Previous Volumes


Navneet Bhushan and Venugopal Subbarao
  • Software Engineering and Technology Labs (SETLabs)
    Infosys Technologies Limited, Bangalore 561229.


The nature and proliferation of mobile e-Commerce will vary as per the geographic and cultural variations in different parts of the world. A Killer Application is one, which immediately will lead to critical mass and certain success. It is quite clear that more than predicting technology trends in terms of bandwidth, multi-media, global roaming etc., it is far more important to come up with business applications and business models which will exploit the new found freedom by the consumer to get connected to the business front-end in the way, at the time and in the place the consumer wants.

It is being predicted that the killer apps will vary widely from region-to-region, primarily in Asia, Europe, and North America. However, the authors feel that killer applications will also vary from one business domain to another. The unique features of mobile devices, i.e., ubiquity, localization and personalization will contribute in generating a variety of new applications. This is especially true for location-based applications, which are enabled by unique property of mobile users. Multiple apps need to be combined to give Killer suite of apps. Another dimension to defining the killer applications will be the segment of population accessing the wireless Internet. This article gives an estimate of various applications becoming the Killer applications in near future and distant future based on the three dimensions of geography, business domain and population segment.

T. S. S. Srinivasa Rao
  • Centre for Excellence in Telecommunications & Networking
    DSQ Software Limited Plot No 1 & 2,
    Phase-IV, Udyog Vihar, Gurgaon-122 015, Haryana


The rapid development of the Information Technology (IT) and the introduction of new technologies have provided new possibilities for Telecommunication and Networking (T & N). Next Generation Networks (NGN) are characterized by increasing complexity, intelligence, heterogeneous technologies, multitude of vendor products and increasing user expectations from the networks. Simple and empirical Network Management (NM) of the previous years was replaced by homogeneous standards using the Manager/Agent (Client/Server) approach proposed by International Standards Organization (ISO). Afterwards new principles of management by delegation, peer-to-peer management and Web-based approaches emerged. However, carrying out the Fault, Configuration, Accounting, Performance and Security (FCAPS) functional areas for Network Management in NGN will require new approaches. In this paper, we have presented OpenVision Service Management System (OVSMS) based framework for the existing and Next Generation Networks. OVSMS goal is to develop a Operations and Business Support Systems (OSS/BSS) based on Telecommunications Management Network (TMN) architecture with flexible, intelligent, and brilliant, capabilities in Network Management, Customer Care and Billing (CCB), ordering, provisioning, Service Level Agreements (SLAs) and Business Level Strategic Management for the existing and Next Generation Networks.

Harshavardhan Lale
  • B.E. MPIT (1999)


The purpose of this document is to provide a better understanding of Virtual Local Area Networks (VLANs). We will define a VLAN and describe its benefits as well as some limitations. We will explain why it is important for a LAN administrator to understand VLANs, and give some basic instructions to determine how many VLANs a department would typically need. Virtual LANs (VLANs) have recently developed into an integral feature of switched LAN solutions from every major LAN equipment vendor. 

Although end-user enthusiasm for VLAN implementation has yet to take off, most organizations have begun to look for vendors that have a well-articulated VLAN strategy, as well as VLAN functionality built into products today. Ambitious organizations are moving quickly toward networks featuring private port (single user/port) LAN switching architectures. Such a desktop switching architecture is ideally suited to VLAN implementation.

Mona Rakibe
  • MPIT(I)

Ashish Mishra
  • MPIT(I)


Two-factor authentication has become a must in most environments. But the problem is that to implement two-factor authentication additional hardware is always required. By using Keystroke Dynamics software as a possible authentication method we can improve security and reduce cost of implementation and required user interaction.

In our R&D we plan to examine an emerging non-static biometric technique that aims to identify users based on analyzing habitual rhythm patterns in the way they type.

Dev Noronha
  • (MPIT),

Nitin Gupta
  • (MPIT-II)


Server-side scripting market is flooded with various tools like Active Server PagesTM, JavaServer PagesTM, Personal Home Pages, Cold Fusion etc., A web programmer finds its difficult to choose between them. Each one has its own set of advantages and disadvantages.

These solutions provide advantages over old-fashioned CGI/Perl that requires the knowledge of some programming language like Perl or C. Besides, any request of a CGI script initiates a new process making CGI that much slower. Thus companies like Microsoft, Sun, PHP have come up with their own scripting languages to remove the drawbacks of CGI architecture.

Each of these technologies provides an aspect of usefulness. ASP provides the easiest development environment while JSP has very steep learning curve and requires the knowledge of Java and Servlets. PHP is a popular technology supported by Open Source development. ASP is best suited for the mini-sites having 100-500 hits per day whereas JSP is capable for handling enterprise sites having few 100 users and a million hits per day. The cross-platform support by JSP also make a widely accepted tool while same is not true for ASP which only run under Microsoft Internet Information ServerTM. We'll compare many more aspects in this paper

Sombhit Kumar Sinha
  • MPIT(1999)


ATL was originally designed as a way to write fast, small COM component. It was especially intended for Automation components that could, for instance, implement business rules and a database access in a multi-tier architecture. There are many environments available for creation implementation of COM interfaces. Each provides some sort facilities while compromises on other factors. In the similar manner also ATL provides for the implementation of COM components that are supposed to be small and fast, though not so robust as that made by MFC. This paper is written to understand Atl in a better manner.

Amit Oommen
  • MPIT (1999)

Parabjit Singh

  • MPIT (II)


Rapid Application Development is the mantra of modern day programmers. They hesitate to learn newer programming languages and at the same time do not want to unlearn the things they have already learnt. To satisfy their needs, Microsoft has once again come up without committing any blunder with an Operating System called Windows CE. Windows CE unlike its counterparts is a lightweight OS specially designed from scratch to cater the needs of devices ranging from TV Set top boxes, H/PC, P/PC to GPS Receivers(Global Positioning System). Windows CE supports the familiar Win32 API thereby enabling application developers to develop applications quickly and easily.

Microsoft Windows CE is a compact, highly efficient, multiplatform operating system. It was designed from the ground up as a multithreaded, fully preemptive, multitasking operating system for platforms with limited resources. Its modular design allows it to be customized for products ranging from consumer electronic devices to specialized industrial controllers. Windows CE is an operating system (OS) based on the Win32 application programming interface (API).

This paper introduces essential information on application development in Windows CE as well as porting existing applications destined for other Windows OS’s to Windows CE