bapatla engneering college

72
1

Upload: others

Post on 19-Nov-2021

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: BAPATLA ENGNEERING COLLEGE

1

Page 2: BAPATLA ENGNEERING COLLEGE

2

Page 3: BAPATLA ENGNEERING COLLEGE

3

BAPATLA ENGNEERING COLLEGE

BAPATLA

Page 4: BAPATLA ENGNEERING COLLEGE

4

CCOOPPEE--22KK1177 THE EVER LASTING VISION……

7th Edition

DEPARTMENT OF MCA

ABOUT COLLEGE

Page 5: BAPATLA ENGNEERING COLLEGE

5

Bapatla Engineering College is one of the institutions out of seven

institutions run by BAPATLA EDUCATIONAL SOCIETY. Society was

established in the year 1962. This college is one of the few engineering colleges

in Andhra Pradesh with NBA (National Board of Accreditation) certificate from

the AICTE (All India Council for Technical Education, New Delhi established

in the year 1981.

The college was initially affiliated to ANDHRA UNIVERSITY and later

to NAGARJUNA UNIVERSITY from 1984 onwards. The eight B.Tech

Courses which are accredited are: Civil, CSE, ECE, EEE, EIE, Mechanical, IT

and Chemical engineering. The college also offers 3-M.tech courses in

engineering, 5-P.G courses in sciences and Masters of Computer Applications

(MCA) with an in take of 294.

In addition to this, the college is also registered with Dept of Scientific

&Industrial Research for the purpose of availing Customs duty exemption. The

college is also selected for the Network Institute for the “Technical Education

Quality Improvement Program” (TEQIP) of the Ministry of Human Resources

Development & the World Bank.

Presently the college intake was about 900 students with additional intake

of 10% through lateral admissions in to second year.

We Feel Proud to say about our college as it provides wills & trusts to lead a

successful life.

Page 6: BAPATLA ENGNEERING COLLEGE

6

The department of MCA was started in 1997 with an intake of 60 per

annum. The department is equipped with experienced staff members and knows

for its excellence in academic performances. The pass percentage of the

department is more than 96% every year.

The faculty encourages the students for participating in extra curriculum

activities, so that they can enhance their skills in all the ways.

The students have won laurels to the college winning prizes in

competitions. The department strives hard to keep the students on the edge of

present day technologies. This is very useful for students to survive in the outer

world.

About Department

Page 7: BAPATLA ENGNEERING COLLEGE

7

MESSAGE FROM PRESIDENT

My best wishes to the students of the department of MCA on the release

of the 6th edition of the department magazine Scope. There is no end to the

pursuit of the technology. Exposure to the word is the key to the perception. I

deem, scope is the embodiment of the technical and literal articles. I acclaim the

exceptional works done by the departmental association for organizing technical

and literal events. Such events propel the students towards success.

I congratulate the association for their incessant efforts in bringing out the

dominant skills of the students. My best wishes for all students.

Sri M.SeshagiriRao

PRESIDENT

Bapatla Engineering College, Bapatla.

Page 8: BAPATLA ENGNEERING COLLEGE

8

I felicitate the department of computer science and engineering for the

triumph of releasing the 6th edition of the annual magazine Scope which covers

the latest developments in technology by which covers the latest developments

in technology by way of articles.

We live in an information age it is estimated that the knowledge is

doubling every year so, in order to compatible today’s world it is necessary to

be updated with the latest technology.

The departmental associations can play an important role through the

magazine scope to make the students aware of these developments; it also helps

the students in bringing out the dormant skills in to action.

I wish you to all to excel in all the activities that will be taken up in the

future.

MESSAGE FROM PRincipal

Dr.N.Sudhakar

Principal

Bapatla Engineering College, Bapatla.

Page 9: BAPATLA ENGNEERING COLLEGE

9

MESSAGE FROM hod

It is a moment elation to be part of the release of Scope-2K16 the legacy

of the department of MCA is up held with great reverence and austerity. The

meticulous and tenacious efforts in bringing up this magazine are unequivocally

laudable. The demands of the industry encompass creativity team spirit and a

subtle sense of sacrifice apart from technically honed diligence. Products like

tech-magazines, newsletters, cultural fests certainly inculcate these senses

amongst the students. Philosophically, the aura that prevails in the department is

a high potential medium that radiates the spirit exuded by each of us.

I wish that of us be committed to the promise of being a well-defined

functional module of this aura. Modesty prevents me from congratulating only

the MCA students excluding all those who padded bits to Scope-2K16 in

different forms and segments. I thank the administration for facilitating and

patronizing these activities.

K.N.PRASAD

HEAD OF THE DEPARTMENT

Master of Computer Applications

Bapatla Engineering College, Bapatla.

Page 10: BAPATLA ENGNEERING COLLEGE

10

MESSAGE FROM CO-ORDINATOR

Success occurs when off to opportunity meets preparation. I am glad to

note that coordinates pave a path for the students through the magazine

Scope-2K16 which covers a wide range of topics.

It is an agreeable fact that technical knowledge alone doesn’t make a

complete student. Extracurricular activities are equally important in changing

the approach of students and to visualize the problems from a different

perspective.

I deem, this magazine is the perfect blend of the technical and literal

topics. I congratulate MCA students for this remarkable work. Through the

magazine scope, I wish all the students the best in their future.

N.KIRAN KUMAR

STAFF CO-ORDINATOR

Dept of MCA

Bapatla Engineering College, Bapatla.

Page 11: BAPATLA ENGNEERING COLLEGE

11

Page 12: BAPATLA ENGNEERING COLLEGE

12

Page 13: BAPATLA ENGNEERING COLLEGE

13

Page 14: BAPATLA ENGNEERING COLLEGE

14

Page 15: BAPATLA ENGNEERING COLLEGE

15

E-mail id’s of 2014-2017 batch

S.NO

REGD.NO

NAME OF THE

STUDENT

E-MAIL ID

1 Y15MC23001 A.Lakshmi Priyanka [email protected]

2 Y15MC23002 A.Ashok Kumar [email protected]

3 Y15MC23003 A.Ajay Kumar [email protected]

4 Y15MC23004 A.Harika [email protected]

5 Y15MC23005 A.Nandini [email protected]

6 Y15MC23006 B.Srinivasa Reddy [email protected]

7 Y15MC23007 B.Abhijit Reddy [email protected]

8 Y15MC23008 Ch.Mounika [email protected]

9 Y15MC23009 Ch.Ramakrishna [email protected]

10 Y15MC23010 E.Sruthi [email protected]

11 Y15MC23011 E.Prathap [email protected]

12 Y15MC23012 G.Sowjanya [email protected]

13 Y15MC23013 J.Surendra Babu [email protected]

14 Y15MC23015 K.Gopi Krishna [email protected]

15 Y15MC23016 K.Gurunath Babu [email protected]

16 Y15MC23017 K.Rajesh [email protected]

17 Y15MC23018 K.Kalpana [email protected]

18 Y15MC23019 K.Jyothi [email protected]

19 Y15MC23020 M.Rajasekhara Reddy [email protected]

20 Y15MC23021 M.Vinitha [email protected]

21 Y15MC23022 M.Srilekha [email protected]

22 Y15MC23023 N.Jhansi Rani [email protected]

23 Y15MC23024 P.Sri Avinash [email protected]

24 Y15MC23025 P.Lakshmi Devi [email protected]

25 Y15MC23026 P.Anil [email protected]

26 Y15MC23027 P.Vamsi Kumari [email protected]

27 Y15MC23028 R.Eswar Reddy [email protected]

28 Y15MC23029 R.Laxminath [email protected]

29 Y15MC23030 R.Padma [email protected]

30 Y15MC23031 R.Sravana Lakshmi [email protected]

31 Y15MC23032 S.Harika [email protected]

32 Y15MC23033 S.Kavitha [email protected]

33 Y15MC23034 U.V.Koteswara Rao [email protected]

34 Y15MC23035 V.Raja Kumari [email protected]

35 Y15MC23036 V.Rama Krishna [email protected]

36 Y15MC23038 Y.Gopi [email protected]

37 Y15MC23039 Sk.Rihana [email protected]

Page 16: BAPATLA ENGNEERING COLLEGE

16

E-mail id’s of 2015-2018 batch

S.N

O

REGD.NO

NAME OF THE

STUDENT

E-MAIL ID

1 Y16MC23001 A.Venkateswarlu [email protected]

2 Y16MC23002 A.Sudha Rani [email protected]

3 Y16MC23003 B.Sivaji [email protected]

4 Y16MC23004 B.Sai Lavanya [email protected]

5 Y16MC23005 B.Srilekha [email protected]

6 Y16MC23006 D.Varalakshmi [email protected]

7 Y16MC23007 G.Ravindra Babu [email protected]

8 Y16MC23008 G.Srinivasa Reddy [email protected]

9 Y16MC23009 G.Harshitha [email protected]

10 Y16MC23010 G.Jyothirmai [email protected]

11 Y16MC23011 G.Ashok [email protected]

12 Y16MC23012 J.Pavan Kumar [email protected]

13 Y16MC23013 K.Sai Lakshmi [email protected]

14 Y16MC23014 K.Geethanjali [email protected]

15 Y16MC23015 K.Srikanth [email protected]

16 Y16MC23016 K.Srilatha [email protected]

17 Y16MC23017 K.Mounika [email protected]

18 Y16MC23018 K.Suhasini [email protected]

19 Y16MC23019 K.Siva [email protected]

20 Y16MC23020 K.shiny [email protected]

21 Y16MC23021 M.Padmavathi [email protected]

22 Y16MC23022 M.Nagarjuna [email protected]

23 Y16MC23023 M.Lakshmi [email protected]

24 Y16MC23024 M.Venkata Adilakshmi [email protected]

25 Y16MC23026 M.Rajesh [email protected]

26 Y16MC23027 M.Srinivasa Rao [email protected]

27 Y16MC23028 M.Revanth Sai [email protected]

28 Y16MC23029 M.Nagendra [email protected]

29 Y16MC23030 N.Siva Sankar Raju [email protected]

30 Y16MC23031 P.Nagalakshmi [email protected]

Page 17: BAPATLA ENGNEERING COLLEGE

17

31 Y16MC23032 P.Gopi [email protected]

32 Y16MC23033 P.Anantha Nadh [email protected]

33 Y16MC23034 P.Ramanji [email protected]

34 Y16MC23035 P.Lavanya [email protected]

35 Y16MC23036 Sk.Rajak [email protected]

36 Y16MC23037 Sk.Gousiya [email protected]

37 Y16MC23038 T.Bhagavan Sai Chand [email protected]

38 Y16MC23039 T.Srilakshmi [email protected] 39 Y16MC23040 V.Supraja [email protected] 40 Y16MC23041 V.Harish [email protected] 41 Y16MC23042 V.Sowndarya [email protected] 42 Y16MC23043 S.Venkata Ramaiah [email protected]

Page 18: BAPATLA ENGNEERING COLLEGE

18

E-mail id’s of 2016-2019 batch

S.N

O

REGD.NO

NAME OF THE STUDENT

E-MAIL ID

1 Y17MC23001 B.Vijay Kumar Reddy [email protected]

2 Y17MC23002 Ch.Swetha Bhavani [email protected]

3 Y17MC23003 Ch.Vamsi Chakradhar [email protected]

4 Y17MC23004 D.Ciciliya [email protected]

5 Y17MC23005 D.Pothuraju [email protected]

6 Y17MC23006 D.Suresh [email protected]

7 Y17MC23007 E.Venkata Padmaja [email protected]

8 Y17MC23008 E.Edukondalu [email protected]

9 Y17MC23009 G.Sairam [email protected]

10 Y17MC23010 I.Yamini [email protected]

11 Y17MC23011 K.Pavan Kumar [email protected]

12 Y17MC23012 K.Narasimha Reddy [email protected]

13 Y17MC23013 K.Nagaprakash [email protected]

14 Y17MC23014 M.Rama Koteswararao [email protected]

15 Y17MC23015 M.Sobha Rani [email protected]

16 Y17MC23016 Md.Ishok [email protected]

17 Y17MC23017 M.Venkata Ravi Kumar [email protected]

18 Y17MC23018 N.Swarnalatha [email protected]

19 Y17MC23019 P.Venkatanaga Gayatri [email protected]

20 Y17MC23020 P.Vani [email protected]

21 Y17MC23021 P.Rajeswari [email protected]

22 Y17MC23023 R.Leela Saipreethi [email protected]

23 Y17MC23024 S.Sri Lakshmi Parvathi [email protected]

24 Y17MC23025 Sk.Khajabee [email protected]

25 Y17MC23026 Sk.Malin [email protected]

26 Y17MC23027 Sk.Sana [email protected]

27 Y17MC23028 T.Nagavenkata Mainkanta [email protected]

28 Y17MC23029 T.Harika [email protected]

29 Y17MC23030 V.Tarun Kumar Reddy [email protected]

30 Y17MC23031 V.Narasimha [email protected]

31 Y17MC23032 V.Gayathri [email protected]

32 Y17MC23033 V.Narendra [email protected]

33 Y17MC23034 Y.Sri Basava Teja [email protected]

Page 19: BAPATLA ENGNEERING COLLEGE

19

Page 20: BAPATLA ENGNEERING COLLEGE

20

Never forget 3 types of people in your life

Who helped you in your difficult time!

Who left you in your difficult time!

Who put you in difficult time!

I am Responsible for what I say,

I am not responsible for what you understand.

Life is not qualified by fluent English,

Branded clothes or a rich life style.

It is measured by the number of faces,

who smile when they hear your name.

None can destroy Iron, but its own rust can!

Likewise, none can destroy a person,

But his own mindset can …….

Soundarya

Page 21: BAPATLA ENGNEERING COLLEGE

21

Alphabet ‘O’ stands for ‘OPPORTUNITY’

Which is absent in YESTERDAY

Available once in T’O’DAY

And Thrice in T’O’M’O’RR’O’W

Never Lose “HOPE”

Challa. Swetha bhavani

Don’t take rest after your FIRST VICTORY because IF you FAIL in SECOND.

More LIPS are WAITING to SAY that your FIRST VICTORY was just LUCK.

Don’t read success stories,

You will only get a message.

Read failure stories,

You will get some ideas to get success.

M.Sobharani

Page 22: BAPATLA ENGNEERING COLLEGE

22

Don’t fear for facing failure in the first attempt,

Because even the successful maths start with “Zero” only.

One best book is equal to hundred good friends, but

One good friend is equal to a ‘library’.

Confidence and hard-work is the best medicine

To kill the disease called failure.

It will make you a successful person.

p.rajeswari

Page 23: BAPATLA ENGNEERING COLLEGE

23

Never explain yourself to anyone

You don’t need anyone’s approval

Live your life and do what makes you happy.

You cannot change your future, but you change

Your habits, and surely your habits

will change your future.

Relations are like electric currents.

Wrong connections will give you shocks throughout your life.

But the right ones light up your life.

SUCCESS is when your “Signature” changes to “Autograph”.

It you can’t fly then run, it you can’t run then walk,

It you can’t walk then crawl, but whatever you do you have to keep Moring forward.

V.GAYATHRI

Page 24: BAPATLA ENGNEERING COLLEGE

24

THE IMPORTANT THINGS IN LIFE

A philosophy professor stood before his class with some items on the

table in front of him. When the class began, wordlessly he picked up a very

large and empty mayonnaise jar and proceeded to fill it with rocks, about 2

inches in diameter.

He then asked the picked up a box of pebbles and poured them into the

jar. He shook the jar lightly. The pebbles, of course, rolled into the open areas

between the rocks.

He then asked the students again if the jar was full. They agreed it was.

The professor picked up a box of sand and poured it into the jar of course, the

sand filled up the remaining open areas of the jar.

He then asked once more if the jar was full. The students responded with

a unanimous “yes”.

“Now”, said the professor, I want you to recognize that this jar represents

your life. The rocks are the important things your family, your partner, your

health, your children things that if everything else was lost and only they

remained, your life would still be full. The pebbles are the other things that

matter like your job, your house, your Car. The sand is everything else, the

small stuff.

If you put the sand into the jar first, he continued, there is no room for the

pebbles or the rocks. The same goes for your life. If you spend all your time and

energy on the small stuff, you will never have room for the things that are

important to you. Pay attention to the things that are critical to your happiness.

Pay with your children. Take your partner out dancing. There will always be

time to go to work, clean the house, give a dinner party, or fix the disposa.

“Take care of the rocks first the things that really matter. Set your

priorities. The rest is just sand.”

soundarya

2/3 mca

Page 25: BAPATLA ENGNEERING COLLEGE

25

ప్రతిజ్ఞ!

భారత దేశం నా మాతృ భూమి, భారతీయులందరూ నా సహో దరులు... అని ప్రతిజ్ఞ చసే్త ాం.

క్నీ నిజ్ానికి అలా ఎాంతమాంది ప్టిస్తత న్నారు.

➢ నిజ్ాంగ్ అాందరిని స్హో దరులుగ్ చూస్తత ఒక మతాం వ్డు వేరొక మతాం వ్డిని, ఒక

కులాం వ్డు వేరొక కులాం వ్డిా ఎలా నరుకకొని చాంప్ుకో గలుగుతున్నారు. ఒక ే

ఊరిలో నివస్ ాంచే ఆడప లల లప ై ఆ ఊరి యువతే హతనాచనరాం చేస్ న స్ాంఘటనలు ఎనిా చూడలేదత. ఒక ేఊరిలో నివస్ ాంచే తోట ివ్ళ్లన్ే స్హో దరులుగ్ చూడలేని ఈ

జ్నాం జిలాల లోల , ర్ష్ట్ర ా లోల , దేశాంలో ఉనా ప్రజ్ల్నా మాతరాం స్హో దరులుగ్ ఎలా చూడగలరు.

నేను నా దేశాన్ని ప్రరమిసుు నాిను

➢ అవునత దేశ్నిా బాగ్ పతరమిస్త రు.... ఎాందతకాంట ేతప్ుు చసే్తత కఠిన శిక్షలు వేయరు గనతక. ఒక వేళా వేస్ న తేల్నగ్ా తప ుాంచతకోవచతు... అాందతకే స్తస్ాంప్నామ ైన

బహువిధమ ైన న్న దేశప్ు వ్రస్తవ స్ాంప్ద న్నకు గరవక్రణాం, దీనికి అరహత

ప ాందడననికి స్రవదన న్నేత కృష చేస్త నత. ఇది న్న దేశాం అని అనతకుాంటే దశే

స్ాంప్దనత అవినీతి రూప్ాంలో, కుాంభకోణనల రూప్లోల ఎాందతకు దోచతకోగలుా తున్నారు.

➢ వ్రస్తవ స్ాంప్ద అాంటే డబుులు, నగలు, భూములు, క్దాండీ... దేశ స్ాంప్రదనయాం,

మాంచితనాం, మానవతవాం, నిర్డాంబరత మొ' నవి. అవ ేఉాంటే మన దేశాంలో పతదవ్డు ధనికుడు అన్ ేతరతమామ ేఉాండేది క్దత.

Page 26: BAPATLA ENGNEERING COLLEGE

26

నా తలి్లదండ్రర ల్లి, ఉపాధ్ాాయుల్లి, ప్ెదదల్లి గౌరవిస్ాు ను

➢ నిజ్ానికి ప లల ల్నా 6 స్౦' లకు బడికి ప్ాంప ాంచనల్న క్నీ ఇప్ుటి తల్నలదాండుర లు 3 స్౦'

లక,ే మాటలు వచ్చు ర్కుాండనన్ే NURSERY లో వేస్తత న్నారు. NURSERY నతాండ ి

P.G వరకు HOSTEL ఉాంచి చదివిస్తత న్నారు తల్నలదాండుర లు. అలాాంటి తల్నలతాండుర ల

ప లల లు తల్నలతాండుర ల పతరమకు దూరాం అవుతున్నారు. ➢ విదాని [అాందిాంచ వలస్ న] బో దిాంచ వలస్ న ఉప్ధ్నాయులే విదా అభాస్ ాంచే

విదనారుు లనత ప ళ్లల చేస్తకునా స్ాంఘటనలు ఎనిా చూడలేదత.(10 వ తరగతి చదవిే విదనారిుతో ఉప్ధ్నాయుర్ల్న ప ళ్లల)

➢ మనవర్ల్న వయస్తలో ఉనా ఆడప లల లనత చూస్ ఎాంత మాంది స్భాత గ్ ఉాంటున్నార ీస్మాజ్ాంలో?(62 years old man was arrested for harassing

women)

“నా దేశం ప్టి్ నా ప్రజ్ల ప్టి్ సరవా న్నరతితో ఉంట్ానన్న చేసిన ప్రతిజ్ఞ ఎవరూ పాట్ ంచడ్ంలేదు”

➢ ఈ రోజులోల విదనారాంగాం ఒక వ్ాప్రాంగ్ మారిపో యాంది, అాందరూ

చదతవుకుాంటున్నారు క్షమిాంచనల్న "చదతవు కకాంటున్నారు". విదనాలలేని వ్డు విాంత

ప్శువు అన్నారు ఒకప్ుుడు క్నీ విదా ఉనావ్డు కూడన విాంత ప్శువుగ్ ప్రవరితస్తత న్నారు ఈ రోజులోల .

➢ ఇలాాంటి న్న దేశ్నిా, దనరి తప ున న్న దేశ్నిా మాంచి మారాాంలోకి మార్ుల్న అని

అనతకుాంటున్నా, క్నీ ఇది స్ధాాం క్దేమో!

Page 27: BAPATLA ENGNEERING COLLEGE

27

➢ ఎాందతకాంట ే'మారుు' అన్ేది ఒకొడతిో మొదలవ్వల్న అన్ేది ప్త న్ననతడ.ి

ఎాందతకాంట ేఅప్ుటలల జ్న్నలు లక్షలోల ఉాండే వ్రు క్బటిర ఆ న్ననతడి. క్నీ ఇప్ుుడు ఆ లక్షలు కోటుల అయాాయ అాందతకే మారుు అన్ేది లక్షలోల మొదలవ్వల్న. ఇది కకతత న్ననతడి.

➢ ఈ మారుు విదనారుు లోల నతాంచ ేఉదభవిాంచనలని ఆశిస్తత న్నా....!

n.swarna latha

1/3 MCA

Page 28: BAPATLA ENGNEERING COLLEGE

28

Page 29: BAPATLA ENGNEERING COLLEGE

29

ABSTRACT

Sailfish OS is a Linux-based general-purpose operating system, widely known as a

mobile operating system combining the Linux kernel for a particular hardware platform use,

the open source Mer core middleware, the proprietary UI contributed by Jolla, and other third

party components some of which are free software, and others of which are proprietary.

Sailfish is being developed by Jolla in permanent cooperation with the Sailfish community

(which in open model makes development requests and decides development priorities in

voting), the Mer project and its community (open source project contributing middleware for

Jolla which also is active Mer project contributor, what assures compatibility of both projects

with established standard), corporate members of the Sailfish Alliance and various open

community members. Sailfish is used in the Jolla smart phone, the upcoming Jolla Tablet,

and by other licensees.

HISTORY AND DEVELOPMENT

The OS is an evolved continuation of the Linux MeeGo OS previously developed by

alliance of Nokia and Intel. The MeeGo legacy is contained in the Mer core in about 80% of

its code; the Mer name thus expands to MeeGo Reconstructed. olla and MERproject.org

follow meritocratic government to avoid the mistakes that lead to the MeeGo project's then-

unanticipated discontinuation. Sailfish 2.0 is currently in development for the announced

Jolla Tablet.

Page 30: BAPATLA ENGNEERING COLLEGE

30

SOFTWARE ARCHITECTURE

The Sailfish OS and the Sailfish software development kit (SDK) are based on

the Linux kernel and Mer. Sailfish OS includes a multi-tasking graphical shell called

"Lipstick" built by Jolla on top of the Wayland display server protocol. Jolla uses free and

open-source graphics device drivers but the Hybris library allows use of proprietary graphics

device drivers for Android. Jolla's stated goal is for Sailfish to be open source eventually.

Sailfish OS can run Android applications through a proprietary compatibility layer. Targeted

device classes Sailfish is commonly known to be targeted at mobile devices, but like MeeGo

previously and as part of its legacy, Sailfish can be used on any other device as a complete

general-purpose Linux OS, such as IVI, navigation, smart TV, desktops and notebooks,

yachts, automotive, e-commerce, house goods, et al.; See the Devices section for devices that

run the Sailfish OS.

Sailfish OS SDK

The Sailfish OS SDK was announced in Helsinki at Slush in 2012, and the alpha was

published in February 2013. The SDK, installation and coding tutorials are available for free

download from the Sailfish OS website although the overall license is not open source.

Sailfish SDK uses Qt with Virtual Box for development, compiling and emulation purposes,

in contrast to simulation method. According to Jolla, development with Sailfish SDK is

development on Sailfish OS itself; there are no differences between developed software

appearance and behavior in the SDK and on a device running Sailfish OS.

Application programming interfaces

Sailfish OS uses open source Qt APIs (Qt 5, Qt Quick 2 etc.) and a closed source

Sailfish Silica for the UI. Standard Linux APIs are provided by the Mer Core. Sailfish and

Plasma Active have been cooperating to share common APIs and this, when successful, will

make the platforms compatible on the API level.

Page 31: BAPATLA ENGNEERING COLLEGE

31

Software overview

Sailfish is able to run most applications that were originally developed for Android, in

addition to native Sailfish applications. This was done in collaboration with the creators of

Alien Dalvik, Myriad Group. As Sailfish OS is a GNU/Linux-based operating system, it is

also possible to install other GNU/Linux applications on it. A number of projects successful

on other platforms are migrating to become native Sailfish OS applications.

• Software porting and migration to Sailfish OS

• Similarities and differences between Harmattan and Sailfish

• guides how to port MeeGo 1.2 Harmattan applications for the Nokia N9 to the

Sailfish OS devices

• Porting framework (Qt 4 to Qt 5, SDL 1.2 is SDL 2.0, Debian packaging is RPM

packaging)

• Application porting tutorials and examples (QtQuick QML applications, the Flickr

application Qt 5, SDL / OpenGL ES applications)

• Qt Quick Components map to Sailfish Silica.

It gathers and links development resources of different kinds and origins.

Hardware overview

Advantages of the Mer standard

Sailfish OS can be used on any hardware with a Linux kernel supported by the Mer

core distribution. A list of devices running Sailfish has been created by enthusiasts. Rather

than designate a specific reference hardware platform, a Virtual Box implementation with the

Sailfish OS SDK is available for development on popular operating systems Linux, OS X and

Windows. This VM contains the whole Sailfish OS isolated from local resources to enable

comfortable work. This allows evaluating coded or ported software behavior and

performance in future on any real device and safe experimenting de facto on Sailfish OS

itself.

Page 32: BAPATLA ENGNEERING COLLEGE

32

Software Development Kit

Sailfish OS SDK is a collection of tools for developing Sailfish OS applications. It includes:

- Qt Creator integrated development environment (IDE)

- Mer build engine for cross compilation

- The Sailfish OS Emulator

- Tutorial, Design and API Documentation

- Repositories for additional libraries and open source code

Qt Creator

Qt Creator is a cross platform integrated development environment (IDE) tailored to

the needs of Qt developers. It has been extended to add support for Sailfish UI application

development using Sailfish Silica components. It provides a sophisticated code editor with

version control, project and build management system integration. More information on the

IDE can be found at qt.digia.com

Mer build engine

The Mer build engine is a virtual machine (VM) containing the Mer development tool

chains and tools. It also includes a Sailfish OS target for building and running Sailfish and

QML applications. The target is mounted as a shared folder to allow Qt Creator to access the

compilation target. Additionally, your home directory is shared and mounted in the VM, thus

giving access to your source code for compilation.

Emulator

The emulator is an x86 VM image containing a stripped down version of the target

device software. It emulates most of the functions of the target device running Sailfish

operating system, such as gestures, task switching and ambience theming.

Wayland

In current release of Sailfish OS uses Wayland instead of X11 in graphics pipeline

giving improved user experience. Sailfish OS is delivered with a fully functional compositor

who takes care of window management and outputting graphics to screen. More information

of Wayland can be found from Wayland homepage.

Page 33: BAPATLA ENGNEERING COLLEGE

33

Sailfish Silica

Sailfish Silica is a QML module which provides Sailfish UI components for

applications. Their look and feel fits with the Sailfish visual style and behavior and enables

unique Sailfish UI application features, such as pulley menus and application covers.

Open source code

Naturally, we are providing the open source code used in this release. You can find

this at releases.sailfishos.org. In the event the source code for a binary was not provided to

you along with the binary, you may also receive a copy of the source code on physical media

by submitting a written request to us. More information is available in the written offer for

source code.

API Documentation

In this section, you will find relevant documentation that you can refer to when

developing Sailfish OS applications. We will add more API documentation here as they

become available.

Silica Documentation

The Sailfish SDK includes Sailfish Silica, a QML module for developing your own

Sailfish applications. Sailfish applications are written with a combination of QML and C++

code. QML is a declarative language provided by the Qt framework that makes it easy to

create stylish, custom user interfaces with smooth transitions and animations; a QML-based

user interfaces can be connected to a C++ based application back-end that implements more

complex application functionality or accesses third-party C++ libraries.

CONCLUSION

Sailfish OS is promoted and supported by the open Sailfish Alliance established in

2011, a group established to unite OEM and ODM manufacturers, chipset providers,

operators, application developers and retailers.[54] On 16 August 2012, the user interface

was reported to be ready for release. Jolla's CEO Jussi Hurmola stated in a ZDNet interview,

“Our UI is ready now, we haven't released it yet, we will save it for the product launch and

the platform is getting up now so the project looks pretty nice"

Priyanka

3/3 MCA

Page 34: BAPATLA ENGNEERING COLLEGE

34

ABSTRACT:

A Blackberry is a personal communications device developed, distributed, and

serviced by Research in Motion (RIM), a Canadian company headquartered in Waterloo,

Ontario a .Blackberry can provide email, text messaging, web browsing, and telephone

service. It is an example of a convergent device. A BlackBerry is an end-to-end wireless

email solution that allows access to your Outlook Inbox, Calendar, Contacts, and Tasks with

full wireless synchronization. The BlackBerry Server constantly communicates with the

campus Exchange server (that talks as soon as something comes into your Outlook for

Exchange email, the BlackBerry server gets a copy and sends it to your device through the

Internet. Your device receives that information through the Internet using your carrier's

preferred network.

Introduction of BlackBerry Technology:-

BlackBerry handhelds are integrated into an organization's e-mail system through a

software package called “BlackBerry Enterprise Server "(BES). Versions of BES are

available for Microsoft Exchange, Lotus Domino and Novell GroupWise. While individual

users may be able to use a wireless provider's e-mail services without having to install BES

themselves, organizations with multiple users usually run BES on their own network. Some

third-party companies provide hosted BES solutions. Every BlackBerry has a unique id called

BlackBerry PIN which is used to identify the device to the BES. BES can act as a sort of e-

mail relay for corporate accounts so that users always have access to their e-mail. The

software monitors the user's local "inbox", and when a new message comes in, it picks up the

message and passes it to RIM's Network Operations Center (NOC).

Page 35: BAPATLA ENGNEERING COLLEGE

35

How it works:-

As we all know, there is always software behind the hardware. This holds true for the

blackberry as well. Blackberry Server Software comes in two forms

1. BlackBerry Professional Software (BPS)

2. BlackBerry Enterprise Server (BES)

The way that the BlackBerry server works applies to both the BlackBerry Professional

Software (BPS) and the BlackBerry Enterprise Server (BES)

Page 36: BAPATLA ENGNEERING COLLEGE

36

The basic steps in receiving an email on a blackberry device are as follows:

s1. The email message is sent.

2. Message arrives at your email server (usually the exchange server) and is sent as normal to

your PC/ Laptop (as in fig 3.1).

3. The BlackBerry server (the mail is delivered using a "push" concept to the Blackberry

Enterprise Server) compresses, encrypts and forwards the message automatically to your

BlackBerry handset.

4. Message arrives at the BlackBerry via the Internet and the mobile carrier's network.

5. The Blackberry handheld device receives decrypts and decompresses the email, and alerts

the user.

Blackberry Enterprise Server:

BlackBerry Enterprise Server is the fully-featured BlackBerry mobile email service as

in fig 3.2.1. It's designed for medium to large organizations with their own Lotus Domino or

Microsoft Exchange servers for email and mobile data applications, that are going to start

with at least 20 users and grow from there.

Page 37: BAPATLA ENGNEERING COLLEGE

37

Conclusion:-

The BlackBerry Style is an impressive little device. It proved useful, reliable, and

even has dare I say it style.

The clamshell form factor grew on me very quickly, especially given the usefulness of the

external screen.

RIM proves with this Smartphone that it still can deliver an innovative new device

rather than just a refresh of a proven model. Seasoned pros and BlackBerry newbie’s

alike will both find a lot to like about the Style.

Every technology has pros and cons

Pros:

• Stylish clamshell design

• External display very useful

• BlackBerry OS 6.0 brings refreshed apps

Cons:

• Occasional lags in performance

• Casing collects enough fingerprints to provide a permanent record

• Awkward angle when taking head-on pictures, so-so camera.

Harika

3/3 MCA

Page 38: BAPATLA ENGNEERING COLLEGE

38

ABSTRACT:

Honey pots teach us how to track black-hats in the act of probing for and

compromising a system. This paper discusses just that. Here we learn how honey pots are

built, implemented and monitored.

A honey pot network is designed specifically to learn how black-hats work. Honey

pots are extremely powerful, not only can be used to gain extensive information on threats,

information few other technologies are capable of gathering.

INTRODUCTION:

A honey pot is a system designed to teach how black-hats probe for and exploit a

system. By learning their tools and methods, you can then better protect your network and

systems. A well designed honey pot means the black-hat never knew he was being tracked.

First, no honeypot can catch/capture all the bad guys out there. There are too many ways to

spoof/hide your actions. Second, keep in mind that you are playing with fire. Someone far

more advanced then you may compromise your honeypot, leaving you open to attack. Third,

throughout this paper I use the term black-hat. I define a black-hat as anyone who is

attempting un-authorized access to a system.

Page 39: BAPATLA ENGNEERING COLLEGE

39

Types of honey pots:

Honey pots can be classified based on their deployment and based on their level of

involvement. Based on the deployment, honey pots may be classified as:

1. Production Honey pots

2. Research Honey pots

1. Production honey pots

They are easy to use, capture only limited information, and are used primarily by

companies or corporations; Production honey pots are placed inside the production network

with other production servers by organization to improve their overall state of security.

2. Research honey pots

They are run by a volunteer, non-profit research organization or an educational

institution to gather information about the motives and tactics of the Black hat community

targeting different networks. These honey pots do not add direct value to a specific

organization. Instead they are used to research the threats organizations face, and to learn

how to better protect against those threats.

Page 40: BAPATLA ENGNEERING COLLEGE

40

4. Honeyed (low-interaction)

• Solution emulates operating systems and services. Easy to install and deploy.

• Usually requires simply installing and configuring software on computer.

• Minimal risk as emulating services control what attakers can and cannot do.

• Captures limited amount of information, mainly transactional data .

Honey net (high-interaction):

• No emulation, real operating systems and services are provided. Can capture far more

information including new tools, communications or attacker keystrokes.

• Can be complex to install or deploy( commercial versions tend to be much simpler).

• Has increased risk as attackers are provided real operating systems to interact.

5. Where to Begin Honey pot:

There are a variety of different approaches to build a honey pot. This is based on

simplicity. Build a standard box that u wanted to learn how the black-hat community was

compromising. Don't do anything special to this system, build it as you would any other.

Then put the system on the Internet and wait. Sooner or later someone will find the system

and attack it. The system is built to be attacked and compromised, someone will gain root on

that system that is the goal.

Page 41: BAPATLA ENGNEERING COLLEGE

41

6. The Plan:

Plan is simple. Build a box u wanted to learn about, put it on the network, and then

wait. However, there were several problems to this. First, how do u track the black-hats

moves? Second, how do I alert myself when the system is probed or compromised? Last,

how do u stop the black-hat from compromising other systems? The solution to this is

simple, put the honey pot on its own network behind a firewall. This solves a variety of

problems. The goal is to have our honeypot behind a controlled system. Most firewalls will

do, as long as it can both control and log traffic going through it.

7. Tracking Their Moves:

Now, the real trick becomes how to track their moves without them knowing it. First,

you do not want to depend on a single source of information. Something can go wrong,

things can be erased, etc. I prefer to track in layers. My third layer of tracking (the firewall is

the first, sys logged hack is the second) is to use a sniffer. I run a sniffer on the firewall that

sniffs any traffic going to or from the honeypot. Since the honeypot is isolated by the

firewall, you know all traffic goes through the firewall. The advantage of a sniffer is it picks

up all keystrokes and screen captures, to include STDIN, STDOUT, and STDERR.

This way you see exactly what the black-hat is seeing. All the information is stored

on the firewall, safely protected from the black-hat.

Page 42: BAPATLA ENGNEERING COLLEGE

42

8. How to prevent attacks:

Honeypots can help prevent attacks in several ways. The first is against automated

attacks, such as worms or auto-rooters. These attacks are based on tools that randomly scan

entire networks looking for vulnerable systems. If vulnerable systems are found, these

automated tools will then attack and take over the system (with worms self-replicating,

copying themselves to the victim).

If an attacker knows your organization is using honeypots, but does not know which

systems are honeypots and which systems are legitimate computers, they may be concerned

about being caught by honeypots and decided not to attack your organizations. Thus the

honeypot deters the attacker.

CONCLUSION:

The purpose of this paper was to define what honey pots are and their value to the

security community. Honey pots are an extremely powerful tool that allows you to learn

about the black-hat community. The key to tracking the enemy is layers. Do not depend on a

single layer of information, as it can be altered or lost. If you are interested in learning more

about honey pots, you may want to consider the book Honey pots: Tracking Hackers, the first

and only book dedicated to honey pot technologies.

Sri Avinash

3/3 MCA

Page 43: BAPATLA ENGNEERING COLLEGE

43

ABSTRACT:

ZigBee is an IEEE 802.15.4 standard for data communications with business and

consumer devices. It is designed around low-power consumption allowing batteries to

essentially last forever. The ZigBee standard provides network, security, and application

support services operating on top of the IEEE 802.15.4 Medium Access Control (MAC) and

Physical Layer (PHY) wireless standard. It employs a suite of technologies to enable

scalable, self-organizing, self-healing networks that can manage various data traffic patterns.

ZigBee is a low-cost, low-power, wireless mesh networking standard. The low cost allows

the technology to be widely deployed in wireless control and monitoring applications, the

low power-usage allows longer life with smaller batteries, and the mesh networking provides

high reliability and larger range. ZigBee has been developed to meet the growing demand for

capable wireless networking between numerous low- power devices. In industry ZigBee is

being used for next generation automated manufacturing, with small transmitters in every

device on the floor, allowing for communication between devices to a central computer. This

new level of communication permits finely-tuned remote monitoring and manipulation.

INTRODUCTION:

ZigBee is an established set of specifications for wireless personal area networking

(WPAN), i.e. digital radio connections between computers and related devices. WPAN Low

Rate or ZigBee provides specifications for devices that have low data rates, consume very

low power and are thus characterized by long battery life. ZigBee makes possible completely

networked homes where all devices are able to communicate and be controlled by a single

unit. The ZigBee Alliance, the standards body which defines ZigBee, also publishes

application profiles that allow multiple OEM vendors to create interoperable products. The

current list of application profiles either published or in the works are:

•Home Automation

•ZigBee Smart Energy

•Telecommunication Applications

•Personal Home

Page 44: BAPATLA ENGNEERING COLLEGE

44

ZIGBEE CHARACTERISTICS:

The focus of network applications under the IEEE 802.15.4 / ZigBee standard include

the features of low power consumption, needed for only two major modes (Tx/Rx or Sleep),

high density of nodes per network, low costs and simple implementation.

These features are enabled by the following characteristics,

•2.4GHz and 868/915 MHz dual PHY modes. This represents three license-free bands: 2.4-

2.4835GHz, 868-870 MHz and 902-928 MHz The number of channels allotted to each

frequency band is fixed at sixteen (numbered 11-26), one (numbered 0) and ten (numbered 1-

10) respectively. The higher frequency band is applicable worldwide, and the lower band in

the areas of North America, Europe, Australia and New Zealand.

•Maximum data rates allowed for each of these frequency bands are fixed as 250 kbps @2.4

GHz, 40 kbps @ 915 MHz, and 20 kbps @868 MHz

•High throughput and low latency for low duty- cycle applications (<0.1%)

•Channel access using Carrier Sense Multiple Access with Collision Avoidance (CSMA -

CA)

•Addressing space of up to 64 bit IEEE address devices, 65,535 networks

Page 45: BAPATLA ENGNEERING COLLEGE

45

TRAFFIC TYPES:

1. Data is periodic. The application dictates the rate, and the sensor activates checks for data

and deactivates.

2. Data is intermittent. The application, or other stimulus, determines the rate, as in the case

of say smoke detectors. The device needs to connect to the network only when

communication is necessitated. This type enables optimum saving on energy.

3. Data is repetitive, and the rate is fixed a priori. Depending on allotted time slots, called

GTS (guaranteed time slot), devices operate for fixed durations.

ZigBee employs either of two modes, beacon ornon-beacon to enable the to-and-fro data

traffic. Beacon mode is used when the coordinator runs on batteries and thus offers maximum

power savings, whereas the non-beacon mode finds favour when the coordinator is mains-

powered.

In the beacon mode, a device watches out for the coordinator's beacon that gets transmitted at

The non-beacon mode will be included in a system where devices are ‘asleep' nearly always,

as in smoke detectors and burglar alarms. The devices wake up and confirm their continued

presence in the network at random intervals.

On detection of activity, the sensors ‘spring to attention', as it were, and transmit to the ever-

waiting coordinator's receiver (since it is mains- powered). However, there is the remotest of

chances that a sensor finds the channel busy, in which case the receiver unfortunately would

‘miss a call'.

Page 46: BAPATLA ENGNEERING COLLEGE

46

ARCHITECTURE:

ZigBee is a home-area network designed specifically to replace the proliferation of

individual remote controls. ZigBee was created to satisfy the market's need for a cost-

effective, standards-based wireless network that supports low data rates, low power

consumption, security, and reliability. To address this need, the ZigBee Alliance, an industry

working group (www.zigbee.org), is developing standardized application software on top of

the IEEE 802.15.4 wireless standard. The alliance is working closely with the IEEE to ensure

an integrated, complete, and interoperable network for the market. For example, the working

group will provide interoperability certification testing of 802.15.4 systems that include the

ZigBee software layer.

ZigBee-compliant products operate in unlicensed bands worldwide, including 2.4GHz

(global), 902 to 928MHz (Americas), and 868MHz (Europe). Raw data throughput rates of

250Kbps can be achieved at 2.4GHz (16 channels), 40Kbps at 915MHz (10 channels), and

20Kbps at 868MHz (1 channel). The transmission distance is expected to range from 10 to

75m, depending on power output and environmental characteristics. Like Wi-Fi, Zigbee

uses direct-sequence spread spectrum in the 2.4GHz band, with offset-quadrature phase-

shiftkeying modulation. Channel width is 2MHz with 5MHz channel spacing. The 868 and

900MHz bands also use direct-sequence spread spectrum but with binary-phase-shift keying

modulation.

CHANNEL ACCESS, ADDRESSING:

Two channel-access mechanisms are implemented in 802.15.4. For a non"beacon

network, a standard ALOHA CSMA-CA (carrier-sense medium-access with collision

avoidance) communicates with positive acknowledgement for successfully received packets.

In a beacon-enabled network, a super frame structure is used to control channel access. The

super frame is set up by the network coordinator to transmit beacons at predetermined

intervals (multiples of 15.38ms, up to 252s) and provides 16 equal-width time slots between

beacons for contention-free channel access in each time slot. The structure guarantees

dedicated bandwidth and low latency. Channel access in each time slot is contention-

based. However, the network coordinator can dedicate up to seven guaranteed time slots per

beacon interval for quality of service.

Device addresses employ 64-bit IEEE and optional16-bit short addressing. The

address field within the MAC can contain both source and destination address information

(needed for peer-to-peer operation). This dual address information is used in mesh networks

to prevent a single point of failure within the network.

Page 47: BAPATLA ENGNEERING COLLEGE

47

DEVICE TYPES:

These devices have 64-bit IEEE addresses, with option to enable shorter addresses to

reduce packet size, and work in either of two addressing modes – star and peer-to-peer.

ZigBee networks use three device types:

•The network coordinator maintains overall network knowledge. It's the most sophisticated

of the three types and requires the most memory and computing power.

•The full function device (FFD) supports all 802.15.4 functions and features specified by the

standard. It can function as a network coordinator. Additional memory and computing power

make it ideal for network router functions or it could be used in network-edge devices (where

the network touches the real world).

•The reduced function device (RFD) carries limited (as specified by the standard)

functionality to lower cost and complexity. It's generally found in network-edge devices.

SECURITY:

Security and data integrity are key benefits of the ZigBee technology. ZigBee

leverages the security model of the IEEE 802.15.4 MAC sublayer which specifies four

security services:

•access control—the device maintains a list of trusted devices within the network

•data encryption, which uses symmetric key128-bit advanced encryption standard

•frame integrity to protect data from being modified by parties without cryptographic keys

•sequential freshness to reject data frames that have been replayed—the network controller

compares the freshness value with the last known value from the device and rejects it if the

freshness value has not been updated to a new value

The actual security implementation is specified by the implementer using a standardized

toolbox of ZigBee security software.

Page 48: BAPATLA ENGNEERING COLLEGE

48

The following table-1 shows the Wireless technology comparison chart,

Standard Bandwidth Power Protocol Stronghold Applications

Consumption Stack Size

Wi-Fi Up to

400+mA TX, 100+KB High data rate Internet browsing,

54Mbps standby 20mA PC networking, file

transfers

Bluetooth 1Mbps 40mA TX, ~100+KB Interoperability, Wireless USB,

standby 0.2mA cable replacement handset, headset

ZigBee 250kbps 30mA TX, 4"32KB Long battery life, Remote control,

standby low cost battery-operated

3#&956;A products, sensors

CONLUSION:

It is likely that ZigBee will increasingly play an important role in the future of

computer and communication technology. In terms of protocol stack size, ZigBee's 32 KB is

about one-third of the stack size necessary in other wireless technologies (for limited

capability end devices, the stack size is as low as 4 KB). The IEEE802.15.4–based ZigBee is

designed for remote controls and sensors, which are very many in number, but need only

small data packets and, mainly, extremely low power consumption for (long) life. Therefore

they are naturally different in their approach to their respective application arenas. The

ZigBee Alliance targets applications "across consumer, commercial, industrial and

government markets worldwide". Unwired applications are highly sought after in many

networks that are characterized by numerous nodes consuming minimum power and enjoying

long battery lives. ZigBee technology is designed to best suit these applications, for the

reason that it enables reduced costs of development and very fast market adoption.

Gopi Krishna

3/3 MCA

Page 49: BAPATLA ENGNEERING COLLEGE

49

Page 50: BAPATLA ENGNEERING COLLEGE

50

Page 51: BAPATLA ENGNEERING COLLEGE

51

Page 52: BAPATLA ENGNEERING COLLEGE

52

Page 53: BAPATLA ENGNEERING COLLEGE

53

Page 54: BAPATLA ENGNEERING COLLEGE

54

Page 55: BAPATLA ENGNEERING COLLEGE

55

Page 56: BAPATLA ENGNEERING COLLEGE

56

Page 57: BAPATLA ENGNEERING COLLEGE

57

Page 58: BAPATLA ENGNEERING COLLEGE

58

Page 59: BAPATLA ENGNEERING COLLEGE

59

Page 60: BAPATLA ENGNEERING COLLEGE

60

Page 61: BAPATLA ENGNEERING COLLEGE

61

Page 62: BAPATLA ENGNEERING COLLEGE

62

Page 63: BAPATLA ENGNEERING COLLEGE

63

Page 64: BAPATLA ENGNEERING COLLEGE

64

Page 65: BAPATLA ENGNEERING COLLEGE

65

Page 66: BAPATLA ENGNEERING COLLEGE

66

Page 67: BAPATLA ENGNEERING COLLEGE

67

Page 68: BAPATLA ENGNEERING COLLEGE

68

Page 69: BAPATLA ENGNEERING COLLEGE

69

Page 70: BAPATLA ENGNEERING COLLEGE

70

Page 71: BAPATLA ENGNEERING COLLEGE

71

Page 72: BAPATLA ENGNEERING COLLEGE

72