAYER (1) DB2 (1) DBMS (2) DC Supply System (1) DCCN (1) DCS (1) DEFENCE (1) Delegation Of Powers (1) DELL (1) DHCP (1) DHTML (1) DIFFUSION (1) DIGITAL SIGNATURE (1) Digital Watermarking (1) DIJKSTRA'S ALGORITHM (1) DIRECTIONAL PATTERN ANALYSIS (1) DISCOVERY (1) DISPLAY TECH. (1) Distributed Systems Principles and Paradigms (1) DISTRIBUTION SUBSTATIONS (1) DMAIC (1) DNA (1) DNA COMPUTING (1) DNS (1) DOCUMENT ARCHITECTURE (1) Doordarshan (1) DOS ATTACK (1) DRDO (1) DRUG TRANSPORT MECHANISMS (1) DRUPAL (1) DRY ETCHING (1) DSA (1) DSL (1) DTH (1) DVD TECHNOLOGY (1) DWDM (1) E GAS SEWA (1) E-BIKES (1) E-COMMERCE (2) E-PROCUREMENT SOLUTION IN NHPC (1) EIGRP (1) ELASTICITY (1) ELECTION ALGORITHMS (1) Election Algorithms and Distributed Processing (1) ELECTRIC HEATING (1) ELECTRIC MOTORS (2) ELECTRIC WELDING (1) ELECTRICAL INSTRUMENTS (1) Electrical Protections (1) ELECTRICAL SYSTEM (1) ELECTRICITY GENERATION PROCESS (1) Electromechanical Pulse Energy (1) ELECTRONIC INSTRUMENTATION (1) Electronic Milk Tester (1) ELECTRONIC TOLL COLLECTION SYSTEM (1) Electronics For Animals (1) eLitmus (1) EMAIL SYSTEMS (1) Embedded Linux (2) EMBEDDED SYSTEM (2) EMERGENCY SUPPLY SYSTEM (1) ENERGY CONSERVATION (1) ENERGY EFFICIENCY (1) ENERGY METERS (1) ENGINEERED PROTEIN (1) ENGINEERING CAREER (1) ENGINEERING PROCESSES (1) ENGINEERING REPORTS (1) ENVIRONMENT IMPACT ASSESSMENT (1) Environment Laws For Power Sector (1) ENVIRONMENTAL CONDITIONS (2) Environmental Protection Act-1986 (1) EQUATIONS (1) ERGONOMIC ANALYSIS (1) ERGONOMIC ASPECTS OF NOISE (1) ERGONOMICS (1) ERP (1) ESCORTS (1) ESP (1) ESSAR (1) ETHANOL (1) ETHICAL HACKING (1) EVEN AND ODD SIGNALS (1) EWSD (1) EXCITATION SYSTEM (2) EXTRANET (1) FACE RECOGNITION (2) FACE RECOGNITION TECHNIQUES (2) FAQs DURING AN INTERVIEW (1) FIBER OPTICS (1) Fighter Planes (1) FILE SYSTEM IN OPERATING SYSTEM (1) Fire Fighting Systems In Power Stations (1) FIREWALL (1) Flame Scanners (1) FLUE GAS SYSTEM AIR PRE HEATER (2) FLUIDIZED BED COMBUSTION SYSTEM (2) FLY ASH CONCRETE MIX DESIGN (1) Foster Wheeler Boiler (1) FOUR LEVELS OF INFORMATION SYSTEM (1) FOUR SPECIAL CASES IN SIMPLEX (1) FOURIER SERIES (1) Framework (1) FREE SPACE OPTICS (1) FREQUENCY HOPPING (2) FUEL (1) FUEL OIL SYSTEM (5) FUEL OIL SYSTEM PURPOSE (1) FULL WAVE RECTIFIER (1) FUNDAMENTALS OF MANUFACTURING SYSTEMS (1) FURNACE SAFEGUARD SUPERVISORY SYSTEM (2) FUTURE CAR (1) GAME THEORY (1) GATE (1) GENERATION OF ELECTRICITY (1) GENERATOR PROTECTION (1) GENETIC ALGORITHMS (1) Genetic Engineering (1) GENOMIC IMPRINTING (1) Genomic Library (1) Geophysical Instrumentation (1) GET AND POST METHODS (1) Gi-Fi (2) GLOBAL MANUFACTURING SYSTEM (1) GLOBAL SYSTEM FOR MOBILE COMMUNICATION (1) GMAT (1) GMPLS CONTROL PLANE (1) GOOGLE (1) GOOGLE NEXUS (1) Governing System (1) GOVERNMENT GRANTS (1) Govt. Job (3) GPRS (1) GPS (1) GRAFFITI (1) Graphics Editor (1) GRAVIMETRIC ANALYSIS (1) GRE (1) Green Computation (1) GREEN HOUSE EFFECT (1) GREEN REVOLUTION (1) GREY BOX TESTING (1) GRID COMPUTING (1) GSM (3) GSM ADVANCE TRAINING (1) GSM AIR INTERFACE (1) GSM BSS (1) GSM NETWORK ARCHITECTURE (1) GSM NETWORK INTERFACES (1) GSM RADIO TRANSMISSION (1) GSM TRAFFIC CASES (1) GSM TRAINING (1) GSS (1) HACKING (1) Hadoop (2) Handling And Disposal Of Oily Bilge Water (1) Haptics (1) HARLEY DAVIDSON (1) HEAPSORT (1) HINDUSTAN COPPER LIMITED (1) HINDUSTAN ZINC LIMITED (1) HMT (1) HOLOGRAPHY (1) Host Mobility (1) HOSTING (1) HOW DSL WORKS (1) HP BYPASS (1) HTML (5) HTTP (1) HUMAN ROBOT (1) HUMANOIDS (1) HUTCHISON TELECOM (2) HYDRO SECTOR (1) HYDROGEN ENERGY (1) HYPERTENSION (1) HYPNOSIS (1) HYUNDAI MOTORS (1) I MODE (1) IBM (1) IBM AS/400 (1) IBM INDIA (1) IC ENGINES (1) IC TECHNOLOGY (1) ILLUMINATION ENGINEERING (1) ILLUSTRATOR (1) IMAGE ENCRYPTION ALGORITHM (1) IMAGE FILE FORMATS (1) IMAGE FUSION (1) IMMUNO TECHNOLOGY (1) IMPACT OF ATMOSPHERICS ON QUALITY INFERENCES (1) IMPULSE TURBINE (1) INDUCTANCE (1) Induction Furnace (1) INDUCTION GENERATOR (1) INDUCTION MACHINE (1) Induction Motor (1) INDUCTION MOTOR MODEL (1) INDUCTION MOTOR STARTING (1) Industrial Automation (1) Industrial Design In India (1) Industrial Safety And Accident Prevention (1) Inert Gas System (1) INFORMATION SECURITY (1) INFORMATION SYSTEM FOR MANUFACTURING (1) INFOSYS (1) INFOSYS DRIVEN BY VALUES (1) INQUIRY (1) INSERTION SORTING (1) INSPECTION AND GOOD CONSTRUCTION PRACTICES (1) Integrated Management System (1) INTEGRATED MAUFACTURING SYSTEM (1) Inter Integrated Circuit (1) Internal Combustion Engines (2) Internet (4) Internet Protocol (1) INTERNETWORKING DEVICES (1) INTERRUPT MECHANISM (1) INTERVIEW SKILLS (1) INTRA ASN IEEE802.16e (1) INTRANET (1) INTRODUCTION OF GSM (1) INTRODUCTION OF THERMAL POWER PLANT (1) INTRODUCTION TO C SHARP (3) INVISIBLE BAR CODES (1) IOCL (1) ION EXCHANGE CHROMATOGRAPHY (1) ION IMPLANTATION (1) ION IMPLANTATION PROCESS (1) ION TRACK BASED TUNABLE DEVICES (1) iOS 6 (1) IP Addresses (2) iPHONE (1) iPHONE 5 (1) IS-LM MODEL (1) ISEH FRP V7.0 (1) ISM CODES (1) ISO 9001:2008 (1) ISPS (1) ISRO (1) IT And Communication Infrastructure (1) ITES (1) J2EE (1) JAVA (9) JAVA APPLICATIONS (1) JAVA BEANS (1) JAVA DATABASE CONNECTIVITY (1) JAVASCRIPT (3) JAVASCRIPT DIALOG BOXES (1) JIRO Technology (1) JK Cement (1) JK TYRE (1) Job Fair (3) JOOMLA (1) JSP (1) KRUSKAL'S ALGORITHM (1) L.T CIRCUIT BREAKERS (1) La-Mont boiler (1) LAN (1) Landmine Detection (1) LAPLACE CIRCUIT (1) Laser Security (1) LEACH (1) LIFEBUOY (1) LIGHT MICROSCOPY (1) LINEAR EQUATIONS (1) LINUX (3) Linux Booting Procedure (1) Linux Servers (1) LINUX SYSTEM (2) LITHOGRAPHY (1) LOAD SHARING (1) LOGIC CONTROLLER (1) LOGICS (1) LOGO DESIGN (1) LOW DROPOUT REGULATOR (1) LUBRICATION (1) MACHINING (1) Maglev Trains (1) MAGNETIC FORCES MATERIALS (1) MAHINDRA (1) MAINFRAME (1) MAMMOGRAMS (1) Manage IS Development (1) MANAGEMENT IN MANUFACTURING SYSTEM (1) MANUFACTURING PRESENTATION (1) MANUFACTURING EXCELLENCE (1) MARK I (1) MARK I FPA (1) MARK II FPA (1) MARPOL (1) MARS ROVER (1) MARUTI 800 (1) MASS CONCRETE MIX (1) MATLAB (3) MCA (1) MCITP (1) MEDIUM ACCESS CONTROL SUBLAYER (1) MEMS SWITCH (1) MEMS TECHNOLOGY (1) Meta Search Engines (1) METALLURGICAL TESTING (1) MICRO CANTILEVER ENERGY HARVESTER (1) MICROBIAL GROWTH (1) MICROCALCIFICATIONS (1) MICROCONTROLLER BASED ALARM SYSTEM (1) MICROCONTROLLERS (1) MICROPROCESSOR (2) Microscopic Techniques (1) MICROSOFT (MS) ACCESS (1) MICROSOFT (MS) SQL (1) MICROSOFT EXCEL (1) MICROSOFT OFFICE EXCEL 2003 (1) MICROSOFT OFFICE OVERVIEW (2) MICROSOFT OFFICE WORD 2003 (1) MICROSOFT PROJECT (1) MICROSOFT WORD (1) Microstrip Patch Antenna (1) MICROVIA TECH. (1) MICROWAVE ABSORPTION PROPERTIES OF GRAPHITE FLAKES (1) MICROWAVE COMMUNICATION (1) MICROWAVE LINK DESIGN (1) Microwave Technique (1) Milk Fat Testing (1) MINERALS (1) MIS (1) MOBILE COMPUTING (1) Mobile Number Portability (1) MOBILE SECURITY (1) MOBILE TESTING (1) MODELING AND SIMULATION FOR MANUFACTURING SYSTEM (1) MODELLING TOOLS IN MANUFACTURING (1) MODEMS (2) MODIFIED FUEL LEVEL INDICATOR (1) MODIFIER (1) MOG ANDROID (1) MOSFET (1) MOTION ECONOMY (1) MOTIVATION THEORY (1) Mozilla Firefox (1) MPEG4 (1) MPHASIS (1) MRAM (1) MRT (1) Multi Core Technology (1) MULTICAST ROUTING (1) MULTIMEDIA NETWORKING SYSTEM (1) MULTIMEDIA PROJECTS (1) MULTIMEDIA SKILLS (1) MULTIMEDIA TECHNOLOGIES (1) Multimedia Technology (1) MULTIPLE INTELLIGENCES (1) MULTISENSOR DATA FUSION (1) MYSQL (2) NANOBOTS (1) NANOTECHNOLOGY (2) NASA (1) NASCAR (1) Need Of ERP (1) NETWORK BASICS (1) NETWORK LAYER (2) NETWORK PROTOCOLS (1) Network Security (2) NETWORK SWITCH (1) NETWORKING (5) New Idea Put To Road Test (1) NEWZELAND (1) NHPC (1) NIS And Setting Up Router (1) Nokia Morph Concept (1) NOKIA SIEMENS NETWORKS (1) NON CONVENTIONAL ENERGY SOURCES (1) NONVERBAL COMMUNICATION (1) NTPC (2) NUCLEAR ENERGY (1) NUCLEAR POLLUTION (1) NUMBER SYSTEMS (1) OBJECT ORIENTED (1) OCCUPTIONAL VIBRATION (1) OFDM (1) OIL AND GAS INDUSTRY (1) OLYMPIC PRODUCTS (1) OMEGA ELECTRONICS (1) ONGC (1) ONLINE EDUCATION SERVICES (1) ONLINE MOBILE RECHARGE (1) ONLINE SHOPPING SITE (1) OOPS (1) OPERATING SYSTEM (3) OPERATING SYSTEM SECURITY (1) OPERATIONS DEPARTMENT PROCEDURE (1) Optical Computing (1) OPTICAL LOGIC GATES (1) OPTICAL NETWORK (1) OPTIMIZED ANN (1) ORACLE (4) ORACLE 10G (2) ORACLE 9I (1) Oracle Database (1) ORACLE HUMAN RESOURCES (1) ORGANIZATIONAL STRUCTURE AND DESIGN (1) OSI MODEL (1) OXIDATION (1) OXIDATION TECHNIQUES AND SYSTEMS (1) PACKET LOSS CONCEALMENT USING AUDIO MORPHING (1) Packet Tracer 5.0 (1) PAPER CLIP (1) PARKING MANAGEMENT SYSTEM (1) PARTS OF DESKTOP (1) PATTERN PRINTERS (1) PATTERN TRANSFER (1) PCB (1) PCB ANALYSIS (1) PEDAL POWER HACKSAW (1) Pedal Power Zeolite Refrigeration (1) PEER TO PEER NETWORKS (1) Penetration Testing (1) Performance Management Process (1) PERL (1) PHISHING (1) PHOTOSHOP (1) PHOTOVOLTAIC SYSTEM (1) PHP (4) PHP AND SQL (1) PHP ERROR (1) PHP FILE INCLUSION (1) PHP FILE UPLOADING (1) PHP FILES (1) PHP FUNCTIONS (1) PHP OPERATORS (1) PHP SESSIONS (1) PHP TECHNOLOGY (1) PHYSICAL LAYER (2) Placement Papers (1) PLANT LAYOUT AND CAPACITY PLANNING (1) PLC (2) PLCC (1) Polaris (1) POST TRANSLATIONAL MODIFICATION (1) POWER DISTRIBUTION EQUIPMENT (1) POWER DISTRIBUTION SYSTEM (1) POWER GENERATION IN NTPC (1) POWER GENERATION THROUGH SPEED BREAKERS (1) POWER HOUSE (1) POWER PLANT (2) POWER PLANT EMERGENECIES (1) POWER PLANT OPERATION GENERATOR & AUXILIARIES (1) POWER QUALITY PARAMETERS (1) POWER SCENARIO IN INDIA (1) Prepaid Energy meter (1) PRESENTATION SOFTWARE (1) PREWRITING TECHNIQUES (1) PRINCIPLES OF CONCRETE MIX DESIGN (1) Private Job (1) Procedure For burning Oil (1) PROCESS (1) PROCESS DESCRIPTION (1) PROCESS DESIGN (1) Product Life Cycles And The Boston Matrix (1) PRODUCT STRATEGY (1) PROJECT QUALITY MANAGEMENT (1) Protection System Of Generating Stations (1) PTW SYSTEM (1) PULSE WIDTH MODULATION (1) PUMP (1) PURGING LOGIC (1) QR CODES (1) QUALITY REQUIREMENTS OF CONCRETE - MAKING MATERIALS (1) QUANTUM COMPUTER (2) QUANTUM COMPUTERS (1) QUANTUM COMPUTING (1) Quorum Sensing (1) RADAR (1) RADAR COMMUNICATIONS (1) RADIO CONTROLLED AIRCRAFT (1) RAILWAY (1) RAM (1) RECORDING TECHNIQUES (1) Red Tacton (1) REGENERATIVE SUSPENSION SYSTEM (1) RELAY (1) Remote Control (1) Remote Method Invocation (1) Remote Sensing (1) REMOTE SUSTAINABLE VILLAGES (1) Renewable Energy (4) REQUIREMENT ENGINEERING (1) REQUISITE PRO (1) RESTFUL WEBSERVICES (1) REVEAL.JS (1) RFID (3) Robotics (2) ROCK SLOPE ENGINEERING (1) Role Of Hydrogen In Generator (1) ROM (1) ROUTINE CHECKS BOILER (1) Routine Checks Generator (1) Routine Checks Turbine (1) RSRTC (1) RTLinux (1) RTOS (1) RUBY ON RAILS (1) SAAS AND CLOUD COMPUTING (1) SAMPLE RESUME FOR EXPERIENCED - DOWNLOAD FREE .DOC (1) SAMPLE RESUME FOR FRESHERS - DOWNLOAD FREE .DOC (1) SAMSUNG 3D LED TV (1) SAMSUNG S3 (1) SAP (2) SAP LAP ANALYSIS (1) Satellite Communication (1) SCADA (2) SCADA FUNDAMENTALS (1) SCANNING AND FOOTPRINTING (1) SCHEDULING OF OPERATIONS (1) Secretariat LAN (1) SELF AUTOMATED SAFETY SYSTEM OF TRAIN (1) SELF EMPLOYEMENT In ASP.Net (1) Semantic Web (1) SEMI AUTONOMOUS BIKE (1) SENSORY EVALUATION (1) SENSORY TESTING (2) SEO (1) SEQUENTIAL CIRCUIT (1) Serial Peripheral Interface (1) Servlets (1) Shell Programming (1) SHIFT REGISTERS AND COUNTERS (1) Ship Maneuverability (1) SIGNALS (1) SIGNALS AND SYSTEMS (1) SINGAPORE (1) SIX STROKE ENGINE (1) Sixth Sense Technology (1) SLIDING PRESSURE OPERATION (1) SLIM System (1) Smart Cards (1) SOCIAL ENGINEERING TOOLKIT (1) SOCIAL NETWORKING (1) SOCIAL NETWORKS (1) SOCIAL PROBLEMS (1) SOFT SYSTEM METHODOLOGY (1) SOFTWARE (1) SOFTWARE DESIGN (1) SOFTWARE DEVELOPMENT (1) SOFTWARE ENGINEERING (2) SOFTWARE FOR IMPLEMENTATION OF ATM (1) Software Management Topics (1) SOFTWARE METRICS (1) Software Requirements Specification (1) SOFTWARE RESEARCH EXPRESS (1) Software Testing (2) SOLAR CELL (2) SOLAR PANEL ROAD (2) SOLAR PV (1) SONY ERICSSON (1) SOURCE AND SINK ANALYSIS (1) SPEAKER RECOGNITION (1) SPECTROSCOPY (1) SPEECH RECOGNITION (2) Splines and Bezier Curves (1) SPREAD SHEET (1) Spring Framework (1) SQL (2) SQL INJECTION (1) State Management Techniques (1) Stealth Technology (1) STEAM CIRCULATION SYSTEM (1) Steam Raising (1) STEAM TURBINE (1) STEAM TURBINES FOR SUPERCRITICAL POWER PLANTS (1) STEEL INDUSTRY (1) Steel Plant (1) STEVE JOBS (1) STIRLING ENGINE (1) STORAGE DEVICES (1) STORAGE OVERVIEW AND ARCHITECTURE (1) STRESS (1) STUDY ABROAD (6) SUBNETTING (1) SULZER RT FLEX MARINE DIESEL ENGINE (1) SUMS AND PRODUCTS OF SIGNALS (1) Sun Solaris Os (1) SURATGARH THERMAL PLANT (1) Surface Detection Methods (1) SURFACE MOUNT TECHNOLOGY (2) SUSTAINABLE DEVELOPMENT (1) Swarm Intelligence (1) SWITCHING AND NETWORKS (1) SWITCHING AND ROUTING (1) SWITCHYARD (1) SYMBIAN OS (1) SYSTEM PROGRAMMING (1) TABU SEARCH (1) TABULATION METHOD (1) TATA INDICOM (1) TATA MAGIC (1) TATA MOTERS (1) TATA MOTORS (2) TATA NANO (2) TATA STEEL (1) TATA Tele Services (1) Technical Analysis (1) TELECOM SOFTWARE (1) TELECOMMUNICATION INDUSTRY IN INDIA (1) Teleconferencing (1) TEST CENTER (1) TEST POINT ANALYSIS (1) TESTING (1) Testing And Calibration (1) TESTING LEVELS (1) TEXT (1) The Locus Distributed Operating System (1) THERMAL CUTTING PROCESS (1) THERMAL POWER PLANT (1) THERMAL POWER PLANTS (1) THERMAL POWER STATIONS (1) THERMOGRAPHY (1) THIN FILM TECHNOLOGY (2) THREE PHASE CIRCUITS (1) Tiled Microprocessor (1) TOEFL / IELTS (1) Tools of Internet (1) TOUCH SCREEN TECHNOLOGY (2) TOUCHSCREEN (1) TRADITIONAL DATABASE APPLICATIONS (1) TRAINING AND DEVELOPMENT (1) TRANSACTION PROCESSING (1) TRANSCRIPTION (1) TRANSDUCER MATERIALS (1) TRANSFORMERS (2) TRANSISTOR AGING (1) TRANSMISSION LINE (1) TRANSMISSION MEDIA (1) TRANSMISSION SYSTEM (1) TRANSMISSION SYSTEM AND ITS CONFIGURATION (1) TRANSPORT AND APPLICATION LAYER (1) TURBINE (1) TURBINE CONDENSATE SYSTEM (2) TURBINE FLEET IN NTPC (1) Turbo Generators (1) TWO STROKE FUEL ENGINE (1) TWO-WHEELER INDUSTRY IN INDIA (1) Ubiquitous Computing (1) UK (1) Underground Communication (1) UNIT SHUT DOWN PROCEDURE (1) UNIX (2) UNIX SPECIAL VARIABLES (1) UPS (1) UREA PLANT (1) USA (1) USE OF CHEMICAL AND MINERAL ADMIXTURES IN CONCRETE (1) UWB ECHO SIGNAL (1) VAPOR ABSORPTION REFRIGERATION (1) VARIABLE SPEED DRIVES (1) VERILOG (1) VHDL (1) VHDL AND DIGITAL CIRCUIT DESIGN (1) VIBRATION (1) VIDEO DISPLAY DEVICES (1) VIDEOCON (1) VIKRAM CEMENT (1) VIRTUAL KEYBOARD (1) VIRTUAL ONLINE TUTORING (1) VIRTUAL PROJECTION (1) VIRTUALIZATION (2) Viruses (1) VISIBLE SURFACE DETECTION (1) VISUAL BASIC (3) Visual Studio 2010 (1) VITAL LINK (1) VLAN (1) VLSI (1) VLSI DESIGN (1) VOIP (1) VPN (1) VSB MODULATION (1) VTP (1) Vulnerability Assessment (1) WAFER PREPARATION (1) War Weapons (1) WATER (1) Water pollution And Its Legislation (1) WAVEGUIDE GRATINGS BASED FILTERS (1) WEAPONS DESIGN AND CONTROL SYSTEMS (1) WEATHER RESOURCE SYSTEM (1) WEB DESIGNING (1) WEB ENGINEERING (1) Web OS (1) WEB SECURITY (1) WEB SERVER (1) WEB WAREHOUSING (1) WEBSITE DESIGN AND DEVELOPMENT (1) WELDING (1) WELSPUN CROP LTD (1) WET ETCHING (1) WHAT IS CEMENT (1) WHIRLPOOL (1) WHITE BOX TESTING TECHNIQUES (1) WHOLE NUMBER (1) WI-FI (1) WIBREE (1) WIMAX (2) WIMAX SECURITY (1) WIND ENERGY SYSTEM (1) WIND FARM (1) WINDOWS SERVER (1) Wireless Communication (1) WIRELESS LAN (1) Wireless Mesh Networks (1) WIRELESS SENSOR NETWORKS (2) WIRELESS TECHNOLOGY (1) WLAN CONFIGURATION (1) WORDPRESS (1) Work Environment (1) Workshop For Turbine (1) WORLD WIDE WEB (2) WSN'S (1) XML (2) XTie-RT (1) YAHOO! (1) Yield Curve (1) Z-TRANSFORM (1) ZIGBEE (2) ZINC OXIDE (1)
 
© 2011 ENGINEERS ON WAY
Designed by Ishant Gupta
Posts RSSComments RSS
Back to top