top of page

Projects

Multicast plays a crucial role in networking by efficiently delivering data from one sender to multiple receivers simultaneously. Unlike unicast (one-to-one) and broadcast (one-to-all) communication, multicast optimizes bandwidth usage and reduces network congestion, making it ideal for applications like video streaming, online conferencing, and content distribution. It enables scalable and cost-effective content delivery across large networks while minimizing redundant data transmission.

Multicast relies on the Internet Group Management Protocol (IGMP) to manage membership in multicast groups. IGMP enables hosts to inform routers about their desire to join or leave specific multicast groups. This protocol is crucial for efficient multicasting, allowing routers to forward multicast traffic only to hosts interested in receiving it.

During my role at Arista, I have conducted an IGMP training bringing the team up to speed on the importance and functionality of this protocol. The training was conducted on a slideshow presentation followed by a hands-on training lab. After completing the training, I published an article on Arista's community central discussing the technology in depth.

In my Master's thesis, I delved into the critical realm of safeguarding enterprise-level SDN systems from cyber threats. Addressing diverse forms of attacks that have emerged in recent years, I innovatively leveraged existing independent systems to construct a resilient network capable of mitigating threats with minimal downtime. Executing this solution within a virtual environment using Python, I meticulously documented my findings. The outcomes exceeded expectations, showcasing swift attack detection through insightful metrics such as throughput and entropy.

Building on my previous project, I delved into cybersecurity to explore a different cryptographic method for added security. This research introduces a concept that enables the secure transmission of two discrete messages simultaneously, a step forward from the previous single-message transmission.

In my research endeavors, I delved into the dynamic realm of cybersecurity, exploring the synergies between cryptography and steganography to enhance security measures. Leveraging an existing Hamming code project as a foundation, I innovatively introduced a watermarking technique. This involved discreetly embedding a message within an image through meticulous least significant bit modification, subsequently replacing it with a single video frame. To ensure secure communication, I implemented a separate API, fortified by a shared key, enabling recipients to seamlessly extract the concealed message. This project was successfully executed in MATLAB.

bottom of page