BAPATLA ENGNEERING COLLEGE
Transcript of BAPATLA ENGNEERING COLLEGE
1
2
3
BAPATLA ENGNEERING COLLEGE
BAPATLA
4
CCOOPPEE--22KK1177 THE EVER LASTING VISION……
7th Edition
DEPARTMENT OF MCA
ABOUT COLLEGE
5
Bapatla Engineering College is one of the institutions out of seven
institutions run by BAPATLA EDUCATIONAL SOCIETY. Society was
established in the year 1962. This college is one of the few engineering colleges
in Andhra Pradesh with NBA (National Board of Accreditation) certificate from
the AICTE (All India Council for Technical Education, New Delhi established
in the year 1981.
The college was initially affiliated to ANDHRA UNIVERSITY and later
to NAGARJUNA UNIVERSITY from 1984 onwards. The eight B.Tech
Courses which are accredited are: Civil, CSE, ECE, EEE, EIE, Mechanical, IT
and Chemical engineering. The college also offers 3-M.tech courses in
engineering, 5-P.G courses in sciences and Masters of Computer Applications
(MCA) with an in take of 294.
In addition to this, the college is also registered with Dept of Scientific
&Industrial Research for the purpose of availing Customs duty exemption. The
college is also selected for the Network Institute for the “Technical Education
Quality Improvement Program” (TEQIP) of the Ministry of Human Resources
Development & the World Bank.
Presently the college intake was about 900 students with additional intake
of 10% through lateral admissions in to second year.
We Feel Proud to say about our college as it provides wills & trusts to lead a
successful life.
6
The department of MCA was started in 1997 with an intake of 60 per
annum. The department is equipped with experienced staff members and knows
for its excellence in academic performances. The pass percentage of the
department is more than 96% every year.
The faculty encourages the students for participating in extra curriculum
activities, so that they can enhance their skills in all the ways.
The students have won laurels to the college winning prizes in
competitions. The department strives hard to keep the students on the edge of
present day technologies. This is very useful for students to survive in the outer
world.
About Department
7
MESSAGE FROM PRESIDENT
My best wishes to the students of the department of MCA on the release
of the 6th edition of the department magazine Scope. There is no end to the
pursuit of the technology. Exposure to the word is the key to the perception. I
deem, scope is the embodiment of the technical and literal articles. I acclaim the
exceptional works done by the departmental association for organizing technical
and literal events. Such events propel the students towards success.
I congratulate the association for their incessant efforts in bringing out the
dominant skills of the students. My best wishes for all students.
Sri M.SeshagiriRao
PRESIDENT
Bapatla Engineering College, Bapatla.
8
I felicitate the department of computer science and engineering for the
triumph of releasing the 6th edition of the annual magazine Scope which covers
the latest developments in technology by which covers the latest developments
in technology by way of articles.
We live in an information age it is estimated that the knowledge is
doubling every year so, in order to compatible today’s world it is necessary to
be updated with the latest technology.
The departmental associations can play an important role through the
magazine scope to make the students aware of these developments; it also helps
the students in bringing out the dormant skills in to action.
I wish you to all to excel in all the activities that will be taken up in the
future.
MESSAGE FROM PRincipal
Dr.N.Sudhakar
Principal
Bapatla Engineering College, Bapatla.
9
MESSAGE FROM hod
It is a moment elation to be part of the release of Scope-2K16 the legacy
of the department of MCA is up held with great reverence and austerity. The
meticulous and tenacious efforts in bringing up this magazine are unequivocally
laudable. The demands of the industry encompass creativity team spirit and a
subtle sense of sacrifice apart from technically honed diligence. Products like
tech-magazines, newsletters, cultural fests certainly inculcate these senses
amongst the students. Philosophically, the aura that prevails in the department is
a high potential medium that radiates the spirit exuded by each of us.
I wish that of us be committed to the promise of being a well-defined
functional module of this aura. Modesty prevents me from congratulating only
the MCA students excluding all those who padded bits to Scope-2K16 in
different forms and segments. I thank the administration for facilitating and
patronizing these activities.
K.N.PRASAD
HEAD OF THE DEPARTMENT
Master of Computer Applications
Bapatla Engineering College, Bapatla.
10
MESSAGE FROM CO-ORDINATOR
Success occurs when off to opportunity meets preparation. I am glad to
note that coordinates pave a path for the students through the magazine
Scope-2K16 which covers a wide range of topics.
It is an agreeable fact that technical knowledge alone doesn’t make a
complete student. Extracurricular activities are equally important in changing
the approach of students and to visualize the problems from a different
perspective.
I deem, this magazine is the perfect blend of the technical and literal
topics. I congratulate MCA students for this remarkable work. Through the
magazine scope, I wish all the students the best in their future.
N.KIRAN KUMAR
STAFF CO-ORDINATOR
Dept of MCA
Bapatla Engineering College, Bapatla.
11
12
13
14
15
E-mail id’s of 2014-2017 batch
S.NO
REGD.NO
NAME OF THE
STUDENT
E-MAIL ID
1 Y15MC23001 A.Lakshmi Priyanka [email protected]
2 Y15MC23002 A.Ashok Kumar [email protected]
3 Y15MC23003 A.Ajay Kumar [email protected]
4 Y15MC23004 A.Harika [email protected]
5 Y15MC23005 A.Nandini [email protected]
6 Y15MC23006 B.Srinivasa Reddy [email protected]
7 Y15MC23007 B.Abhijit Reddy [email protected]
8 Y15MC23008 Ch.Mounika [email protected]
9 Y15MC23009 Ch.Ramakrishna [email protected]
10 Y15MC23010 E.Sruthi [email protected]
11 Y15MC23011 E.Prathap [email protected]
12 Y15MC23012 G.Sowjanya [email protected]
13 Y15MC23013 J.Surendra Babu [email protected]
14 Y15MC23015 K.Gopi Krishna [email protected]
15 Y15MC23016 K.Gurunath Babu [email protected]
16 Y15MC23017 K.Rajesh [email protected]
17 Y15MC23018 K.Kalpana [email protected]
18 Y15MC23019 K.Jyothi [email protected]
19 Y15MC23020 M.Rajasekhara Reddy [email protected]
20 Y15MC23021 M.Vinitha [email protected]
21 Y15MC23022 M.Srilekha [email protected]
22 Y15MC23023 N.Jhansi Rani [email protected]
23 Y15MC23024 P.Sri Avinash [email protected]
24 Y15MC23025 P.Lakshmi Devi [email protected]
25 Y15MC23026 P.Anil [email protected]
26 Y15MC23027 P.Vamsi Kumari [email protected]
27 Y15MC23028 R.Eswar Reddy [email protected]
28 Y15MC23029 R.Laxminath [email protected]
29 Y15MC23030 R.Padma [email protected]
30 Y15MC23031 R.Sravana Lakshmi [email protected]
31 Y15MC23032 S.Harika [email protected]
32 Y15MC23033 S.Kavitha [email protected]
33 Y15MC23034 U.V.Koteswara Rao [email protected]
34 Y15MC23035 V.Raja Kumari [email protected]
35 Y15MC23036 V.Rama Krishna [email protected]
36 Y15MC23038 Y.Gopi [email protected]
37 Y15MC23039 Sk.Rihana [email protected]
16
E-mail id’s of 2015-2018 batch
S.N
O
REGD.NO
NAME OF THE
STUDENT
E-MAIL ID
1 Y16MC23001 A.Venkateswarlu [email protected]
2 Y16MC23002 A.Sudha Rani [email protected]
3 Y16MC23003 B.Sivaji [email protected]
4 Y16MC23004 B.Sai Lavanya [email protected]
5 Y16MC23005 B.Srilekha [email protected]
6 Y16MC23006 D.Varalakshmi [email protected]
7 Y16MC23007 G.Ravindra Babu [email protected]
8 Y16MC23008 G.Srinivasa Reddy [email protected]
9 Y16MC23009 G.Harshitha [email protected]
10 Y16MC23010 G.Jyothirmai [email protected]
11 Y16MC23011 G.Ashok [email protected]
12 Y16MC23012 J.Pavan Kumar [email protected]
13 Y16MC23013 K.Sai Lakshmi [email protected]
14 Y16MC23014 K.Geethanjali [email protected]
15 Y16MC23015 K.Srikanth [email protected]
16 Y16MC23016 K.Srilatha [email protected]
17 Y16MC23017 K.Mounika [email protected]
18 Y16MC23018 K.Suhasini [email protected]
19 Y16MC23019 K.Siva [email protected]
20 Y16MC23020 K.shiny [email protected]
21 Y16MC23021 M.Padmavathi [email protected]
22 Y16MC23022 M.Nagarjuna [email protected]
23 Y16MC23023 M.Lakshmi [email protected]
24 Y16MC23024 M.Venkata Adilakshmi [email protected]
25 Y16MC23026 M.Rajesh [email protected]
26 Y16MC23027 M.Srinivasa Rao [email protected]
27 Y16MC23028 M.Revanth Sai [email protected]
28 Y16MC23029 M.Nagendra [email protected]
29 Y16MC23030 N.Siva Sankar Raju [email protected]
30 Y16MC23031 P.Nagalakshmi [email protected]
17
31 Y16MC23032 P.Gopi [email protected]
32 Y16MC23033 P.Anantha Nadh [email protected]
33 Y16MC23034 P.Ramanji [email protected]
34 Y16MC23035 P.Lavanya [email protected]
35 Y16MC23036 Sk.Rajak [email protected]
36 Y16MC23037 Sk.Gousiya [email protected]
37 Y16MC23038 T.Bhagavan Sai Chand [email protected]
38 Y16MC23039 T.Srilakshmi [email protected] 39 Y16MC23040 V.Supraja [email protected] 40 Y16MC23041 V.Harish [email protected] 41 Y16MC23042 V.Sowndarya [email protected] 42 Y16MC23043 S.Venkata Ramaiah [email protected]
18
E-mail id’s of 2016-2019 batch
S.N
O
REGD.NO
NAME OF THE STUDENT
E-MAIL ID
1 Y17MC23001 B.Vijay Kumar Reddy [email protected]
2 Y17MC23002 Ch.Swetha Bhavani [email protected]
3 Y17MC23003 Ch.Vamsi Chakradhar [email protected]
4 Y17MC23004 D.Ciciliya [email protected]
5 Y17MC23005 D.Pothuraju [email protected]
6 Y17MC23006 D.Suresh [email protected]
7 Y17MC23007 E.Venkata Padmaja [email protected]
8 Y17MC23008 E.Edukondalu [email protected]
9 Y17MC23009 G.Sairam [email protected]
10 Y17MC23010 I.Yamini [email protected]
11 Y17MC23011 K.Pavan Kumar [email protected]
12 Y17MC23012 K.Narasimha Reddy [email protected]
13 Y17MC23013 K.Nagaprakash [email protected]
14 Y17MC23014 M.Rama Koteswararao [email protected]
15 Y17MC23015 M.Sobha Rani [email protected]
16 Y17MC23016 Md.Ishok [email protected]
17 Y17MC23017 M.Venkata Ravi Kumar [email protected]
18 Y17MC23018 N.Swarnalatha [email protected]
19 Y17MC23019 P.Venkatanaga Gayatri [email protected]
20 Y17MC23020 P.Vani [email protected]
21 Y17MC23021 P.Rajeswari [email protected]
22 Y17MC23023 R.Leela Saipreethi [email protected]
23 Y17MC23024 S.Sri Lakshmi Parvathi [email protected]
24 Y17MC23025 Sk.Khajabee [email protected]
25 Y17MC23026 Sk.Malin [email protected]
26 Y17MC23027 Sk.Sana [email protected]
27 Y17MC23028 T.Nagavenkata Mainkanta [email protected]
28 Y17MC23029 T.Harika [email protected]
29 Y17MC23030 V.Tarun Kumar Reddy [email protected]
30 Y17MC23031 V.Narasimha [email protected]
31 Y17MC23032 V.Gayathri [email protected]
32 Y17MC23033 V.Narendra [email protected]
33 Y17MC23034 Y.Sri Basava Teja [email protected]
19
20
Never forget 3 types of people in your life
Who helped you in your difficult time!
Who left you in your difficult time!
Who put you in difficult time!
I am Responsible for what I say,
I am not responsible for what you understand.
Life is not qualified by fluent English,
Branded clothes or a rich life style.
It is measured by the number of faces,
who smile when they hear your name.
None can destroy Iron, but its own rust can!
Likewise, none can destroy a person,
But his own mindset can …….
Soundarya
21
Alphabet ‘O’ stands for ‘OPPORTUNITY’
Which is absent in YESTERDAY
Available once in T’O’DAY
And Thrice in T’O’M’O’RR’O’W
Never Lose “HOPE”
Challa. Swetha bhavani
Don’t take rest after your FIRST VICTORY because IF you FAIL in SECOND.
More LIPS are WAITING to SAY that your FIRST VICTORY was just LUCK.
Don’t read success stories,
You will only get a message.
Read failure stories,
You will get some ideas to get success.
M.Sobharani
22
Don’t fear for facing failure in the first attempt,
Because even the successful maths start with “Zero” only.
One best book is equal to hundred good friends, but
One good friend is equal to a ‘library’.
Confidence and hard-work is the best medicine
To kill the disease called failure.
It will make you a successful person.
p.rajeswari
23
Never explain yourself to anyone
You don’t need anyone’s approval
Live your life and do what makes you happy.
You cannot change your future, but you change
Your habits, and surely your habits
will change your future.
Relations are like electric currents.
Wrong connections will give you shocks throughout your life.
But the right ones light up your life.
SUCCESS is when your “Signature” changes to “Autograph”.
It you can’t fly then run, it you can’t run then walk,
It you can’t walk then crawl, but whatever you do you have to keep Moring forward.
V.GAYATHRI
24
THE IMPORTANT THINGS IN LIFE
A philosophy professor stood before his class with some items on the
table in front of him. When the class began, wordlessly he picked up a very
large and empty mayonnaise jar and proceeded to fill it with rocks, about 2
inches in diameter.
He then asked the picked up a box of pebbles and poured them into the
jar. He shook the jar lightly. The pebbles, of course, rolled into the open areas
between the rocks.
He then asked the students again if the jar was full. They agreed it was.
The professor picked up a box of sand and poured it into the jar of course, the
sand filled up the remaining open areas of the jar.
He then asked once more if the jar was full. The students responded with
a unanimous “yes”.
“Now”, said the professor, I want you to recognize that this jar represents
your life. The rocks are the important things your family, your partner, your
health, your children things that if everything else was lost and only they
remained, your life would still be full. The pebbles are the other things that
matter like your job, your house, your Car. The sand is everything else, the
small stuff.
If you put the sand into the jar first, he continued, there is no room for the
pebbles or the rocks. The same goes for your life. If you spend all your time and
energy on the small stuff, you will never have room for the things that are
important to you. Pay attention to the things that are critical to your happiness.
Pay with your children. Take your partner out dancing. There will always be
time to go to work, clean the house, give a dinner party, or fix the disposa.
“Take care of the rocks first the things that really matter. Set your
priorities. The rest is just sand.”
soundarya
2/3 mca
25
ప్రతిజ్ఞ!
భారత దేశం నా మాతృ భూమి, భారతీయులందరూ నా సహో దరులు... అని ప్రతిజ్ఞ చసే్త ాం.
క్నీ నిజ్ానికి అలా ఎాంతమాంది ప్టిస్తత న్నారు.
➢ నిజ్ాంగ్ అాందరిని స్హో దరులుగ్ చూస్తత ఒక మతాం వ్డు వేరొక మతాం వ్డిని, ఒక
కులాం వ్డు వేరొక కులాం వ్డిా ఎలా నరుకకొని చాంప్ుకో గలుగుతున్నారు. ఒక ే
ఊరిలో నివస్ ాంచే ఆడప లల లప ై ఆ ఊరి యువతే హతనాచనరాం చేస్ న స్ాంఘటనలు ఎనిా చూడలేదత. ఒక ేఊరిలో నివస్ ాంచే తోట ివ్ళ్లన్ే స్హో దరులుగ్ చూడలేని ఈ
జ్నాం జిలాల లోల , ర్ష్ట్ర ా లోల , దేశాంలో ఉనా ప్రజ్ల్నా మాతరాం స్హో దరులుగ్ ఎలా చూడగలరు.
నేను నా దేశాన్ని ప్రరమిసుు నాిను
➢ అవునత దేశ్నిా బాగ్ పతరమిస్త రు.... ఎాందతకాంట ేతప్ుు చసే్తత కఠిన శిక్షలు వేయరు గనతక. ఒక వేళా వేస్ న తేల్నగ్ా తప ుాంచతకోవచతు... అాందతకే స్తస్ాంప్నామ ైన
బహువిధమ ైన న్న దేశప్ు వ్రస్తవ స్ాంప్ద న్నకు గరవక్రణాం, దీనికి అరహత
ప ాందడననికి స్రవదన న్నేత కృష చేస్త నత. ఇది న్న దేశాం అని అనతకుాంటే దశే
స్ాంప్దనత అవినీతి రూప్ాంలో, కుాంభకోణనల రూప్లోల ఎాందతకు దోచతకోగలుా తున్నారు.
➢ వ్రస్తవ స్ాంప్ద అాంటే డబుులు, నగలు, భూములు, క్దాండీ... దేశ స్ాంప్రదనయాం,
మాంచితనాం, మానవతవాం, నిర్డాంబరత మొ' నవి. అవ ేఉాంటే మన దేశాంలో పతదవ్డు ధనికుడు అన్ ేతరతమామ ేఉాండేది క్దత.
26
నా తలి్లదండ్రర ల్లి, ఉపాధ్ాాయుల్లి, ప్ెదదల్లి గౌరవిస్ాు ను
➢ నిజ్ానికి ప లల ల్నా 6 స్౦' లకు బడికి ప్ాంప ాంచనల్న క్నీ ఇప్ుటి తల్నలదాండుర లు 3 స్౦'
లక,ే మాటలు వచ్చు ర్కుాండనన్ే NURSERY లో వేస్తత న్నారు. NURSERY నతాండ ి
P.G వరకు HOSTEL ఉాంచి చదివిస్తత న్నారు తల్నలదాండుర లు. అలాాంటి తల్నలతాండుర ల
ప లల లు తల్నలతాండుర ల పతరమకు దూరాం అవుతున్నారు. ➢ విదాని [అాందిాంచ వలస్ న] బో దిాంచ వలస్ న ఉప్ధ్నాయులే విదా అభాస్ ాంచే
విదనారుు లనత ప ళ్లల చేస్తకునా స్ాంఘటనలు ఎనిా చూడలేదత.(10 వ తరగతి చదవిే విదనారిుతో ఉప్ధ్నాయుర్ల్న ప ళ్లల)
➢ మనవర్ల్న వయస్తలో ఉనా ఆడప లల లనత చూస్ ఎాంత మాంది స్భాత గ్ ఉాంటున్నార ీస్మాజ్ాంలో?(62 years old man was arrested for harassing
women)
“నా దేశం ప్టి్ నా ప్రజ్ల ప్టి్ సరవా న్నరతితో ఉంట్ానన్న చేసిన ప్రతిజ్ఞ ఎవరూ పాట్ ంచడ్ంలేదు”
➢ ఈ రోజులోల విదనారాంగాం ఒక వ్ాప్రాంగ్ మారిపో యాంది, అాందరూ
చదతవుకుాంటున్నారు క్షమిాంచనల్న "చదతవు కకాంటున్నారు". విదనాలలేని వ్డు విాంత
ప్శువు అన్నారు ఒకప్ుుడు క్నీ విదా ఉనావ్డు కూడన విాంత ప్శువుగ్ ప్రవరితస్తత న్నారు ఈ రోజులోల .
➢ ఇలాాంటి న్న దేశ్నిా, దనరి తప ున న్న దేశ్నిా మాంచి మారాాంలోకి మార్ుల్న అని
అనతకుాంటున్నా, క్నీ ఇది స్ధాాం క్దేమో!
27
➢ ఎాందతకాంట ే'మారుు' అన్ేది ఒకొడతిో మొదలవ్వల్న అన్ేది ప్త న్ననతడ.ి
ఎాందతకాంట ేఅప్ుటలల జ్న్నలు లక్షలోల ఉాండే వ్రు క్బటిర ఆ న్ననతడి. క్నీ ఇప్ుుడు ఆ లక్షలు కోటుల అయాాయ అాందతకే మారుు అన్ేది లక్షలోల మొదలవ్వల్న. ఇది కకతత న్ననతడి.
➢ ఈ మారుు విదనారుు లోల నతాంచ ేఉదభవిాంచనలని ఆశిస్తత న్నా....!
n.swarna latha
1/3 MCA
28
29
ABSTRACT
Sailfish OS is a Linux-based general-purpose operating system, widely known as a
mobile operating system combining the Linux kernel for a particular hardware platform use,
the open source Mer core middleware, the proprietary UI contributed by Jolla, and other third
party components some of which are free software, and others of which are proprietary.
Sailfish is being developed by Jolla in permanent cooperation with the Sailfish community
(which in open model makes development requests and decides development priorities in
voting), the Mer project and its community (open source project contributing middleware for
Jolla which also is active Mer project contributor, what assures compatibility of both projects
with established standard), corporate members of the Sailfish Alliance and various open
community members. Sailfish is used in the Jolla smart phone, the upcoming Jolla Tablet,
and by other licensees.
HISTORY AND DEVELOPMENT
The OS is an evolved continuation of the Linux MeeGo OS previously developed by
alliance of Nokia and Intel. The MeeGo legacy is contained in the Mer core in about 80% of
its code; the Mer name thus expands to MeeGo Reconstructed. olla and MERproject.org
follow meritocratic government to avoid the mistakes that lead to the MeeGo project's then-
unanticipated discontinuation. Sailfish 2.0 is currently in development for the announced
Jolla Tablet.
30
SOFTWARE ARCHITECTURE
The Sailfish OS and the Sailfish software development kit (SDK) are based on
the Linux kernel and Mer. Sailfish OS includes a multi-tasking graphical shell called
"Lipstick" built by Jolla on top of the Wayland display server protocol. Jolla uses free and
open-source graphics device drivers but the Hybris library allows use of proprietary graphics
device drivers for Android. Jolla's stated goal is for Sailfish to be open source eventually.
Sailfish OS can run Android applications through a proprietary compatibility layer. Targeted
device classes Sailfish is commonly known to be targeted at mobile devices, but like MeeGo
previously and as part of its legacy, Sailfish can be used on any other device as a complete
general-purpose Linux OS, such as IVI, navigation, smart TV, desktops and notebooks,
yachts, automotive, e-commerce, house goods, et al.; See the Devices section for devices that
run the Sailfish OS.
Sailfish OS SDK
The Sailfish OS SDK was announced in Helsinki at Slush in 2012, and the alpha was
published in February 2013. The SDK, installation and coding tutorials are available for free
download from the Sailfish OS website although the overall license is not open source.
Sailfish SDK uses Qt with Virtual Box for development, compiling and emulation purposes,
in contrast to simulation method. According to Jolla, development with Sailfish SDK is
development on Sailfish OS itself; there are no differences between developed software
appearance and behavior in the SDK and on a device running Sailfish OS.
Application programming interfaces
Sailfish OS uses open source Qt APIs (Qt 5, Qt Quick 2 etc.) and a closed source
Sailfish Silica for the UI. Standard Linux APIs are provided by the Mer Core. Sailfish and
Plasma Active have been cooperating to share common APIs and this, when successful, will
make the platforms compatible on the API level.
31
Software overview
Sailfish is able to run most applications that were originally developed for Android, in
addition to native Sailfish applications. This was done in collaboration with the creators of
Alien Dalvik, Myriad Group. As Sailfish OS is a GNU/Linux-based operating system, it is
also possible to install other GNU/Linux applications on it. A number of projects successful
on other platforms are migrating to become native Sailfish OS applications.
• Software porting and migration to Sailfish OS
• Similarities and differences between Harmattan and Sailfish
• guides how to port MeeGo 1.2 Harmattan applications for the Nokia N9 to the
Sailfish OS devices
• Porting framework (Qt 4 to Qt 5, SDL 1.2 is SDL 2.0, Debian packaging is RPM
packaging)
• Application porting tutorials and examples (QtQuick QML applications, the Flickr
application Qt 5, SDL / OpenGL ES applications)
• Qt Quick Components map to Sailfish Silica.
It gathers and links development resources of different kinds and origins.
Hardware overview
Advantages of the Mer standard
Sailfish OS can be used on any hardware with a Linux kernel supported by the Mer
core distribution. A list of devices running Sailfish has been created by enthusiasts. Rather
than designate a specific reference hardware platform, a Virtual Box implementation with the
Sailfish OS SDK is available for development on popular operating systems Linux, OS X and
Windows. This VM contains the whole Sailfish OS isolated from local resources to enable
comfortable work. This allows evaluating coded or ported software behavior and
performance in future on any real device and safe experimenting de facto on Sailfish OS
itself.
32
Software Development Kit
Sailfish OS SDK is a collection of tools for developing Sailfish OS applications. It includes:
- Qt Creator integrated development environment (IDE)
- Mer build engine for cross compilation
- The Sailfish OS Emulator
- Tutorial, Design and API Documentation
- Repositories for additional libraries and open source code
Qt Creator
Qt Creator is a cross platform integrated development environment (IDE) tailored to
the needs of Qt developers. It has been extended to add support for Sailfish UI application
development using Sailfish Silica components. It provides a sophisticated code editor with
version control, project and build management system integration. More information on the
IDE can be found at qt.digia.com
Mer build engine
The Mer build engine is a virtual machine (VM) containing the Mer development tool
chains and tools. It also includes a Sailfish OS target for building and running Sailfish and
QML applications. The target is mounted as a shared folder to allow Qt Creator to access the
compilation target. Additionally, your home directory is shared and mounted in the VM, thus
giving access to your source code for compilation.
Emulator
The emulator is an x86 VM image containing a stripped down version of the target
device software. It emulates most of the functions of the target device running Sailfish
operating system, such as gestures, task switching and ambience theming.
Wayland
In current release of Sailfish OS uses Wayland instead of X11 in graphics pipeline
giving improved user experience. Sailfish OS is delivered with a fully functional compositor
who takes care of window management and outputting graphics to screen. More information
of Wayland can be found from Wayland homepage.
33
Sailfish Silica
Sailfish Silica is a QML module which provides Sailfish UI components for
applications. Their look and feel fits with the Sailfish visual style and behavior and enables
unique Sailfish UI application features, such as pulley menus and application covers.
Open source code
Naturally, we are providing the open source code used in this release. You can find
this at releases.sailfishos.org. In the event the source code for a binary was not provided to
you along with the binary, you may also receive a copy of the source code on physical media
by submitting a written request to us. More information is available in the written offer for
source code.
API Documentation
In this section, you will find relevant documentation that you can refer to when
developing Sailfish OS applications. We will add more API documentation here as they
become available.
Silica Documentation
The Sailfish SDK includes Sailfish Silica, a QML module for developing your own
Sailfish applications. Sailfish applications are written with a combination of QML and C++
code. QML is a declarative language provided by the Qt framework that makes it easy to
create stylish, custom user interfaces with smooth transitions and animations; a QML-based
user interfaces can be connected to a C++ based application back-end that implements more
complex application functionality or accesses third-party C++ libraries.
CONCLUSION
Sailfish OS is promoted and supported by the open Sailfish Alliance established in
2011, a group established to unite OEM and ODM manufacturers, chipset providers,
operators, application developers and retailers.[54] On 16 August 2012, the user interface
was reported to be ready for release. Jolla's CEO Jussi Hurmola stated in a ZDNet interview,
“Our UI is ready now, we haven't released it yet, we will save it for the product launch and
the platform is getting up now so the project looks pretty nice"
Priyanka
3/3 MCA
34
ABSTRACT:
A Blackberry is a personal communications device developed, distributed, and
serviced by Research in Motion (RIM), a Canadian company headquartered in Waterloo,
Ontario a .Blackberry can provide email, text messaging, web browsing, and telephone
service. It is an example of a convergent device. A BlackBerry is an end-to-end wireless
email solution that allows access to your Outlook Inbox, Calendar, Contacts, and Tasks with
full wireless synchronization. The BlackBerry Server constantly communicates with the
campus Exchange server (that talks as soon as something comes into your Outlook for
Exchange email, the BlackBerry server gets a copy and sends it to your device through the
Internet. Your device receives that information through the Internet using your carrier's
preferred network.
Introduction of BlackBerry Technology:-
BlackBerry handhelds are integrated into an organization's e-mail system through a
software package called “BlackBerry Enterprise Server "(BES). Versions of BES are
available for Microsoft Exchange, Lotus Domino and Novell GroupWise. While individual
users may be able to use a wireless provider's e-mail services without having to install BES
themselves, organizations with multiple users usually run BES on their own network. Some
third-party companies provide hosted BES solutions. Every BlackBerry has a unique id called
BlackBerry PIN which is used to identify the device to the BES. BES can act as a sort of e-
mail relay for corporate accounts so that users always have access to their e-mail. The
software monitors the user's local "inbox", and when a new message comes in, it picks up the
message and passes it to RIM's Network Operations Center (NOC).
35
How it works:-
As we all know, there is always software behind the hardware. This holds true for the
blackberry as well. Blackberry Server Software comes in two forms
1. BlackBerry Professional Software (BPS)
2. BlackBerry Enterprise Server (BES)
The way that the BlackBerry server works applies to both the BlackBerry Professional
Software (BPS) and the BlackBerry Enterprise Server (BES)
36
The basic steps in receiving an email on a blackberry device are as follows:
s1. The email message is sent.
2. Message arrives at your email server (usually the exchange server) and is sent as normal to
your PC/ Laptop (as in fig 3.1).
3. The BlackBerry server (the mail is delivered using a "push" concept to the Blackberry
Enterprise Server) compresses, encrypts and forwards the message automatically to your
BlackBerry handset.
4. Message arrives at the BlackBerry via the Internet and the mobile carrier's network.
5. The Blackberry handheld device receives decrypts and decompresses the email, and alerts
the user.
Blackberry Enterprise Server:
BlackBerry Enterprise Server is the fully-featured BlackBerry mobile email service as
in fig 3.2.1. It's designed for medium to large organizations with their own Lotus Domino or
Microsoft Exchange servers for email and mobile data applications, that are going to start
with at least 20 users and grow from there.
37
Conclusion:-
The BlackBerry Style is an impressive little device. It proved useful, reliable, and
even has dare I say it style.
The clamshell form factor grew on me very quickly, especially given the usefulness of the
external screen.
RIM proves with this Smartphone that it still can deliver an innovative new device
rather than just a refresh of a proven model. Seasoned pros and BlackBerry newbie’s
alike will both find a lot to like about the Style.
Every technology has pros and cons
Pros:
• Stylish clamshell design
• External display very useful
• BlackBerry OS 6.0 brings refreshed apps
Cons:
• Occasional lags in performance
• Casing collects enough fingerprints to provide a permanent record
• Awkward angle when taking head-on pictures, so-so camera.
Harika
3/3 MCA
38
ABSTRACT:
Honey pots teach us how to track black-hats in the act of probing for and
compromising a system. This paper discusses just that. Here we learn how honey pots are
built, implemented and monitored.
A honey pot network is designed specifically to learn how black-hats work. Honey
pots are extremely powerful, not only can be used to gain extensive information on threats,
information few other technologies are capable of gathering.
INTRODUCTION:
A honey pot is a system designed to teach how black-hats probe for and exploit a
system. By learning their tools and methods, you can then better protect your network and
systems. A well designed honey pot means the black-hat never knew he was being tracked.
First, no honeypot can catch/capture all the bad guys out there. There are too many ways to
spoof/hide your actions. Second, keep in mind that you are playing with fire. Someone far
more advanced then you may compromise your honeypot, leaving you open to attack. Third,
throughout this paper I use the term black-hat. I define a black-hat as anyone who is
attempting un-authorized access to a system.
39
Types of honey pots:
Honey pots can be classified based on their deployment and based on their level of
involvement. Based on the deployment, honey pots may be classified as:
1. Production Honey pots
2. Research Honey pots
1. Production honey pots
They are easy to use, capture only limited information, and are used primarily by
companies or corporations; Production honey pots are placed inside the production network
with other production servers by organization to improve their overall state of security.
2. Research honey pots
They are run by a volunteer, non-profit research organization or an educational
institution to gather information about the motives and tactics of the Black hat community
targeting different networks. These honey pots do not add direct value to a specific
organization. Instead they are used to research the threats organizations face, and to learn
how to better protect against those threats.
40
4. Honeyed (low-interaction)
• Solution emulates operating systems and services. Easy to install and deploy.
• Usually requires simply installing and configuring software on computer.
• Minimal risk as emulating services control what attakers can and cannot do.
• Captures limited amount of information, mainly transactional data .
Honey net (high-interaction):
• No emulation, real operating systems and services are provided. Can capture far more
information including new tools, communications or attacker keystrokes.
• Can be complex to install or deploy( commercial versions tend to be much simpler).
• Has increased risk as attackers are provided real operating systems to interact.
5. Where to Begin Honey pot:
There are a variety of different approaches to build a honey pot. This is based on
simplicity. Build a standard box that u wanted to learn how the black-hat community was
compromising. Don't do anything special to this system, build it as you would any other.
Then put the system on the Internet and wait. Sooner or later someone will find the system
and attack it. The system is built to be attacked and compromised, someone will gain root on
that system that is the goal.
41
6. The Plan:
Plan is simple. Build a box u wanted to learn about, put it on the network, and then
wait. However, there were several problems to this. First, how do u track the black-hats
moves? Second, how do I alert myself when the system is probed or compromised? Last,
how do u stop the black-hat from compromising other systems? The solution to this is
simple, put the honey pot on its own network behind a firewall. This solves a variety of
problems. The goal is to have our honeypot behind a controlled system. Most firewalls will
do, as long as it can both control and log traffic going through it.
7. Tracking Their Moves:
Now, the real trick becomes how to track their moves without them knowing it. First,
you do not want to depend on a single source of information. Something can go wrong,
things can be erased, etc. I prefer to track in layers. My third layer of tracking (the firewall is
the first, sys logged hack is the second) is to use a sniffer. I run a sniffer on the firewall that
sniffs any traffic going to or from the honeypot. Since the honeypot is isolated by the
firewall, you know all traffic goes through the firewall. The advantage of a sniffer is it picks
up all keystrokes and screen captures, to include STDIN, STDOUT, and STDERR.
This way you see exactly what the black-hat is seeing. All the information is stored
on the firewall, safely protected from the black-hat.
42
8. How to prevent attacks:
Honeypots can help prevent attacks in several ways. The first is against automated
attacks, such as worms or auto-rooters. These attacks are based on tools that randomly scan
entire networks looking for vulnerable systems. If vulnerable systems are found, these
automated tools will then attack and take over the system (with worms self-replicating,
copying themselves to the victim).
If an attacker knows your organization is using honeypots, but does not know which
systems are honeypots and which systems are legitimate computers, they may be concerned
about being caught by honeypots and decided not to attack your organizations. Thus the
honeypot deters the attacker.
CONCLUSION:
The purpose of this paper was to define what honey pots are and their value to the
security community. Honey pots are an extremely powerful tool that allows you to learn
about the black-hat community. The key to tracking the enemy is layers. Do not depend on a
single layer of information, as it can be altered or lost. If you are interested in learning more
about honey pots, you may want to consider the book Honey pots: Tracking Hackers, the first
and only book dedicated to honey pot technologies.
Sri Avinash
3/3 MCA
43
ABSTRACT:
ZigBee is an IEEE 802.15.4 standard for data communications with business and
consumer devices. It is designed around low-power consumption allowing batteries to
essentially last forever. The ZigBee standard provides network, security, and application
support services operating on top of the IEEE 802.15.4 Medium Access Control (MAC) and
Physical Layer (PHY) wireless standard. It employs a suite of technologies to enable
scalable, self-organizing, self-healing networks that can manage various data traffic patterns.
ZigBee is a low-cost, low-power, wireless mesh networking standard. The low cost allows
the technology to be widely deployed in wireless control and monitoring applications, the
low power-usage allows longer life with smaller batteries, and the mesh networking provides
high reliability and larger range. ZigBee has been developed to meet the growing demand for
capable wireless networking between numerous low- power devices. In industry ZigBee is
being used for next generation automated manufacturing, with small transmitters in every
device on the floor, allowing for communication between devices to a central computer. This
new level of communication permits finely-tuned remote monitoring and manipulation.
INTRODUCTION:
ZigBee is an established set of specifications for wireless personal area networking
(WPAN), i.e. digital radio connections between computers and related devices. WPAN Low
Rate or ZigBee provides specifications for devices that have low data rates, consume very
low power and are thus characterized by long battery life. ZigBee makes possible completely
networked homes where all devices are able to communicate and be controlled by a single
unit. The ZigBee Alliance, the standards body which defines ZigBee, also publishes
application profiles that allow multiple OEM vendors to create interoperable products. The
current list of application profiles either published or in the works are:
•Home Automation
•ZigBee Smart Energy
•Telecommunication Applications
•Personal Home
44
ZIGBEE CHARACTERISTICS:
The focus of network applications under the IEEE 802.15.4 / ZigBee standard include
the features of low power consumption, needed for only two major modes (Tx/Rx or Sleep),
high density of nodes per network, low costs and simple implementation.
These features are enabled by the following characteristics,
•2.4GHz and 868/915 MHz dual PHY modes. This represents three license-free bands: 2.4-
2.4835GHz, 868-870 MHz and 902-928 MHz The number of channels allotted to each
frequency band is fixed at sixteen (numbered 11-26), one (numbered 0) and ten (numbered 1-
10) respectively. The higher frequency band is applicable worldwide, and the lower band in
the areas of North America, Europe, Australia and New Zealand.
•Maximum data rates allowed for each of these frequency bands are fixed as 250 kbps @2.4
GHz, 40 kbps @ 915 MHz, and 20 kbps @868 MHz
•High throughput and low latency for low duty- cycle applications (<0.1%)
•Channel access using Carrier Sense Multiple Access with Collision Avoidance (CSMA -
CA)
•Addressing space of up to 64 bit IEEE address devices, 65,535 networks
45
TRAFFIC TYPES:
1. Data is periodic. The application dictates the rate, and the sensor activates checks for data
and deactivates.
2. Data is intermittent. The application, or other stimulus, determines the rate, as in the case
of say smoke detectors. The device needs to connect to the network only when
communication is necessitated. This type enables optimum saving on energy.
3. Data is repetitive, and the rate is fixed a priori. Depending on allotted time slots, called
GTS (guaranteed time slot), devices operate for fixed durations.
ZigBee employs either of two modes, beacon ornon-beacon to enable the to-and-fro data
traffic. Beacon mode is used when the coordinator runs on batteries and thus offers maximum
power savings, whereas the non-beacon mode finds favour when the coordinator is mains-
powered.
In the beacon mode, a device watches out for the coordinator's beacon that gets transmitted at
The non-beacon mode will be included in a system where devices are ‘asleep' nearly always,
as in smoke detectors and burglar alarms. The devices wake up and confirm their continued
presence in the network at random intervals.
On detection of activity, the sensors ‘spring to attention', as it were, and transmit to the ever-
waiting coordinator's receiver (since it is mains- powered). However, there is the remotest of
chances that a sensor finds the channel busy, in which case the receiver unfortunately would
‘miss a call'.
46
ARCHITECTURE:
ZigBee is a home-area network designed specifically to replace the proliferation of
individual remote controls. ZigBee was created to satisfy the market's need for a cost-
effective, standards-based wireless network that supports low data rates, low power
consumption, security, and reliability. To address this need, the ZigBee Alliance, an industry
working group (www.zigbee.org), is developing standardized application software on top of
the IEEE 802.15.4 wireless standard. The alliance is working closely with the IEEE to ensure
an integrated, complete, and interoperable network for the market. For example, the working
group will provide interoperability certification testing of 802.15.4 systems that include the
ZigBee software layer.
ZigBee-compliant products operate in unlicensed bands worldwide, including 2.4GHz
(global), 902 to 928MHz (Americas), and 868MHz (Europe). Raw data throughput rates of
250Kbps can be achieved at 2.4GHz (16 channels), 40Kbps at 915MHz (10 channels), and
20Kbps at 868MHz (1 channel). The transmission distance is expected to range from 10 to
75m, depending on power output and environmental characteristics. Like Wi-Fi, Zigbee
uses direct-sequence spread spectrum in the 2.4GHz band, with offset-quadrature phase-
shiftkeying modulation. Channel width is 2MHz with 5MHz channel spacing. The 868 and
900MHz bands also use direct-sequence spread spectrum but with binary-phase-shift keying
modulation.
CHANNEL ACCESS, ADDRESSING:
Two channel-access mechanisms are implemented in 802.15.4. For a non"beacon
network, a standard ALOHA CSMA-CA (carrier-sense medium-access with collision
avoidance) communicates with positive acknowledgement for successfully received packets.
In a beacon-enabled network, a super frame structure is used to control channel access. The
super frame is set up by the network coordinator to transmit beacons at predetermined
intervals (multiples of 15.38ms, up to 252s) and provides 16 equal-width time slots between
beacons for contention-free channel access in each time slot. The structure guarantees
dedicated bandwidth and low latency. Channel access in each time slot is contention-
based. However, the network coordinator can dedicate up to seven guaranteed time slots per
beacon interval for quality of service.
Device addresses employ 64-bit IEEE and optional16-bit short addressing. The
address field within the MAC can contain both source and destination address information
(needed for peer-to-peer operation). This dual address information is used in mesh networks
to prevent a single point of failure within the network.
47
DEVICE TYPES:
These devices have 64-bit IEEE addresses, with option to enable shorter addresses to
reduce packet size, and work in either of two addressing modes – star and peer-to-peer.
ZigBee networks use three device types:
•The network coordinator maintains overall network knowledge. It's the most sophisticated
of the three types and requires the most memory and computing power.
•The full function device (FFD) supports all 802.15.4 functions and features specified by the
standard. It can function as a network coordinator. Additional memory and computing power
make it ideal for network router functions or it could be used in network-edge devices (where
the network touches the real world).
•The reduced function device (RFD) carries limited (as specified by the standard)
functionality to lower cost and complexity. It's generally found in network-edge devices.
SECURITY:
Security and data integrity are key benefits of the ZigBee technology. ZigBee
leverages the security model of the IEEE 802.15.4 MAC sublayer which specifies four
security services:
•access control—the device maintains a list of trusted devices within the network
•data encryption, which uses symmetric key128-bit advanced encryption standard
•frame integrity to protect data from being modified by parties without cryptographic keys
•sequential freshness to reject data frames that have been replayed—the network controller
compares the freshness value with the last known value from the device and rejects it if the
freshness value has not been updated to a new value
The actual security implementation is specified by the implementer using a standardized
toolbox of ZigBee security software.
48
The following table-1 shows the Wireless technology comparison chart,
Standard Bandwidth Power Protocol Stronghold Applications
Consumption Stack Size
Wi-Fi Up to
400+mA TX, 100+KB High data rate Internet browsing,
54Mbps standby 20mA PC networking, file
transfers
Bluetooth 1Mbps 40mA TX, ~100+KB Interoperability, Wireless USB,
standby 0.2mA cable replacement handset, headset
ZigBee 250kbps 30mA TX, 4"32KB Long battery life, Remote control,
standby low cost battery-operated
3#&956;A products, sensors
CONLUSION:
It is likely that ZigBee will increasingly play an important role in the future of
computer and communication technology. In terms of protocol stack size, ZigBee's 32 KB is
about one-third of the stack size necessary in other wireless technologies (for limited
capability end devices, the stack size is as low as 4 KB). The IEEE802.15.4–based ZigBee is
designed for remote controls and sensors, which are very many in number, but need only
small data packets and, mainly, extremely low power consumption for (long) life. Therefore
they are naturally different in their approach to their respective application arenas. The
ZigBee Alliance targets applications "across consumer, commercial, industrial and
government markets worldwide". Unwired applications are highly sought after in many
networks that are characterized by numerous nodes consuming minimum power and enjoying
long battery lives. ZigBee technology is designed to best suit these applications, for the
reason that it enables reduced costs of development and very fast market adoption.
Gopi Krishna
3/3 MCA
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72