CIO Advisor, IT strategist, a keen golf hack and a proud father of an active young fella.
To know more about my double life..
I came late to golf (or vice versa). However, now I am addicted to this beautiful game. My golf blogs show some of the passion I have for this game. I play with a group called the Desi Golfer, whose blog can be found here
To read about my golfing exploits use the Golf menu on the top or
Protocols are a part of our everyday existence. We follow protocols in everything we do. Put simply, protocols are rules for doing things. You may say ‘I walk the wild side and so rules or protocols apply to me’, well then you are sadly mistaken. You have `set’ yourself the `rule’ that you will not follow any rules. Hence not following any rules becomes your rule and hence your protocol.
So much for protocols. Lets get to the point, you are here to know and understand PPP, which stands for the Point to Point Protocol. As of today, the most common means of surfing the Internet is via a ‘dial-up service’. Remember we said the `most common means’. People using other services like radio links or leased lines belong to the `chosen’ community and don’t have to worry about these protocols. The Ethernet approach to the ‘Net necessitates the use of Ethernet based protocols so check out our tutorial on them if you are interested. Continue reading
The above is not a figment of our imagination but facts relating to our daily life. When we started off as programmers we proved our fathers wrong. Sorry, we could not do the same regarding our mothers. This left us with the world and our girlfriends to deal with. It took us some time to devise ways to prove them wrong. But before we let you into our secret of how to do it, lets try and justify their laughs.
Network administrators of yore were perfect nerds, living in ivory towers(actually dingy low-lit rooms , disconnected from the world). In short, they were people to be avoided, basically belonging to class called social rejects. The rationale behind this was very simple. Network administrators had no control over their networks. Continue reading
As all doomsayers had been predicting, computers have taken control of our lives. Computers touch every aspect of our daily lives. We need computers for carry out simple tasks or for performing equally complicated ‘superhuman’ (or inhuman) tasks. All these information is stored in the computer in the form of files. These files are stored in different directory which may be stored on different drives. The first few days of possessing a computer can be termed as a `honeymoon’ period. During this period we seem to remember all the files names along with their storage slots (technically called sub-directories). But with the passage of time the disks start filling up and nobody seems to remember `what is stored where’. To add insult to injury the system boots up only to tell us `missing file so-and-so system halted’ or some equally esoteric message. So what do you do in such a situation. Continue reading
Brrr….Its Hot : –
The compilation rules for converting data-types into bits and bytes is called the transfer syntax.Basic Encoding Rules or BER is the transfer syntax for SNMP and LDAP. BER and ASN.1 were designed by the same people (not network administrators alone) and hence go hand in hand. This fact makes life simpler on this planet. But how does BER manage to do all this, after all it has to take case of so many data-types, and it is used to write hundreds of protocols. It is indeed mind boggling. To know more about BER lets get cracking Fortunately we will only discuss BER in the context of ASN.1 implementation of SNMP and LDAP. Continue reading
My journey to Scratch!
Ideas. Thoughts. Musings. In small measures.
A record of my writings, observations and fresh perspectives
A site for the sweet toothed
Professional Golfer - A journey to the top
A Desi tryst with Golf