Previous Volumes

August

photo
Prof. Rajesh D. Nagawade
  • Telecom UNIX Delivery Group
    Talent Transformation
    Wipro Technologies
    rajesh.nagawade@wipro.com


Abstract

Sharing data between threads may challenge the data for consistency. This goes unnoticed at compile time. But the same is revealing enough at runtime.

If the developer is unaware of the differences between a thread and a process, his/her life becomes further miserable. Hence the paper first addresses the need to compare threads with processes, at kernel level.

Then it discusses the challenges faced and suggests a solution by coining the term Thread Safe Classes.

The solution is illustrated by a simple and complete C++ program. This program makes use of Posix.1c API for Threads and Posix.1c API for Mutexes. So these APIs are discussed in the beginning.

Prerequisite:

It assumes the audience to be aware of OOP concepts and system calls in Unix process model.

Objective:

At the end reader should be able to develop quality classes in C++ on linux, to be used by multiple threads.


Shital Bhatiya
  • Sasken Communication Technologies Pune,
    shitalbhatiya@rediffmail.com

Amit Deshmukh

  •  Faculty, SCIT Pune, amit@scit.edu


Abstract

IThe benefits of digital multimedia contents like digital cinema, digital music are numerous which include significantly lower distribution and maintenance costs, immediate access to film libraries, higher presentation quality, and strong potential for developing new business models. Despite these advantages, the industry is still reluctant to jump into the digital age. Peer to peer networks over Internet are heavens for pirated digital contents, particularly about multimedia. There is a huge set of problems like Content Management, Royalty, Authentication & sharing of a multimedia file over the network. We would like to propose a solution to the problem of digitally copyrighted music sharing over a peer-to-peer network particularly over Internet.


Mr. Parag Shah
  • pshah@adaptivesoftware.biz


Abstract

Conducting periodical reviews of a software source code is a beneficial practice. It improves the overall quality of code, it introduces team members to code they have not worked with, and it can also be used for impromptu training sessions. In this article we describe the benefits and pitfalls of conducting code reviews, and a process that can be followed as is or customized for a particular organizations.


Prof. Anjali Gajendragadkar
  • anjali@scit.edu


Abstract

Data Link layer of the OSI model plays an important role in the communication as it is the layer which communicates with the under laying physical network of various types and sizes. OSI defines various functions for Datalink layer. IEEE has divided this layer in to two layers, one is Logical Link Control and other is Media Access Control. Today Datalink layer is tuned to work with UTP, Fiber and wireless media also. Depending upon the media being used, topology various protocols are designed to work at this layer. This paper will discuss many challenges faced by data link layer and the various functions it performs to meet those challenges.


Mrs. Pradnya Purandare
  • Lecture, SCIT, Pune
    E-mail: pradnya@scit.edu


Abstract

Object Oriented Databases is another approach to the data model, which can be used for the databases, in object oriented development environment. The objective of this paper is to give introduction to ODBMS and discuss its functionality, features, performance, limitations and advantages comparing with RDBMS.


Lavanya Lakshman
  • MPIT-II-Batch 2003-05 NW Technology


Abstract

PTT stands for Push to Talk and PoC stands for Push to Talk over Cellular. Push-to-talk technology enables callers to connect to other cell phones with just the push of a single button, similar to a walkie-talkie. This is a half-duplex voice service hence only one person can talk at a time, and there is no need to dial a number. GPRS, WCDMA and CDMA2000 networks can all, if tuned correctly, meet the PoC technical demands. UMTS is the latest addition to this list.

The purpose of this document is to introduce the technology and discuss about its significance. The architecture, various standards and the business impact of PoC would also be discussed.


Narottam Kumar Priyadarsan Roy Vivek Payala Mithun K.S
  • MPIT-II-Batch 2003-05
    Networks Technology


Abstract

The ability of a Mobile Ad Hoc Network (MANET) to provide adequate quality of service (QoS) is limited by the ability of the underlying routing protocol to provide consistent behavior despite the inherent dynamics of a mobile computing environment. In this paper we study three MANET routing protocols, OLSR, DSR and AODV, with an emphasis on the effect they have on various QoS metrics. We describe and analyze how the protocols differ in the mechanisms they use to select paths, detect broken links, and buffer messages during periods of link outage. The effects of these differences are quantified in terms of packet delivery ratio, end-to-end hop count, end-to-end latency, and mechanism overhead. We show that the proactive protocol, OLSR, builds paths with consistently lower hop counts than the reactive protocols, AODV and DSR, a fact that leads to a reduction in end-to-end latency. The reduction in end-to-end latency assists a QoS model in meeting timing requirements and improves global network performance. We further show the impact of broken link detection latency on the packet delivery ratio. A routing protocol that cannot quickly recover from link breakage caused by mobility renders a QoS model incapable of meeting delivery requirements. Finally, we analyze the effect of mobility on the distribution of end-to-end latencies.

Traditionally, reactive protocols are criticized for buffering during the building of routes, however we also study buffering phenomenon caused by the proactive mechanisms of OLSR.


S. Sriram
  • Network Technology


Abstract

Packet loss and delay in Internet degrade the quality of requested services like VoIP (Voice over IP) or Video Streaming. In network scenarios where wired and wireless connections are melted together, a real measure of these parameters is fundamental in a planning process of new services over network infrastructures. Nowadays networks are heterogeneous in terms of access network technologies (wired LAN Ethernet 10/100/1000, Wireless LAN - 802.11a, 802.11b, 802.11g -, GPRS, UMTS, GSM, Bluetooth, ...), end-users devices (workstation, PC desktop, Laptop/Notebook, PDA, Advanced Mobile Phone, ...) and finally operating systems (Unix, Linux, Win 98/NT/2000/XP, Win CE, Linux Familiar, OS Embedded, ...). In this work I provide a Heterogeneous network performance characterization with respect to delay in the network.


Vikram Singh Chatha Mahendra Baid
  • ITBM


Abstract

Good roads, convenient air services, abundant power supply and fast telecom services lend a hand to IT industry. India presents a dismal picture in some areas whereas there are bright spots in others .All over the world, Information technology is not only affecting our everyday lives, but is fast becoming a very important variable in a country economy. India is no exception. This report in continuation of the earlier submission tries to highlight the present situation of Indian IT infrastructure taking into account the direct and indirect influence of certain crucial factors. The problems en route to India claim to most sought after IT destination and the corresponding solutions have been considered in this report.


Juhi Mishra
  • MPIT-II- Batch 2003-05
    IT Business Management


Abstract

To recognize and assess ROI from ERP system, it is important to understand what an ERP system is and then, identify the benefits that an organization can attain due to ERP system implementation.  The research started with gathering broad information about an ERP system and identifying possible benefits due to an ERP system. This initial study has been followed by finding the various loopholes, which lead to non-realization of ROI from an ERP system. Progress report covers these aspects in more detail. Finally, in this final repot a method has been designed to assess ROI from an ERP system. Direct and indirect benefits have been identified. Also different expenses in terms of hardware, software, personnel, consulting and training have been explored to assess the ROI. Some measures have also been stated to help organization realize ROI from ERP system. Selecting right vendor and ERP package, adopting a structured strategy, clear mention of the objective for ERP implementation are some of the measures. Many such measures are discussed in detail in the report.


Rohit Bordia
  • MPIT II Batch 2003-05
    SW Developement


Abstract

Ruby follows the Principle of Least Surprise---thing work the way you would expect them to, with very few special cases or exceptions. And that really does make a difference when you're programming. Ruby is a transparent language.


Gargi Bhowmick
  • MPIT-II-Batch 2003-05
    SW Development


Abstract

In this report, I am focusing on the problems that occur when we want a computer to understand the contents of a paragraph and answer the questions based on what it has understood. The computer has to have a certain level of intelligence for doing this. Like humans, it should be able to understand the text in the passage and draw inferences from that. The passage will be in English, a Natural language.


Rohaen J Mavalwalla
  • MPIT-II-Batch 2003-05
    Software Development


Abstract

Apache Cocoon is an XML publishing framework that raises the usage of XML and XSLT technologies for server applications to a new level. Designed for performance and scalability around pipelined SAX processing, Cocoon offers a flexible environment based on a separation of concerns between content, logic, and style. To top this all off, Cocoon centralized configuration system and sophisticated caching help you to create, deploy, and maintain rock-solid XML server applications.