Mr. Ramgopal Rajagopalan,
E-mail: ramgopalr@pun.cognizant.com
Cognizant Technology Solutions India Ltd.,
Plot No. 26 & 27, MIDC,
Pune Infotech Park, Hinjawadi, Pune-411 027.


Abstract

SOAP is a network protocol designed to increase the interoperability of your existing applications by using existing technologies, thus making your applications accessible to a wider array of platforms and users. The existing technologies that SOAP uses to do this are HTTP and XML.

Index Terms. HTML, SOAP, WSDL, Web Services, XML.


Dr. Ravi Kulkarni
Assistant Professor, SCIT
Email:ravi@scit.edu

Abstract

There are many advantages to manipulating Java class files directly. The format of the class file is very well documented and low-level methods of manipulating class files can yield results not possible otherwise. The purpose of this paper is to explain the basic structure of a class file and to show how to manipulate bytes directly in the class file.


A Study of Zero-configuration Networking

Mr. Vikrant Kaulgud,
Assistant Professor, SCIT
E-mail: vikrant@scit.edu


Abstract

In the recent past, there has been a explosion in terms of the type and number of devices which can be connected to the Internet. Although, the scenarios of someone switching on their microwaves via the Internet have not fully materialized, the issue of configuration of such devices has certainly come to the forefront. Also, the growth of home networking has contributed to the efforts of researchers and vendors in delivering simpler mechanisms for IP configuration. The result of the efforts is the development of "zero-configuration" or "auto-configuration" enabled IP and IP services. Such IP implementations and services do not require infrastructure for configuration of the hosts connected to the networks. The hosts themselves are capable of configuring each other to ensure smooth network operations.

In this paper, I examine the techniques used in zero configuration networks and future directions.


Issues and solutions in P2P Networking

Ms. Anjali Gajendragadkar,
Senior Lecturer, SCIT
E-mail: anjali@scit.edu


Abstract

P2P networking is a network model where, depending on an operation’s context, any node can operate as either a server or a client. P2P provides certain interesting capabilities not possible in traditional client/server networks, which have predefined client/server roles for their nodes. This paper will give introduction on P2P networking and compare it with client/server networking and will also discuss JXTA: a new emerging technology that will enhance the P2P networks’ capacities & minimize its limitations.


Java Media Framework – Enabling Real time Media transmissions over the Internet

Mr. K.V. Sreekanth, MPIT(2002)
E-mail: kvsreekanth@rediffmail.com


Abstract

SThere has been an explosion of services being offered on the Internet. Multimedia streaming is one of the newer services, which demands a high quality of service from the Internet. Internet being a packet switching network is not suitable for the delay-sensitive multimedia streaming applications. Various frameworks for real-time media transmissions over the Internet has been proposed in the last few years. This paper attempts to perform a comparative study of the various media frameworks and formats available and identify the best possible solution for real time media transmissions. The Java Media Framework is then discussed in depth.


COMPUTER FORENSICS

Mr. Kamalpreet Sawhney, MPIT (2002)
E-mail: kps5@mailmetoday.com


Abstract

Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. Computer specialists can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information. Any or all of this information may help during discovery, depositions, or actual litigation. This paper discusses the various methods used in collecting evidence through computer forensics.


Secure Shell: Securing Remote Logins

Mr. Aashish Manocha, MPIT(2002)
E-mail: aashish77@rediffmail.com


Abstract

Secure Shell provides strong authentication and secure communications over insecure channels. It is a program to log into another computer over a network, to execute commands in a remote machine. It is intended as a replacement for telnet, rlogin, rsh, and rcp.

The traditional BSD 'r' - commands (rsh, rlogin, rcp) are vulnerable to different kinds of attacks. Somebody who has root access to machines on the network, or physical access to the wire, can gain unauthorized access to systems in a variety of ways. It is also possible for such a person to log all the traffic to and from your system, including passwords. ssh never sends this information in clear text.

The following paper discusses the use of SSH for securing remote logins, beside discussing the threats on the intranets..


Data compression algorithms – A comparitive study
Ms. Shailaja Sinha, MPIT (2002)
E-mail: shailajasinha@yahoo.com
Data compression is a term that refers to the process of transforming a body of data to a smaller form, from which the original can be restored. Data compression has many uses, especially in modern networking environments. Compressing large files can significantly reduce file transfer times. This might prove useful for retrieving database information within a company’s internal network, or for downloading images on a internet web page. Compression is also useful for backing up files as it reduces the space required for information storage. The popular computer operating system MS-DOS includes a program called DriveSpace, which can compress an entire volume, thereby increasing its apparent capacity.

The paper involves the study of key data compression algorithms available, and where there applicability.