You are on page 1of 86

In This Issue...

Tweets of Wisdom

 Acknowledgement
 Fr Francis Guezou SDB
 Messages
B eware of false cloud!
 Marc Benioff, CEO - Salesforce.com

 BOS.CON’12
 Introduction
 Community
T he horse is here to stay but the
automobile is only a novelty – a fad."
 President of Michigan Savings Bank
 Key Result Areas
 Program Schedule
 Inaugural Address

 Keynote Addresses
 BOSCONITES
N umber One Cloud Computing Joke:
Cloud computing brings network rain
storms.
 BOS.CON 2012 Report

 Photo Reminiscence
C loud computing is more fun than a barrel
of monkeys with a million Shakespeare
worth of keyboards."
 IT Fest Winning Papers
 Social Networking for Social Men
 Mobile Applications for Wireless Networks
1 949: Popular Mechanics: "Computers in
the future may weigh no more than 1.5
tons."
 Green Computing

 Technical Reports (BIIT)


 Cloud Computing Architecture
1 977: Ken Olson, maker of business
mainframe computers, arguing against
PC. "There is no reason anyone would want
 Survey on Mobile Applications a computer in their home."
 Cloud Computing Types and Deployment
 Cloud Engineering
 Computing Models for Indian People
B ill Gates: The computer was born to
solve problems that did not exist before.

 Mobile Computing Devices


 Mobile Applications for India C onspiracy: Google, Facebook, Flickr,
Hotmail and now Apple are feeding
conspiracy theorists who fears that
 Mobile Technologies - Evolution
government is controlling weather by
 Models of Cloud Computing computing with clouds.

 Paper Abstracts
 Wisdom Simplified
C loud computing should be named
‘Cloudy Computing’, because it's
precipitous, vague, messy, hazy and
 Sponsors Face Cloud unpredictable.

© 2012 Don Bosco College, Yelagiri Hills


Event: 8th Inter-Collegiate IT Fest [BOS.CON 2012]
W all Street believes that cloud
computing may be the next big thing in
vaporware: It's hot, it's cold, it's new, it's old,
Organizer: Students@IT Association
Publisher: BIIT, DBC, Guezou Nagar, Yelagiri, TN, 635853, India it's worked, and it's Failed”, thus Steve Jobs
Cover & Graphic Design : BOSCO ITS-MMD, DTP: BOSCON-DC
talks and he's hailed.
Printed at: Sudha Printers, Tirupattur, Vellore DT.
BOS.CON 2012

Cloud and Mobility for Indian Masses

BOS.CON 2012
8th INTER-COLLEGIATE IT FEST

Organized by

Students@IT Association

DON BOSCO COLLEGE


Don Bosco Centre, Guezou Nagar, Yelagiri Hills, Vellore DT, Tamil Nadu, India - 635853

2
CLOUD AND MOBILITY FOR INDIAN MASSES

ACKNOWLEDGEMENT
It gives me an immense pleasure to speak with you through this
message. BOS.CON-12 (“Bosco Cennects” 2012) is an intra-collegiate
IT Fest conducted in every year to have conglomerates of young IT
professionals to sit and discuss and exhibit their talents among others
and gain knowledge and experience. The theme of BOS.CON for this
year is “Cloud and Mobility for Indian Masses” rightly fit in this
current situation making the young minds to be aware of need of
addressing various issues in the rural areas which considers as 75%
Mr Julias Ceasor A.
masses of India. This theme calls everybody think on possibilities to
provide constructive IT services to the rural part of India and its development.

In this connect, I welcome you all to take part and request you to bridge the digital divide. I
take this opportunity to thank all the Salesians in Don Bosco Centre, Yelagiri Hills for their
adequate support and encouragement in conducting BOS.CON 2012. I thank all teaching and
non-teaching staff for their wonderful support towards this IT Fest. And also thank and
appreciate office bearers of Students@ITA, and all committee members for their planning
and execution of this mega event.

Finally I pray and wish all of you that the BOS.CON 2012 to be a great event and very
successful one.

Wish you all the best.

Julias Ceasor A
ITA President, BIIT

3
BOS.CON 2012

Fr. Francis Guezou SDB

FOUNDER-DIRECTOR
OF DON BOSCO CENTRE, YELAGIRI HILLS
Fr. Francis Guezou - a French Salesian missionary came to India
in 1952 and was ordained a priest in 1953 at Tirupattur, Tamil
Nadu as soon as his ordination was over Fr. Guezou wanted to do
mission work among the poor. So he arrived at primitive Yellagiri
Hills and pioneered the Christian presence on the hills in the year
1962. From then onwards he has been on the cause of promoting
education of the poor tribal and rural youth at different places of
the South India. In particular, he has been the founder and
strengthened the Christian and Salesian educational presence at
Yelagiri Hills. Thanks to his marvelous work, BICS InfoTech was
started in 1998 with BIIT and BOSCO ITS as its education and
technology units with the help of his friends.

Though he left us on January 29, 2009 for his eternal reward, still
his spirit is dynamic and drives the entire campus. Every visitor
to Don Bosco Centre experiences a familiar family spirit, which
makes the young, free and natural; this is a heritage that Fr.
Guezou still passes on - a person of great gift that God has given
us. As a Gardener in the vineyard of the divine master, Fr. Guezou
ploughed hard, planted and watered by the kindness of many
selfless friends in France and India and he knows that only God
gives the growth. Yelagiri changed him and will change the
destiny of the people who will dwell here; because God’s work is
at hand here. It’s a God’s mountain of grace.
Fr. Francis Guezou, SDB
(1924 - 2009)

4
CLOUD AND MOBILITY FOR INDIAN MASSES

Rector’s Message

Dear Staffs and Students of BIIT,

It gives me immense joy to know that BIIT is back with


yet another BOSCON, the Annul Inter-Collegiate IT Fest,
with the theme ‘Cloud and Mobility for the Indian masses’.
It is a fact that everyone is moving towards cloud-based
soft wares as they are more accessible to all and faster to
reach the masses. We are also aware of the unbelievable
revolution caused by the mobile phones in the lives of
people. Mobile phones are symbols of freedom, movement,
speed, efficiency, planning and success. Fr Stanislaus Swamikannu sdb
In this context, I would like to present the following text
that I read from a recent article written by Bill Clinton, the former President of the United
States, in the TIME magazine: “Our world is more interdependent than ever. Borders have
become more like nets than wall, and while this means that wealth, ideas, information and
talent can move freely around the globe, so can the negative forces shaping our shared
fates.” (TIME, October 1 2012).
The above lines are very significant for the topic chosen. We can ask the following
pertinent and relevant question: ‘Cloud (accessibility, speed, etc.) and mobility (freedom,
movement, efficiency, etc.) for the Indian masses’ is for what? Are we going to make the
Indian masses share their wealth, ideas, information and talent freely and make them in turn
good human beings or are we going to share the negative forces that can destabilize the life
and future of our nation. If we are honest with ourselves, both are possible.
My message to the organizers is to challenge them to find ways and means of reducing
the sharing of negative forces that disrupt integral human growth and to enhance the sharing
of positive forces that would contribute to a meaningful human growth.
I wish the organizers all the best and God’s choicest blessings as they venture into such
an appropriate theme for their study and reflection.

With prayerful wishes,


Fr. Stanislaus Swamikannu SDB
Rector & President, Don Bosco Centre & BICS Info Tech
Date: October 03, 2012

5
BOS.CON 2012

Confessor’s Message

Dear BIIT Students,

I am glad to know that you are bringing out a souvenir on


Information Technology on the occasion of BOS.CON 2012. I
wish you every success in this endeavor.IT is one of the
spheres fast developing in the modern world. Technology is
fast changing and the students need to cope up with it. The
technologies I never heard about when I was young are at
your door steps to explore and learn.

Three things once gone, never come back: Time, Words and Fr Augustin K.
Opportunity. Remember this is a great opportunity given to you, do not let it pass by un-
noticed.

Opportunity: “Knock, Knock.”


Student: ”Who’s there"
Opportunity: “Opportunity!”
Student: “Can’t be.”
Opportunity: ”Why?"
Student: “Because opportunity knocks only once.”

So my dear students , a one-time and a great opportunity is given to you, To study, To


practice and to improve in information technology. It is a once in a life time chance to you In
this institution. Let it not pass by without grasping it. Make the best use of it.

All the best. God bless you.

Fr. Augustine Kariamadam SDB


Don Bosco Center, Yelagiri Hills

6
CLOUD AND MOBILITY FOR INDIAN MASSES

Director’s Message

Fr Thaddeus SDB

7
BOS.CON 2012

PDH & GI Warden’s Message

Dear Members of the Faculty and the Students,

It is with immense joy I send this message to BOSCON 2012!


We are living in an age that is interconnected! Connectedness
has become the daily reality! As children of an age where there
are only net-like borders, you have rightly chosen a theme, i.e.
Cloud and Mobility for the Indian Masses that addresses this
issue. Speed and accessibility are the watch words of today’s
technological world. Both these aspects are beautifully covered
by the theme. My heartfelt appreciation for you!

While connectedness is the reality and BOSCON 2012 has Fr Vincent Kabilai
addresses it in a fitting manner, the challenges that the fast
moving world are equally true and enormous. Any development in the field of information
technology is worth its name if it promotes the overall human growth and happiness. On the
contrary, if in the name of speed and accessibility, the information age accepts an ethics of
‘anything is OK as long as there is speed and accessibility’, then we cut the trunk of the
tree on which we are sitting. We are making this interconnected world not a safe place for
our future generation.

I wish the organizers all the best and all success!

Yours Truly,

Fr. Vincent Kabilai SDB


Warden PDH & GI

8
CLOUD AND MOBILITY FOR INDIAN MASSES

Administrator’s Message

Dear Friends,

I just wanted to let you know—the things you do today do


not go unnoticed. You’re a necessary piece to this puzzle. I
appreciate your dedication and service, and I know others
do too. Frederick Koenig once mentioned that happiness
comes not from getting something we lack, but from the
recognition and appreciation of what we do have. My
sincere appreciation and wishes for all those who are part
of this BOS.CON – 12.

We live in an age of technology. We cannot remain


Fr Desam Chinna SDB
complacent and attempt to spend our lives with the glory of
the past. In order to enhance performance we have to create an environment that enables
everyone to face the challenges courageously and successfully. Nothing in this world can be
achieved without hard work. Success does not come at once. You have to work hard steadily
for a long time to achieve success. The door of success does not open at the very first knock.
But, if you try again and again you will certainly succeed. Responsibility means a duty to
complete a task given by someone and to complete it well. You are expected to bring your
best; face the challenges with courage. I wish you all the best for your annual IT Fest.

The highest reward that God gives us for good work is the ability to do better. I hope this IT
Fest will give you a rich and positive experience. Experience is a hard teacher because she
gives the test first, the lesson afterwards. I would like to conclude with the words of our
former Prime Minister Indira Gandhi, “My grandfather once told me that there were two
kinds of people: those who do the work and those who take the credit. He told me to try to be
in the first group; there was much less competition. ” ALL THE BEST.

With best wishes and prayers,

Fr. Desam Chinna SDB


Administrator
Don Bosco Centre, Yelagiri Hills

9
BOS.CON 2012

AAH Warden’s Message

Attitude Matters

The longer I live the more I realize the impact of attitude on life.
Attitude to me is more important than facts. It is more important
than the past, the education, the money, than circumstances, than
failure, than success than what other people think or say or do. It is
more important than the appearance, giftedness or skill.

The remarkable thing is we have a choice everyday regarding the


attitude we will embrace for that day. We can’t change our past. We Sr Roseline, SMA
can’t change the fact that the people will act in certain way. We
can’t change the inevitable. The only thing we can do is play on the one string we have and
that is our own attitude. I am convinced that life is 10% what happens to me and 90% of how
I react to it. And so it is with you. We are in-charge of our attitude.

Attitude is a little thing that makes a big difference.

Sr. Rosaline
Warden, Arockia Annai Hostel
Yelagiri Hills

10
CLOUD AND MOBILITY FOR INDIAN MASSES

Message from St Charles

Indeed I regard it as a proud privilege to give this message on the occasion of your
celebration of your BOS.CON IT Fest.
In today’s complex world you are all engaged in molding the future generation that
would guide the destiny of this beautiful country of ours.
Five years ago, there was no Facebook. Yet, today, Facebook membership is only
exceeded by the population of China and India.
In many developed countries the mobile phone handset is used only 30% of the time for
making verbal communication.
There are more than 10,000 other application available in the mobile handset, making all
personal transaction including financial transaction, surfing the net, keeping appointment,
accessing the media and what not.
Let these innovation help our nation to wipe its fiscal deficit and reduce the scourge of
corruption almost to extinction.
I sincerely hope all your passed-out students will be professionally efficient and
personally convinced who will enlighten and empower the poor and marginalized of the
society to build a secular nation.
I appreciate and congratulate the organizer of BOS.CON 2012. “God’s giving deserves our
thanksgiving”.
I thank God fervently for this manifold blessings showered on you.
May your efforts grow and spread its wings far and wide embracing the largest section
of society as mustard seed of the Gospel parable.

With every good wish.

Sr. Sunita, scb


St Charles Convent
Yelagiri Hills

Date: 15-11-2012

11
BOS.CON 2012

Message from HoD (English)

From the desk of the HOD – English:

I take immense pleasure in congratulating both the organizers and


participants of BOSCON 2012 – a convergence of young talent in
Information Technology.

We are well aware that rural India faces a severe technology


deficit. There are of course, many other serious shortages such as
power, water, health facilities, roads, etc. When no one can deny
the crucial role of technology in solving these problems, the actual
Mr. Leo Maria Francis
availability of technology in rural areas is marginal. Both, the
digital divide and the technology divide need to be narrowed in at the earliest as they are of
utmost importance and have far greater impact on the all around development of India.
Today, we need an enormous effort to devise user-friendly technology solutions for the
problems of rural India.

May event such as BOSCON 2012 help young and innovative minds to understand the true
needs of rural India and bridge the gap between villagers and technologists. This will link the
booming, bits-and-bytes India with the suffering, stagnating India. Let the knowledge-driven
sector serve as an engine of growth that pulls along both the rural and the urban India
towards equal development and prosperity.

Wishing BSCON 2012 a great success,


Leo Maria Francis M L.

12
CLOUD AND MOBILITY FOR INDIAN MASSES

Message from HoD (Computer Science)

I am very happy to appreciate and thank ,


the President, Mr Julias Ceasor, the Vice-President Mrs Rose Gandhi,
the Faculty members, the Office Bearers of Students@IT Association
and all the Organizers of BOS.CON 2012 for their meticulous efforts
put in for organizing a great event of Don Bosco College.

The need of the hour is to bring together the INNOVATIVE YOUNG


MINDS from various rural and urban institutions to share their
knowledge and to bring out the best of their skills and innovative Mr. Sundaram M.
ideas to develop our country especially the rural areas of India using IT.
This need is being addressed by BOS.CON...

I wish you all the best for the grand success of this event...

Thank you.
Sundaram M.
Head, Department of Computer Science
BIIT, Yelagiri Hills

13
BOS.CON 2012

Students@ITA Message

I am extremely happy
about the Mega extravaganza of BIIT that is BOS.CON. It helps
our students to organize such program and enrich their
versatile learning. Every year it concentrates the very latest and
advanced application of IT as theme, thus it helps the
participants to exhibit their talents.

This highly determined platform, allows them to think out of the


boxes. Through BOS.CON students can share their ideas with Rose Gandhi M.

others. I would say this is the best way of creating more ideas. So let us share and discuss our
ideas. “An idea can change our life but the ideas of the technocrats can change the course of
the world”. I thank our Management, Faculties and Non Teaching staff for their well focused
cooperation towards this program. I wish all the best to various committees involved
BOS.CON 2012.

M. Rose Gandhi
(Vice-President, Students@IT Association)

14
CLOUD AND MOBILITY FOR INDIAN MASSES

BOS.CON’12 COMMUNITY
Steering Committee
Fr. Stanilaus Swamikannu sdb, Rector & President (DBC & BICS InfoTech)
Fr. Desam Chinnappa Raj sdb, Administrator (Don Bosco Centre)
Fr. Augustine Kariyamadam sdb, Confessor (Don Bosco Centre)
Fr. Vincent Kabilai sdb, Warden (PDH & Guezou Illam)
Sr. Roseline, Warden (AAH)
Sr. Gracy, Asst. Warden (AAH)
Br. Vincent Prabhu, Asst. Warden (PDH)
Br. Arockia Anbu, Asst Warden (Guezou Illam)

BOS.CON General Chair


Fr Gregory Thaddeus SDB, Director (BIIT) & CEO (BOSCO ITS)

BOS.CON Chair
Mr Julias Ceasor, President, Students @IT Association

Co-Chair
Mrs Rose Gandhi, Vice President, Students @IT Association

Faculty Advisory Committee


Mr. Leo Maria Francis, HOD-English (BIIT)
Mr. Sundaram, HOD-Computer Science (BIIT)
Mrs. Jayamary Christuraj, Faculty (BIIT)
Mr. Prabhakaran, Faculty (BIIT)
Br. James VM, Faculy (BIIT)
Mr. Arul Francis, Faculty (BIIT)
Mr. Kulandai Yesu, Faculty (BIIT)
Mr. Ananda Raj, Faculty (BIIT)

Students@IT Organizers
Antony Doss J. – General Secretary
Pushpa Ranjitha - Associate Secretary
Santosh Sagayaraj - Joint Secretary- (III Year)
Rufina - Joint Secretary- (III Year)
Kuppan (III Year) - Alumni Secretary
Nelson J., Simon, Leena Jenifer, Lavanya T. - Joint Secretary - (II Year)

Technical Advisory Committee


Nelson Jayaraj & Kumarasen, Multimedia Division, BOSCO ITS

15
BOS.CON 2012

BOS.CON’12 COMMUNITIES...

DOCUMENTATION
Mathiyas (L) Pradeep Kumar Arockia Samy A
Geetha (AL) Saini Karolin Sophia Arun Kumar
Amal Raj S. Vikram Nisha

PUBLICITY
John Francis (L) Antony Samy Richardson Raja
Mani (AL) Antony Arul Selva Murugan
Sathish Kumar J

HOSPITALITY

Pushpa Raj (L) Arulanatham Paul Raj


Vinitha Mary (AL) Arockia Raj Ashok Kumar
Ashok Prakasam Sagayarani Margret Mary
Suganya K Arockia Samy S Kannan S
Tharshini Priyanga S

FUND RAISING

IMO Fethics (L) Sathish Kumar M. Infant Kishore S.


Sujith Kumar (AL) Santhosh Kora Jason Mathew
Ashok Parthiban Thangaraj E. Ragul

EVENTS COMMITEES

1. Paper Presentation: TechWord


Thomsan (L) Lincy Mary Lizzy
Venisha (AL) Edwin Kumar A Prathipa
Karthikraj Lawrence Vanitha

16
CLOUD AND MOBILITY FOR INDIAN MASSES

BOS.CON’12 COMMUNITIES...

2. IT Quiz: Wobbling Mind


Adaikala P. Kumar (L) Sarath Kumar J Vincent Savariraj
Ranjitha Mary (AL) Gemburaj Margrate Arockiaya
Arockia Samy P Vinnarasi Joy Vincy
Indhira Kumari Ranjith G

3. Debugging: Programming Dexterity


Gnana Prakasam (L) Maria Joseph John Britto M.
Mary Albeena (AL) Carmel Mary Consal Mary
Vivek Selvi Antony Sharma

4. Web Design: Virtual Dreams


John Paulraj (L) Kulandai Baba Gladson
Gnana Amalarani (AL) Naveen Suganya Mary
Anest Vivek A. Praveen Kumar G.

5. Marketing: Venture Capitalism


Praveen Kumar (L) AMB Nishanth Jacob Nelson
Kanikairaj Kanimozhi Delphin Mary
Sathish M. Arivazhagan L. Amala Deepa A.

6. Image Collage: PixaTalk


Naveen (L) Sujith Kumar Divya P.
Hema (AL) Delphina J. David M.

7. Poster Presentation: ViewPace


Sathish Kumar (L) Santhosh Kora Meena & Princy
Precilla Mary (AL) Anast Vivek Kuppan

REGISTRATION
Arockia Amalraj (L) Lourdu Samy Gnana Muthu M.
Mary Suni (AL) Sarath Kumar S. Velanganny
Arul Rozario Anushiya Mary Lavanya Mary
Jerome Reginold

17
BOS.CON 2012

KEY RESULT AREAS


 DOCUMENTATION  FINANCE
 Publication of BOS.CON Souvenir  Fundraising
 Documentation as Dozier  Communication with Sponsors
 Maintaining Alumni Database
 FINANCE
 Shipping Gratitude Kits
 Call for Colleges to Participate in IT Fest
 Mementos, Certificates and Prizes  PUBLICITY
 Registration of Colleges  Design and print of Posters and Banners

 Accounts Maintenance  Printing Invitation, ID Cards and badges


 News Release to Dailies and Local
 HOSPITALITY Channels
 Reception and Accommodation
 Jubilee Hall Decoration, Stage Backdrop
 Refreshment and Lunch and Pluck Cards Design
 Arrangement of Transportation  Photos and Video coverage of IT Fest

 EVENTS

 Paper Presentation  IT Quiz


 Organization of Events  Online Questions for Prelims
 Arrangement of Judges  Questions for Quiz
 Results Reporting  Score sheet and Prelim result
announcement
 Programming  Avail Resources for Quiz
 Online Test Questions
 Questions for Debugging  Web Design
 Web Design Theme Selection
 Score Sheets preparation
 Questions for Web Design
 Avail resources for Programming
 Arrangement of Evaluators
 Marketing  Demo to Participants
 Prelim Questions  Conduct Web Design Event
 Organize Marketing Event  Results Announcement
 Selection of Best Teams  Resource Arrangement (Systems)
 Assistance of Judges

18
CLOUD AND MOBILITY FOR INDIAN MASSES

PROGRAM SCHEDULE
08.30 AM : REGISTRATION
09.30 AM : INAUGURATION
● Welcome Address
● Inaugural Address
● Felicitation
● Keynote Address
(Theme: Cloud & Mobility for Indian Masses)
● Vote of Thanks

09.45 AM to 10.30 AM : COFFEE BREAK

10.30 AM to 12.50 PM : EVENTS

● Programming Dexterity: Debugging


● Wobbling Minds: IT Quiz
● ViewPace: Poster Presentation
● TechWord: Paper Presentation Parallel Events

● Virtual Dreams: Web Design


● PixaTalk: Image Collage

01.00 PM to 01.30 PM : LUNCH


01.45 PM to 03.30 PM : Venture Capitalism: Marketing
03.45 PM : VALEDICTION
● Welcome Address
● Participant’s Feedback
● Felicitation
● Valedictory Address
● Prize Distribution
● Vote of Thanks
● Hymn to Don Bosco

19
BOS.CON 2012 KEYNOTE ADDRESS

Cloud Computing in Mobile Applications


For Indian Masses

India is leading in Inventions and Tamil civilization existed more


than 4000 years ago, but unfortunately the scripts are not
published in reputed American Journals. To begin with a old Tamil
proverb, yaanai varum pinne mani osai varum munne. For us, it may
be simple words, but Doppler proposed a theory, which exactly
matches with the proverb called ‘Doppler Effect’. The 1848 theory
states thus: "for sound waves, the sound's pitch is higher than the
Pf. Ra. K. Saravanaguru emitted frequency when the sound source approaching". The
Doppler Effect is actually used in huge applications like sirens on a
passing emergency vehicle, astronomy, radar, medical imaging, satellite communication,
underwater acoustics, blood flow measurement, etc.

Cloud Computing is a typical service sharing model through Internet. The concept is actually
borrowed from B2B (Business to Business) environment, which has implemented through
IBM Mainframes in 1960's. To provide some computation as a service, it is essential to
understand Service-oriented Architecture where Service Publishing, Service Finding and
Service Binding are realized using API's. (Application Programmable Interface).

The SMB/SME (Small and Mid-range Business/ Small and Mid-range Enterprise) get at most
benefits by providing their business in cloud environment. For Example, Cloudonomics
states two terms, Capitational Expenses and Operational Expenses (CAPEX and OPEX). The
scenario today, to start a new business online, the initial cost is 'zero' and to maintain the
business at affordable cost, like 'PAY PER USE' scheme. So, the resources, applications and
software can be availed as services, and becomes easy for users like utility access
(Telephone, Electricity, Water, etc).

In cloud computing, three major deployment models exists; namely, Private Cloud, Public
Cloud and Community Cloud and services categorized as Infrastructure as a Service (IaaS),
Platform as a Service (PaaS) and Software as a Service (SaaS). The Middleware is the
backbone to provide some 'X' as Service in the Internet. From the evolution of Middleware
Technologies, it seems that cloud is a rebirth of Mainframe systems. Because, in mainframe
architecture, the client systems are treated as dumb terminals and all the necessary
functionalities are stored in a Single Server. In the similar way, WEB 3.0 evolves to maintain
Internet as a Platform and the client systems that are trying to access the services as dumb
terminals.

For Indian Masses starting new businesses online, the cloud environment is the fantastic
opportunity to begin with; for example, maintaining a CRM (Customer Relationship
Management) online through cloud. That is, if you want to purchase a new product there are
lot of websites available today like ebay, Flipkart and Amazon as the top most websites in
Indian market with the target Rs. 500 Crore per year. This is because of increasing the rate of
Internet users every year in India. To keep this in mind, the students can just turn up to

20
KEYNOTE ADDRESS CLOUD AND MOBILITY FOR INDIAN MASSES

Keynote Address...

develop the cloud-based projects and make them available online as services instead of
repeating the same old database projects and demonstrating within PC's or laptops.

Android is the open access platform for Mobile Application development in which lot of
services can be developed and deployed in the market. Once you start a new Java/PHP/.Net
based project and make it available as .apk, thereby any mobile Internet user can download
your app as a ready to use application. Suppose a new visitor comes to your place, say
Yelagiri and he would like to know the nearby hotels and the detailed information, the same
can be provided as a service through your app. Similarly, lot of applications can be created
and deployed over Internet as freely available services or pay per use service through the
concept of Mobile Web Services.

All the very best for the students and faculty who are continuously encouraging for
developing applications to lead the Indian Market with the help of Cloud Computing in
Mobile Applications. This Conference gives me an opportunity to share my knowledge and
ideas with the gathering. Thanks.

Ra. K. Saravanaguru is working as Assistant Professor Senior and pursuing PhD in School of Computing Science and
Engineering at VIT University. He has received his M.Tech. degree from SASTRA in 2003, Deemed University and B.E. (C.S.E)
from University of Madras in 2000. His research work focuses on Context-Aware Systems, Vehicular Ad hoc Networks,
Middleware Technologies, Semantic Web and Cloud Computing. Email: saravanank@vit.ac.in

Most Simple Definition of Cloud Computing

There was a time when every household, town, farm or village had its own
water well. Today, shared public utilities give us access to clean water by
simply turning on the tap; cloud computing works in a similar fashion. Just like
water from the tap in your kitchen, cloud computing services can be turned on
or off quickly as needed. Like at the water company, there is a team of
dedicated professionals making sure the service provided is safe, secure and
available on a 24/7 basis. When the tap isn't on, not only are you saving water,
but you aren't paying for resources you don't currently need.

Vivek Kundra, Federal CIO, US

21
BOS.CON 2012

BOSCONITES
(Participant Colleges)

No. College Name & Contact Address

(1) Gonzaga Arts and Science College for Women


Kathanpallam, Elathagiri (Po), Krishnagiri District, TN-635108

(2) Don Bosco College Arts and Science

Pappanahalli Village, Sogathur (PO), Dharmapuri, TN - 636809

(3) Sacred Heart College

Tirupattur, Vellore District, TN-635601

(4) Islamiah Arts and Science College

New Town, Vaniyambadi, Vellore (Dt), TN

(5) Arignar Anna Arts and College

Jakkappan Nagar, Ist Cross, Krishnagiri, TN-635001

(6) K.M.G College of Arts and Science

R.S. Road, Ammanangkuppan, Gudiyatham, Vellore (Dt), TN

(7) Muthurangam Government Arts and Science College

Otteri, Vellore-2, TN

(8) Thiruvalluvar University College Arts and Science College

Gajalnayakanpatti, Kandili(PO), Tiruppattur(TK), Vellore(Dt), TN-635901

In 20 or 30 years, you'll be able to hold in your hand as much computing


knowledge as exists now in the whole city, or even the whole world.
Anonymous

22
CLOUD AND MOBILITY FOR INDIAN MASSES

IT FEST WINNERS

Overall Championship
1. Gonzaga Arts and Science College, Elathagiri

2. Don Bosco College (Shift-1), Dharmapuri

3. Sacred Heart College, Tirupattur

 Paper Presentation (TechWord)  Debugging (Programming Dexterity)

1. Don Bosco College, Dharmapuri (Shift-1) 1. Don Bosco College, Dharmapuri (Shift-1)

2. Sacred Heart College, Tirupattur 2. Gonzaga Arts and Science College, Elathagiri

3. Gonzaga Arts and Science College, Elathagiri 3. Muthurangam Arts and Science College, Vellore

 IT Quiz (Wobbling Minds)  Web Design (Virtual Dreams)

1. Gonzaga Arts and Science College, Elathagiri 1. Sacred Heart College, Tirupattur

2. Don Bosco College, Dharmapuri (Shift-1) 2. Don Bosco College, Dharmapuri (Shift-1)

3. Don Bosco College, Dharmapuri (Shift-2) 3. Gonzaga Arts and Science College, Elathagiri

 Marketing (Venture Capitalism)  Poster Presentation (ViewPace)

1. Islamiah College, Vaniyambadi 1. Sacred Heart College, Tirupattur

2. Sacred Heart College, Tirupattur 2. Islamiah College, Vaniyambadi

3. Don Bosco College, Dharmapuri (Shift-1) 3. Gonzaga Arts and Science College, Elathagiri

 Photo Collage (PixaTalk)

1. Islamiah College, Vaniyambadi


Perl of BOS.CON’12 [Monica]
2. Gonzaga Arts and Science College, Elathagiri
Sacred Heart College, Tirupattur
3. Sacred Heart College, Tirupattur

“Congratulation to winners
and Future IT Pros!”

23
BOS.CON 2012

BOS.CON’12 Press Release


BOS.CON IT Fest: Cloud and Mobility for Indian Masses

YELAGIRI, OCT 12 2012: Students’ IT Association of Don Bosco College organized


BOS.CON’12, the Inter-collegiate IT Fest on October 12, 2012 at Don Bosco College, Yelagiri
Hills to network with neighboring colleges in and around Vellore District for knowledge
sharing among students.

Every year, the budding IT Pros of Don Bosco College (BIIT), Yelagiri Hills organize inter-
collegiate IT Fest called, “BOS.CON” (“Bosco Connects”). This year, the event was organized
on October 12, with the theme: “Cloud and Mobility for Indian Masses.” Over 100 students
from 12 neighboring colleges participated in this mega IT event. Prof. R. K. Saravanaguru M.
Tech, the Assistant Professor of VIT University was the chief guest of the day who delivered
the keynote address on BOS.CON theme.

In his address, he highlighted the business part of cloud computing on mobile devices. He
said, “The students should think differently to make innovative project and to become an
entrepreneur.” “The cloud computing is not a new technique, but it exists from 1967
onwards. We just rediscovered it and has given different name to it”, Prof. Saravanaguru
added.

Rev. Fr Stanislas Swamikannu SDB, the Rector and Secretary of the college felicitated the
gathering and exhorted the participants thus: “make use of the opportunities you get every
day.”

Earlier, the Principal, Fr Thaddeus SDB, inaugurated this IT Fest. In his inaugural speech, he
pointed-out the purpose of this IT Fest. “(BOS.CON) Helps to form fruitful network among
the students to have knowledge sharing, which makes learning better and better.” He said.

The competitive events for the BOS.CON’12 was Technical Paper Presentation, IT Quiz,
Program Debugging, Web Designing, Marketing, Poster Presentation and Image Collage.

Fr Augustin SDB, Fr Chinnaparaj Desam SDB and Mr Bernard Benjamin, (a well-wisher of


Don Bosco) were presided over the valedictory function and distributed the prizes to the
winners.

This year, the Gonzaga Arts and Science College for Women, Kathampallam, Krishnagiri Dt.,
got the overall championship winning over 10 participating colleges. The “Pearl of
BOS.CON’12” was awarded to Ms. Monica from Sacred Heart College, Tirupattur.

Incidentally, Don Bosco College (previously, ‘BIIT’), Yelagiri Hills after 14 years of expertise
in imparting professional education to the rural young minds and has just received formal
affiliation to Thiruvalluvar University.

24
CLOUD AND MOBILITY FOR INDIAN MASSES

TECHNICAL PUBLICATION

Content
Page
I n computing, turning the obvious
into the useful is a living definition
of the word "frustration".
I. IT Fest Winning Papers ........................................ - Alan Perlis
1. Social Networking for Social Men···················
2. Mobile Applications for Wireless Networks ···
3. Green Computing ··········································
C omputing is not about computers
any more. It is about living.
- Nicholas Negroponte

II. TECHNICAL REPORTS U tility model of computing:


computing resources delivered
over the network in much the same way
1. Cloud Computing Architecture·······················
that electricity or telephone service
2. Survey on Mobile Applications·······················
reaches our homes and offices today -
3. Cloud Computing Types and Deployment······· makes more sense than ever.

4. Cloud Engineering ········································· - Scott McNealy

T
5. Computing Models for Indian People ············· hey don't call it the Internet
6. Mobile Computing Devices ···························· anymore, they call it “cloud
computing”. I'm no longer resisting the
7. Mobile Applications for India ·························
name. Call it what you want.
8. Mobile Technologies Evolution ····················· - Larry Ellison
9. Models of Cloud Computing ···························

III. PAPER ABSTRACTS ....................................... 54


I think computing power is ready to
do 3D justice. It was great for
shooters and racing games in the past,

1. Medical Applications of Wireless Networks but I didn't think it was right for

2. Virtual Reality strategy games.

3. Neural Network - Sid Meier

4. SCANDI: Bluetooth – Wireless Technology


5.
6.
Open Source Technology
Network Security T he great advance of personal
computers was not the computing
power per se but the fact that it
7. Social Networking
brought it right to your face, that you
8. Database Technology
had control over it that were
9. Enterprise Resource Planning (ERP)
confronted with it and could steer it.
10. Client-Server Computing: Wave of the Future
- Kevin Kelly

25
BOS.CON 2012 Winning Papers

Social Networking: Making Men More Social

Abstract similar interests, and can be a very effective


Man, a social animal finding comfort and solace in a business technique for entrepreneurs, writers,
society ,today when hardly he is free, socializes through actors, musicians or artists. Social networks
participatory and self-expressive web sites like Twitter, allow us to reach out to others that have the
MySpace, Facebook-where members expose, discuss,
same interests. For example, if you like movies,
reveal, and expound on their personal lives, activities,
hopes, dreams, and even fantasies for others to marvel Flixster can help you decide if we might like a
upon. Statistically 93% of Indian adolescents aging 12- new movie just out at the theatres and if we like
17 years go online and 95% of college students have a music, Last.FM can help us find new artists that
Facebook account and numbers is increasing. This paper are similar to our favorite bands.
highlights the importance, functioning, pros and cons of
social networking and ways to improve it with due
SOCIAL NETWORKING
concern of the cloud & mobility for Indian masses.
ARCHITECTURE
————————————————
Social networking is based on a certain structure
Necessity being the mother of inventions, man that allow to both express ones individuality and
developed social networking to keep in touch meet people with similar interests which
with each other and maintain the social bond includes having profiles, friends, blog posts,
proving that he is indeed a social being. widgets, and usually something unique to that
particular social networking website such as the
WHAT IS SOCIAL NETWORKING? ability to 'poke' people on Facebook or high-five
someone on Hi5.
Network is the connection between two or more
node (systems) to share data, devices etc. or to Profiles tell the world about oneself and contain
exchange information and social networking basic information, like area of living, age,
deals with online communities enabling us to personality queries, hobbies, likes, dislikes, etc
form groups of similar interest and interact followed by friends, the heart and soul of social
thereby improving our knowledge and human networking who are allowed to post comments
bond. It has become very popular during the on our profile or send us private messages. We
past few years, but it can still be very difficult can also keep tabs on how your friends actions,
to understand for someone new to social like posting a new picture or updating profile. It
networking. The open-ended nature of social should be noted that not all social networks refer
networks adds to this. Once signed onto a social to them as 'friends' as for instance Linkedln
network, having answered a few basic profile refers to them as 'connections‘ but all social
questions, it is easy to sit back and wonder what networks have a way to designate members as
we are supposed to do next. The easiest way to trusted, then the groups sometimes called
understand social networking is to think of it ‗networks‘ on Facebook to help find people with
like college. At first, we don't have any friends, similar interests or engage in discussions on
but as we join groups, we begin to meet people, certain topics. A group can be anything from
and build a friends list of those with similar "Don Bosco College BCA 2010-2013‖ to
interests. ―Yuvan‘s fan‖, also a primary focus of groups is
to create interaction between users in the form
Social Networking is a nice form of
of discussions.
entertainment, great for meeting people with

26
Winning Papers CLOUD AND MOBILITY FOR INDIAN MASSES

Most social networking websites support SOME FEATURES OF SOCIAL


discussion boards for the groups, and many also NETWORKING SITES
allow members of the group to post pictures,
music, video clips, and other tidbits related to Some of the common features shared by most
the group. Blogs gives the ability to create our of these sites includes a User‘s Profile Page and
own blog entries and is perfect for keeping Account Management and ability to invite a
people informed on what you are up to. Many Friend, Blogging and Comment System,
social networks allow a variety of widgets, Contact (Friend) Lists and Networking
popular way of letting our personality shine Facilities (Interest Groups), Taxonomic Search
through by gracing your social networking Structure, Folksonomic Tagging Personal and
profile. Public Bookmarking, User RSS Aggregator for
External and Internal Feeds, Audio/Video/
TYPES OF SOCIAL NETWORKING SITES Photo Upload and Sharing, Polls /Surveys,
Presence Awareness (who‘s online lists), File/
● General sites geared toward teens - Such Audio/Video Sharing, Video publishing and
sites includes topics interesting to teens like Online Video Editing
music, videos, chatting, online dating etc.
SOCIAL NETWORKING FOR INDIAN
● Schools and colleges - Sites allowing MASSES
uploading, downloading, viewing contents
related to subjects oriented aiming for The social networking sites in India are one
academic improvements among those revolutionary ideas which have
made huge variations in the existing situation.
● Cultures (e.g., African American, Hispanic, These social networking sites in India are never
European, Canadian) - Promotes culture just a medium to maintain or to create
oriented events and upbringing and holding relationships. But the social networking sites in
to social values of the specified groups. India are also used as a tool to enhance the
scope of business by many people. Social
● Business - Most of the present recruiters‘
media is place where people with no
follow-up candidates to know more about
restrictions of cast, creed, or nationality join
them and the type of competition going
hands. Many people in India rely on online
around them.
business for their living. Students groups can be
● Music and videos - It mostly used for music created where students find up-to-date details
lovers where they can find a whole sea of on their subjects. Social help groups can
music and present their views on it. enhance awareness on various issues.

● Chatting and entertainment - The very Almost all the businesses, whether small or
common purpose and prominent usage large have an online presence mainly via a
found in the present world. website. As per relevant sources, it is estimated
that more than 40% of online traffic is
● Sports (e.g., football and golf) Updates generated by the social networking sites. With
information and connect people by their love the social networking sites in India, the
for the games. opportunity to advertise is high and targeting a
specific set of audience is easier. These sites are
used by people from almost every range of age

27
BOS.CON 2012 Winning Papers

groups. Doing promotion with any of the social Steps to Safety: We can be play safe in social
networking sites in India is very much similar to networking by keeping personal information
the traditional networking. We simply join any private, adding friends we know in real life
of the networks and start engaging with the only, sharing profile and photos only with
other members. A lot of social networking sites friends, Never posting sexually provocative
in India are getting into online world these days photos, never meeting with someone we only
which helps to stay connected. And all of them know online, by not posting information,
will be having their own unique features, both photos, videos we may later regret, using
positives and negatives. privacy settings to limit access.

FACTS AND FIGURES OUR CONTRIBUTION

The popularity of such sites can be seen from The topic is a really interesting one and we
statistics showing that in 2007, there were more have ourselves develop some sites and groups
than 300 known social networking sites, 94% of online for promoting interest and involvements
teens are online, or have access to the Internet, in the field which I study i.e. Computer
65% of teens have at least 1 online profile, 93% Applications. For more information on it you
of Indian adolescents aging 12-17 years go can visit our class website www.
online, 95% of Indian college students have a dbca20102013.webs.com and get full details of
Facebook account and the clock ticking proving all the activities going on in it. The events in it
the gaining popularity and usage of it for the are open to all and posted on most of the social
general masses. networking sites like Facebook, Orkut for
encouraging students in this field. The various
SOCIAL NETWORKING:
groups and events that have been contributed
PROS AND CONS
are:
Pros: Social networking sites has found good
applications in almost every fields of life and ● Get Idea Group: A group for ignited and
gaining more ground as it helps us in keeping in eager minds to share and learn new
touch with family and friends from across the technology in the IT field. It was created in
nation and the world, reconnecting old friends, 2011 for all those who strive for new ideas
joining causes, medical applications, following and thoughts in the computer field.
politics, networking for employment, fun &
entertainment, team working and make us feel ● The Young India Group: This group was
connected with the world and get any created in 2011 and is a platform consisting
information at a click. of more than 300 Indians who wants to see
a New India and its meant to create social
Cons: Though such services are so useful the awareness on the issues of daily life and
dark side of it can be illustrated from features as suggesting solutions.
photos become property of networking sites,
generation of SPAM, information poaching & ● The Young Computers Group: This
hacking, misconstrued social capital, online vibrant group was also created in 2011 and
choices have offline consequences, misusage of has members of around 900 including
data, once posted it is online, somewhere, students, professors, IT professionals and
forever, immature behavior, T\threatening, experts who post about the new trends and
bullying, etc. development in the computer world and

28
Winning Papers CLOUD AND MOBILITY FOR INDIAN MASSES

also gives reviews of latest softwares and REFERENCES


development in IT world
―How to do Social Network Analysis?‖
● Techonline 2012 Event: It is an upcoming Retrieved from http://www.orgnet.com/
online event to be held in the month of sna.html
December 2012 for IT students on
dbca20102013.webs.com on topics like J.C. Thomas, W.A Kellogg, T. Erickson, ―The
Paper expo, Picture design and Video Knowledge Management Puzzle: Human and
presentation to enhance knowledge in IT social factors in Knowledge Management‖.
field. Many contestants have registered and IBM Systems Journal. Volume 40. Number
are waiting for a tough competition to show 4.2001
their knowledge and skills.
Wellman, B. (1996) For a Social Network
CONCLUSION Analysis of Computer Networks: A
Sociological Perspective on Collaborative
Use social networking effectively and positively Work and Virtual Community. Proceedings of
to establish new relationships, strengthen SIGCPR / SIGMIS. Denver, CO. ACM Press.
existing ones, innovate, learn, collaborate, and
have fun. But beware of the risks so you can do http://www.ischool.utexas.edu/~i385q/readings/
your best to steer clear of them. Wellman-1996-ForASocial.pdf

FUTURE WORK Social Media Websites

Social Networking could help us in following http://traffikd.com/social-media-websites


ways in future by Reducing Complexity and
http://www.joe-whyte.com/2007/04/02/looking-
Visualizing using Geographic Information
for-a-list-of-social-media-sites-i-have-them-all-
Modeling
here/ (all accessed on 7th October 2012)

Authors: Aravind Prasadh and Jagan


Don Bosco College of Arts and Science
(Shift-1), Tirupattur
{jeganprabu2525@gmail.com,
rickyamla@gmail.com}

29
BOS.CON 2012 Winning Papers

Green Computing
Abstract in minimizing use of energy while maximizing
Green Computing is now under the attention of not only efficiency. Energy Star applied to products like
environmental organizations, but also businesses from computer monitors, television sets and
other industries. In recent years, companies in the temperature control devices like refrigerators,
computer industry have come to realize that going green air conditioners, and similar items.
is in their best interest, both in terms of public relations
and reduced costs. This paper will take a look at effective
One of the first results of green computing was
green computing, technical terms and its applications.
the Sleep mode function of computer monitors
Keywords: Green Computing Groups and Practices, which places a consumer's electronic equipment
Green Computing Technologies, Green Computing
Methods, Advantages of Green Computing on standby mode when a pre-set period of time
———————————————— passes when user activity is not detected. As the
Green computing is the term used to denote concept developed, green computing began to
efficient use of resources in computing. This encompass thin client solutions, energy cost
term generally relates to the use of computing accounting, virtualization practices, eWaste,
resources in conjunction with minimizing etc.
environmental impact, maximizing economic
viability and ensuring social duties. Green 2.2 Green Computing Groups
computing is very much related to other similar Currently, one of the popular green computing
movements like reducing the use of groups is tactical incrementalists. This group
environmentally hazardous materials like CFCs, applies and uses green computing philosophies
promoting the use of recyclable materials, mainly to save up on costs rather than save the
minimizing use of non-biodegradable environment. This green computing concept
components, and encouraging use of sustainable emerged naturally as businesses find
resources. themselves under pressure to maximize
resources in order to compete effectively in the
One of the spin-offs of green computing is market. This movement arose mainly from
Electronic Products Environmental Assessment economic sentiments rather than political
Tool (EPEAT). EPEAT products serve to pressure.
increase the efficiency and life of computing
products. Moreover, these products are designed Strategic Leaders take into account the social
to minimize energy expenditures, minimize and environmental impacts of new and
maintenance activities throughout the life of the emerging technologies. Aside from minimizing
product and allow the re-use or recycling of costs, this particular movement also takes into
some materials. account other factors such as marketing and
branding. Unlike the position held by tactical
2. BACKGROUND incrementalists, strategic leaders recognize the
need to overhaul some existing policies or
2.1 History structural makeup of the organization. This can
One of the first manifestations of the green be seen in recent efforts to make IT personnel
computing movement was the launch of the directly responsible for managing, minimizing
ENERGY STAR program back in 1992. and ensuring efficient energy expenditures.
Energy Star served as a kind of voluntary label
awarded to computing products that succeeded 2.3 Green Computing Practices

30
Winning Papers CLOUD AND MOBILITY FOR INDIAN MASSES

Some common green computing practices ● Land pollution impacts on Degrade and
include turning off the monitor when it's not in devalue the land, impacting ecosystem and
use or using more energy efficient monitors like aesthetics.
LCDs instead of the traditional CRT monitors,
volunteer computing or file sharing practices, 3.4 Impact of Toxic waste to the
virtualization of servers, using more energy Environment
efficient and less noisy cooling systems, The computer crowding our landfills contains
temperature maintenance and regulation to lead, mercury, cadmium, beryllium and traces
reduce thermal shock wear and tear to computer of many other hazardous materials.
parts, and increased online security measures Incineration, this releases heavy metals like
through the use of firewalls, anti-spyware and lead, mercury and cadmium into air and ashes.
anti-virus programs to reduce the increasing Even recycling the electronics can harm the
amount of eWaste on the Internet and on other workers and the environment surrounding them.
networks. Those are more important parts of our lives and
economy. But the users can do something to
3. CAUSE FOR GREEN COMPUTING make the environment healthy. These are the
some of the main causes for the Green
3.1 Uses lot of electricity Computing.
Most of the natural resources are being used to
get the electricity, that all have some impacts on 4. GREEN COMPUTING
the environment. TECHNOLOGIES

3.2 Creates lots of toxic waste VIA Technologies, a Taiwanese company that
Most of the users are updating our computers, manufactures motherboard chipsets, CPUs, and
throwing outdated computer resources, other computer hardware, introduced its
peripherals, and other hardware devices etc., initiative for "green computing" in 2001. With
these are the hazardous toxic waste produced this green vision, the company has been
really damaging the environment now a days. focusing on power efficiency throughout the
design and manufacturing process of its
3.3 Impact of Electricity to the Environment products. Its environmentally friendly products
The Electric power produces more pollution to are manufactured using a range of clean-
the environment. They are Air pollution, Water computing strategies, and the company is
Pollution and Land pollution. Fossil fuel power striving to educate markets on the benefits of
plants release air pollution and require lot of green computing for the sake of the
water. Nuclear power plants release lot of environment, as well as productivity and
radioactive energy and hazardous waste. Even overall user experience.
renewable energy sources affecting water and
wild life and even hurting the food chain too. 4.1 Carbon-free Computing
● Air pollution impacts on Climate change, One of the VIA Technologies‘ ideas is to
Acid rain, Ozone, Air toxics reduce the "carbon footprint" of users — the
● Water pollution impacts on Consumption of amount of greenhouse gases produced,
water resources, Polluting water bodies measured in units of carbon dioxide (CO2).
Greenhouse gases naturally blanket the Earth
and are responsible for its more or less stable

31
BOS.CON 2012 Winning Papers

temperature. An increase in the concentration of cost. Worldwide production of solar cells has
the main greenhouse gases — carbon dioxide, increased rapidly over the last few years and as
methane, nitrous oxide, and fluorocarbons — is more governments begin to recognize the
believed to be responsible for Earth's increasing benefits of solar power, and the development of
temperature, which could lead to severe floods photovoltaic technologies goes on, costs are
and droughts, rising sea levels, and other expected to continue to decline. As part of
environmental effects, affecting both life and the VIA's ―pc-1‖ initiative, the company
world's economy. After the 1997 Kyoto Protocol established the first-ever solar-powered cyber
for the United Nations Framework Convention community center in the South Pacific,
on Climate Change, the world has finally taken powered entirely by solar technology.
the first step in reducing emissions. The
emissions are mainly a result of fossil-fuel- 4.3 Lead-Free and RoHS computing
burning power plants. VIA aims to offer the In February 2003, the European Union adopted
world's first PC products certified carbon free, the Restriction of Hazardous Substances
taking responsibility for the amounts of CO2 Directive (RoHS). The legislation restricts the
they emit. The company works with use of six hazardous materials in the
environmental experts to calculate the electricity manufacture of various types of electronic and
used by the device over its lifetime, generally electrical equipment. The directive is closely
three years. From this data, one can conclude linked with the Waste Electrical and Electronic
how much carbon dioxide the device will emit Equipment Directive (WEEE), which sets
into the atmosphere during its operation. This collection, recycling, and recovery targets for
estimate will serve as an indicator, and the electrical goods and is part of a legislative
company will pay regional organizations for the initiative that aims to reduce the huge amounts
―sequestering,‖ or offsetting, of the emissions. of toxic e-waste. Driven by these directives,
Offsetting carbon dioxide can be achieved in VIA implemented a set of internal regulations
different ways. One way is to plant trees that in order to develop products that are compliant
absorb CO2 as they grow, in the region in which with these accepted policies, including the use
the processors were purchased. The necessary of nonhazardous materials in its production of
amount of trees per processor is represented by chipsets, processors, and companion chips. In
VIA's TreeMark rating system. 2001, they focused on lead-free manufacturing,
introducing the Enhanced Ball Grid Array
4.2 Solar Computing (EBGA) package for power efficient VIA
Amid the international race toward alternative- processors and the Heat Sink Ball Grid Array
energy sources, VIA is setting its eyes on the (HSBGA) package for their chipsets. In
sun, and the company's Solar Computing traditional manufacturing processes, lead is
initiative is a significant part of its green- used to attach the silicon core to the inside of
computing projects. Solar cells fit VIA's power- the package and to facilitate integration onto
efficient silicon, platform, and system the motherboard through tiny solder balls on
technologies and enable the company to develop the underside of the package. VIA's lead-free
fully solar-powered devices that are manufacturing technologies do not require a
nonpolluting, silent, and highly reliable. Solar lead bead, and the solder balls now consist of a
cells require very little maintenance throughout tin, silver, and copper composite.
their lifetime, and once initial installation costs
are covered, they provide energy at virtually no

32
Winning Papers CLOUD AND MOBILITY FOR INDIAN MASSES

However, not everyone is satisfied with this new Initiative that commits businesses to meet the
objective. Howard Johnson of the online EDN Environmental Protection Agency‘s Energy
magazine says that the move toward lead-free Star guidelines for energy-efficient devices.
devices is not only unhelpful but actually worse
for the environment. ―The additional tin mining Kevin Fisher, Intel‘s EU standards director,
required to produce high-purity tin alloys, plus says that while the company is dedicated to its
the mining of other precious metals required to green-computing plans, it is important to not
alloy with tin in substitution for lead, is a poor blame the IT industry alone for carbon
trade for the use of existing lead, much of which emissions worldwide. He argues that the
comes from recycled products,‖ Johnson writes. industry also helps in saving huge amounts of
He also believes that lead-free assembly is less power due to the Internet, enabling, for
reliable than lead-based assembly, partially due example, online shopping and billing.
to the increased growth of tin whiskers — small,
hair-like metallic growths that naturally emerge 4.5 Governments Go Green
from the surface of solid tin. On lead-free tin Many governments worldwide have initiated
surfaces, these whiskers can grow to a length energy-management programs, such as Energy
sufficient to short an electronic circuit to Star, an international standard for energy-
another, leading to product failure. efficient electronic equipment that was created
by the United States Environmental Protection
4.4 Energy-Efficient Computing Agency in 1992 and has now been adopted by
A central goal of VIA‘s green-computing several other countries. Energy Star reduces the
initiative is the development of energy-efficient amount of energy consumed by a product by
platforms for low-power, small-form-factor automatically switching it into ―sleep‖ mode
(SFF) computing devices. In 2005, the company when not in use or reducing the amount of
introduced the VIA C7-M and VIA C7 power used by a product when in ―standby‖
processors that have a maximum power mode. Surprisingly, standby ―leaking,‖ the
consumption of 20W at 2.0GHz and an average electricity consumed by appliances when they
power consumption of 1W. These energy- are switched off, can represent as much as 12
efficient processors produce over four times less percent of a typical household‘s electricity
carbon during their operation and can be consumption. In Australia, standby power is a
efficiently embedded in solar-powered devices. primary factor for the country‘s increased
greenhouse gas emissions — more than 5
VIA isn‘t the only company to address megatons (CO2 equivalent) annually.
environmental concerns: Intel, the world's
largest semiconductor maker, revealed eco- 5. WAYS OF GREEN COMPUTING
friendly products at a recent conference in
London. The company uses virtualization 5.1 Reduce Power Consumption
software, a technique that enables Intel to The use of electricity in computer is very
combine several physical systems into a virtual essential. The user should make use of the
machine that runs on a single, powerful base computers efficiently to save the power and
system, thus significantly reducing power cost. By managing computer resources
consumption. Earlier this year, Intel joined effectively, the users can save the power. Here
Google, Microsoft, and other companies in the the some of the techniques to power saving. By
launch of the Climate Savers Computing

33
BOS.CON 2012 Winning Papers

Green Computing
using Power Option in your Control Panel, you
can save the power 5.6 Video Card
A fast GPU may be the largest power consumer
5.2 Turn off Monitor in a computer. Energy-efficient display options
This mode allows you to turn off the monitor, if include:
the system is idle for more minutes. Use LED, ● No video card - use a shared terminal,
LCD monitors instead of CRTs it will reduce a shared thin client, or desktop sharing
lot of power. By turning off your monitor the software if display required.
user can save half the energy that is used by the ● Use motherboard video output - typically
system. So turn off the monitor when download low 3D performance and low power.
in progress or when it is in idle for some ● Select a GPU based on low idle power,
minutes. Turn of monitor, after it is idle for 10 average wattage, or performance per watt.
minutes.
5.7 Display
5.3 Turn off Hard Disks CRT monitors typically use more power than
This mode allows the user to turn off hard disks LCD monitors. They also contain significant
if it is idle. The user can automate this by setting amounts of lead. LCD monitors typically use a
the turn off time to 30 minutes or to some other cold-cathode fluorescent bulb to provide light
value depending upon the usage. for the display. Some newer displays use an
array of light-emitting diodes (LEDs) in place
5.4 System Standby / Sleep of the fluorescent bulb, which reduces the
This mode allows the user to save a lot of amount of electricity used by the display.[51]
power, automate this option to save power. It Fluorescent back-lights also contain mercury,
will turn off the monitor, hard drive, sound card, whereas LED back-lights do not.
graphics and video cards and almost everything.
The current state of your system will be saved in 5.8 Telecommuting
RAM. If the user want to use it again, can move Teleconferencing and telepresence technologies
the mouse or touch the keyboard to make are often implemented in green computing
everything turn on. Draw back in this option is initiatives. The advantages are many; increased
if there is a power outage then the unsaved worker satisfaction, reduction of greenhouse
things will be gone. Automate this by after it is gas emissions related to travel, and increased
idle for 15 minutes. profit margins as a result of lower overhead
costs for office space, heat, lighting, etc. The
5.5 Hibernate savings are significant; the average annual
This mode allows the user to shut everything energy consumption for U.S. office buildings is
down. But the difference from sleep/ standby over 23 kilowatt hours per square foot, with
mode is how it is storing information in the heat, air conditioning and lighting accounting
RAM, it will write all the information to the for 70% of all energy consumed. Other related
hard drive and shuts everything down. But initiatives, such as hoteling, reduce the square
memory doesn‘t use much power. So, it is footage per employee as workers reserve space
recommended for laptop users if it is running on only when they need it. Many types of jobs,
battery. It can automate this idle after 30 such as sales, consulting, and field service,
minutes. integrate well with this technique.

34
Winning Papers CLOUD AND MOBILITY FOR INDIAN MASSES

5.9 Reduce Toxic Waste ● Reduce the risk existing in the laptops such
Reducing e-waste is very much important. By as chemical known to cause cancer, nerve
practicing Green Computing, we had to know damage and immune reactions in humans.
how to properly dispose the computers and other
hardware devices. First check the manufacturer 7. CONCLUSION
information that they may take back your old So green computing is a mindset that asks how
product back. In now a day many concerns take we can satisfy the growing demand for network
the old gadgets from you to get them recycled. computing without putting such pressure on the
Depending on where you live you can take the environment. There is an alternative way to
old parts of your computers to nearby retailers, design a processor and a system such that we
electronics repair shop they can dispose your don't increase demands on the environment, but
products easily to recycler. still provide an increased amount of processing
capability to customers to satisfy their business
6. Green Computing Advantages needs. Green computing is not about going out
● Reduces energy usage from green and designing biodegradable packaging for
computing techniques translates into lower products. Now the time came to think about the
carbon dioxide emissions, stemming from a efficiently use of computers and the resources
reduction in the fossil fuel used in power which are non-renewable. It opens a new
pants and transportation. window for the new entrepreneur for harvesting
● Conserving resources means less energy is with E-Waste material and scrap computers.
requires to produce, use and dispose of
products. Authors: Monica and Priyadharshini
● Saving energy and resources saves money. Sacred Heart College, Tirupattur, Vellore Dt.
● Green computing even includes changing
government policy to encourage recycling
and lowering energy use by individuals and
businesses.

35
BOS.CON 2012 Winning Papers

Medical Applications of Wireless Networks


1.2 Who Benefits?
1. INTRODUCTION
One of the benefits of these applications is that
In the healthcare field, access and cost saving
they increase doctors' and nurses' efficiency.
are two of the hottest issues these days. Up to
Now they can care for more patients than
98,000 patients die each year as a result of
before. Their work is also improved and made
preventable medical errors. These are errors
easier by having access to accurate data on
that could have been avoided. Wireless
patients in real-time. They have increased access
technology offers tools that can help give
to specialized doctors. This ease in mobility
caregivers real-time access to accurate patient
allows them to do their own work while still
data, clinical histories, treatments, medications,
under the doctor's care. Safety is another issue
tests, lab results, insurance information and etc.
that is helped here because the rate of mistakes
In wireless applications, healthcare providers
can significantly be decreased. Also, patients
such as hospitals, insurance agencies and the
can be picky when making changes in their
government are becoming interested in
daily lives when signing up for a treatment.
investing in this area. Cost saving is one of the
With Wireless Technologies, healthcare can be
main factors because medical errors by doctors
less intrusive. Efficient and secure data handling
brings in law suits.
and resource management is another area where
1.1 Why Wireless Networks for Medical wireless networks can help.
Applications
2. CHALLENGES AND ISSUES
In the healthcare field, issues such long-term
Wireless networks based devices are battery
patient care, support for elderly people and
operated, one of the major challenges for
smart homes are being discussed in the realm of
developers is the issue of power limitations.to
wireless networks A patient who is located
prevent this developers design better scheduling
remotely can be cared for remotely by
algorithms and power management schemes to
communicating his/her status in real-time to
deal with these power issues. Also we know that
caregivers. Another issue that concerns the
wireless channels are greater access capacity
healthcare field is the very large number of
than the wired devices. To prevent this we can
expensive medical devices that is incompatible
have devices that can deal with traffic
with each other. Tedious routines are involved
congestion and other performance issues
in translating results from one machine to
wireless networks devices include security,
another with Wireless Technology this
privacy and the learning curve for new
compatibility issue can be reduced.
technologies.
Another issue in the wireless networks field is
implantable device which can be implanted on 3. WIRELESS NETWORKS
normal day to day wearables. Wireless sensor TECHNOLOGIES IN USE
implanted inside patient's body. This improves Due to accessibility and mobility requirements
access and quality of healthcare for patients and wireless is the preferred medium in medical
saves money for care providers. applications. Wireless technologies are being
developed to give new interfaces to these
machines and make them interact with any new

36
Winning Papers CLOUD AND MOBILITY FOR INDIAN MASSES

machines and procedures required in medical within the hospital. Data from one device can
field. be forwarded directly from one machine to
another without doctors wasting time by
3.1.1 WBAN (Wireless Body Area Network) transferring this information by hand. Bluetooth
is also a good technology for short range
Recent advances in sensors, lower powered
communication.
integrated circuits and wireless networks have
brought ideas in developing low powered 3.1.4 Sensor Networks
physiological sensor platforms that can be
integrated in Body Area Networks (BANS) to Sensor Networks technologies such as Zigbee
know in formations such as ECG, Blood are being combined with WBANs to form
pressure etc. When used inside hospitals BANs smaller scale networks that can be placed on
can be used to monitor patients in critical human clothing (or other objects) and provide
conditions. Outside the hospital, i.e. homecare, unobtrusive access to their health information.
patients' vital signs can be collected and Sensor Networks are also increasingly being
transmitted over the Internet to their doctors and used in natural sciences for example in
nurses in real-time. monitoring wild life or other natural
phenomenon. Due to lower power requirements
3.1.2 RFID (Radio Frequency Identification) they can be deployed for a long period of time.
Due to limited range, they are deployed in large
Radio Frequency Identification (RFID)
numbers and thus form a distributed network
technology is a hot topic these days both in
covering a large portion of space.
terms of its potential benefits and misuses
[RFID]. RFID tags are used in hospitals to keep 3.1.5 GPRS/UMTS
track of equipment. They can also be planted on
patients as well as doctors to know at time GPRS and UMTS wireless technologies have
where they are. RFID are extremely low also found their uses in the area of medical
powered radio devices that don't need any applications. An application called MobiHealth,
battery power and thus have potential uses in had been designed by using BANs with GPRS/
storage areas. Other potential uses are in UMTS for Internet connectivity.
monitoring hospital supply stocks. Hospitals can
manage their resources properly and know in 3.1.6 Wireless LAN (802.11)
real-time the status of their supplies.
Most hospitals, universities and corporate
3.1.3 WPAN (Wireless Personal Area offices these days provide wireless LAN
Network) access. Some benefits include untethered access
to the Internet. Hospitals can use the wireless
WPANS using 802.15.4 or Bluetooth have LAN channels to transfer patient data around
potential uses in the medical fields. These are the hospital. Communication between medical
short range networks that can be deployed for devices is also made possible using this
example, within a patients room. Nurses are able wireless channel.
to monitor patients in real-time without having
to visit them frequently. This saves them time 4. STANDARDS
and give them the opportunity to take care of
Although the area of wireless networks for
more patients. Other uses of WPANs are in
medical applications has its own standards,
interfacing multiple expensive and large devices

37
BOS.CON 2012 Winning Papers

there do exist some standards and we have the project include,


listed a few below.
● Wireless Vital Sign Sensors
IEEE Standards Medical Device
Communications / Health Informatics ● Wireless two-lead EKG
Standards Subscription
● Accelerometer, gyroscope and
● ISO/IEEE Health informatics - Point-of- electromyogram (EMG) sensor for
care medical device communication monitoring patients with strokes

● IEEE Standard for Medical Device ● CodeBlue Software Platform


Communications-Transport Profile
5.2 MobiHealth
● Mobile Health Care Alliance, Setting
MobiHealth is a project based on a European
standards for mobile health information
initiative to create a generic platform for home
systems and Medical Implant
healthcare using BAN-based sensors and
Communications Service in the 402-405
wireless telephony technology. They are using
MHz band
GPRS/UMTS wireless Communication
● High-speed, ultra-low power, non-voice technology for transferring data. Some of the
transmissions to and from implanted capabilities include measurement and
medical devices such as cardiac pacemakers transmission of vital signs and other bio signals.
and defibrillators. In this project they developed a Body Area
Network (BAN) and a service platform for
5. RESEARCH APPLICATIONS patients and healthcare professionals.

In this section we will talk about some special Some benefits of the devices created in this
applications that have been developed or are project include:
currently being developed in the research
community for the purpose of healthcare ● Light-weight sensor system worn on the
improvements. Some these medical body, Increases mobility and out of hospital
applications have impacts in daily social life, care and monitoring and Low interruption to
while others have pure medical benefits. daily life

5.1 CodeBlue Some of the challenges faced include:

CodeBlue is a sensor networks based medical ● Low bandwidth with GPRS/UMTS, Power
research project being developed at Harvard. requirements and Security and reliability
Specific goals for this project include pre-
5.3 Wireless Physiological Sensors for
hospital care and in-hospital emergency care,
Ambulatory and Implantable Applications
stroke patient rehabilitation and disaster
response. Research from this project has They are developing wireless sensor technology
potentials for resuscitative care, real-time triage for ambulatory and implantable human psycho-
decisions and long term patient observations. physiological applications. Some of the devices
This project has hardware as well as software developed here are for monitoring the
parts. Some devices and software produced in functioning of the heart, monitoring prosthetic

38
Winning Papers CLOUD AND MOBILITY FOR INDIAN MASSES

joints for a very long period of time and ● ecgAnywhere


monitoring other vital signs. They focus on
wearable and in particular implantable or ● LifeSource Products
subcutaneous biosensor which will provide
● HealthTrax
significant advantages over more conventional
methods. Besides these devices and 6.1 LifeSync Wireless ECG System
mechanisms, their work also can allow doctors
and care givers to have to remote access to LifeSync Wireless ECG System is a basic ECG
useful information about the patient that is device that operates using Bluetooth and
collected through these devices. GPRS.. The main goal is to provide more
mobile interface to existing ECG monitors in
The main aim is having Wireless Hospital. The device can be placed anywhere
communication, Bio-sensors and Bio-material with the results shown in conventional
technologies. monitors. One of the advantages is that it
includes continuous monitoring in a mobile
5.4 Current Application
environment and also that they are designed to
They are trying to create a distributed wireless interface with existing medical devices.
communication infrastructure that allows for
6.2 Airborne (TM) Embedded Wireless
individual customization of portable devices
Device Server Modules and Radios
such as a PDA. Initially the project relied on
GPRS for communication between the PDA Airborne (TM) modules are an answer to
devices and the central server. The main aim is integrating old machinery with latest wireless
to enable people with disabilities to customize technology with interface modules which allow
their wireless devices i.e. PDA to keep hospitals and clinics to make them useful to
schedules for them give them important reduce wiring and incompatibility issues
reminders and allow them to communicate with because machines will start communicating
their caregivers through any of the sever over the air. Currently the wireless technology
possible ways provided used with these modules is the basic 802.11b
WLAN.
6. INDUSTRY APPLICATIONS
Some benefits of the Airborne (TM) modules
Wireless technology for medical applications is
are:
still relatively new but there are companies who
see the potential demand in the future. In this ● Remote monitoring and Ease in sharing data
section we will talk about some wireless between doctors and hospitals
networks based medical solutions/applications
that are available commercially. ● Can be remotely controlled or control other
devices , Data is available in a continuous
These include the following: and real-time fashion and Can be combined
with other protocols to create new medical
● LifeSync Wireless ECG System
applications
● Airborne(TM) Embedded Wireless Device
6.3 ecgAnywhere
Server Modules and Radios
ecgAnywhere is a electrocardiograph recorder,

39
BOS.CON 2012 Winning Papers

that records and transmits ECG data to a central sample devices offered
data warehouse. This device can be used by
healthcare professionals to monitor patients 6.5 HealthTrax
outside of the hospital. The device collects
HealthTrax is a tracking system with potential
useful data and sends it over the Internet via a
uses in hospitals. It uses RFID tags attached to
PC, PDA or other wireless devices. Some
medical devices, patients etc. Some benefits of
potential uses include
using the HealthTrax system include:
● Diagnostic and long term evaluation and
● Patients who are on strict medicine schedule
Drug evaluation
can be tracked and given medicine in time.
● Mass screening and Homecare remote
● Doctors or nurses can be located around the
monitoring
hospital more efficiently.
6.4 LifeSource Products
● Medical devices can be profiled in the
LifeSource company designs products such as system and replaced or fixed when needed.
monitoring devices for telemedicine. They
7. FUTURE TRENDS
design both wired and wireless (Bluetooth)
interfaced products. Some Applications include In some cases these new applications are design
purely social health benefits i.e. reducing
• Remote Blood Pressure monitoring, Remote
interference to daily life when dealing with long
weight monitoring, Digitally IDs each weight
term patient care. Some of these applications
reading with date-time stamp and Transmits
include: Patient Homecare, Context-Sensitive
weight reading to a central server using access
Medicine and iRevive.
points i.e. PC or PDA or other device Some

Authors: Saranya
Gonzaga Arts and Science College for Women, Elathagiri

40
Technical Reports CLOUD AND MOBILITY FOR INDIAN MASSES

Cloud Computing: Architecture and Implementation


Kulandai Raj1, Arul Rozario2 and Antony Arul3
IT Group: Multimedia; Don Bosco College, Yelagiri Hills
{kulandairaj.2@gmail.com; arul.4rozario@gmail.com; antonyarul@gmail.com}

Abstract
Cloud computing promises to increase the velocity with which applications are deployed, increase innovation and
lower costs, all while increasing business agility. Sun takes an inclusive view of cloud computing that allows it to
support every facet, including the server, storage, network, and virtualization technology that drives cloud computing
environments to the software that runs in virtual appliances that can be used to assemble applications in minimal
time. This white paper discusses how cloud computing transforms the way we design, build, and deliver applications,
and the architectural considerations that enterprises must make when adopting and using cloud computing
technology.
Keywords: Cloud Building Blocks, Virtualized Infrastructure, Virtualized Applications, Enterprise Management,
Security and Identity Management, Cloud Development Tools, Private Clouds, Public Clouds, Hybrid Clouds

rooted in hardware and software architectures


Everyone has an opinion on what is cloud
that enable innovative infrastructure scaling and
computing. It can be the ability to rent a server
virtualization. Many data centers deploy these
or a thousand servers and run a geophysical
capabilities today. However, the next
modeling application on the most powerful
infrastructure innovations are around more
systems available anywhere. It can be the ability
dynamic provisioning and management in
to rent a virtual server, load software on it, turn
larger clusters both within and external to the
it on and off at will, or clone it ten times to meet
conventional corporate data center.
a sudden workload demand. It can be storing
and securing immense amounts of data that is There are also implications for next generation
accessible only by authorized applications and application design to make optimum use of
users. It can be supported by a cloud provider massively parallel processing and fault
that sets up a platform that includes the OS, tolerance. The diagram below illustrates some
Apache, a MySQL™ database, Perl, Python, common architectural components:
and PHP with the ability to scale automatically
in response to changing workloads. Cloud
computing can be the ability to use applications Fig.1. Cloud Blocks
on the Internet that store and protect data while
providing a service — anything including email,
sales force automation and tax preparation. It
can be using a storage cloud to hold application,
business, and personal data. And it can be the
ability to use a handful of Web services to
integrate photos, maps, and GPS information to
create a mashup in customer Web browsers.

CLOUD BUILDING BLOCKS

The building blocks of cloud computing are

41
BOS.CON 2012 Technical Reports

Clouds must leverage a unified identity and


VIRTUALIZED INFRASTRUCTURE
security infrastructure to enable flexible
Virtualized Infrastructure provides the provisioning, yet enforce security policies
abstraction necessary to ensure that an throughout the cloud. As clouds provision
application or business service is not directly resources outside the enterprise‘s legal
tied to the underlying hardware infrastructure boundaries, it becomes essential to implement
such as servers, storage, or networks. This an Information Asset Management system to
allows business services to move dynamically provide the necessary controls to ensure
across virtualized infrastructure resources in a sensitive information is protected and meets
very efficient manner, based upon predefined compliance requirements.
policies that ensure specific service level
objectives are met for these business services. DEVELOPMENT TOOLS

Next generation development tools can leverage


VIRTUALIZED APPLICATIONS
cloud‘s distributed computing capabilities.
Virtualized applications decouple the These tools not only facilitate service
application from the underlying hardware, orchestration that can leverage dynamic
operating system, storage, and network to provisioning, but also enable business processes
enable flexibility in deployment. Virtualized to be developed that can harness the parallel
Application servers that can take advantage of processing capabilities available to clouds. The
grid execution coupled with Service Oriented development tools must support dynamic
Architectures and enable the greatest degree of provisioning and not rely on hard coded
scalability to meet the business requirements. dependencies such as servers and network
resources.
ENTERPRISE MANAGEMENT
IMPLEMENTATION
Enterprise management provides top-down, end
-to-end management of the virtualized All of the architectural and organizational
infrastructure and applications for business considerations mentioned thus far generally
solutions. The enterprise management layer apply to all implementations of a cloud
handles the full lifecycle of virtualized infrastructure. As we focus on building the
resources and provides additional common cloud, a number of models have been developed
infrastructure elements for service level for deploying a cloud infrastructure.
management, metered usage, policy
management, license management, and disaster Private Clouds
recovery. Mature cloud service management In a private cloud, the infrastructure for
software allows dynamic provisioning and
implementing the cloud is controlled completely
resource allocation to allow applications to by the enterprise. Typically, private clouds are
scale on demand and minimize the waste implemented in the enterprise‘s data center and
associated with underutilized and static managed by internal resources. A private cloud
computing resources. maintains all corporate data in resources under
the control of the legal and contractual umbrella
SECURITY AND IDENTITY
of the organization. This eliminates the
MANAGEMENT
regulatory, legal and security concerns

42
Technical Reports CLOUD AND MOBILITY FOR INDIAN MASSES

associated with information being processed on between the private and public service
third party computing resources. management system. This typically involves a
federated policy management tool, seamless
Public Clouds hybrid integration, federated security,
information asset management, coordinated
In a public cloud, external organizations provide
provisioning control, and unified monitoring
the infrastructure and management required to
systems.
implement the cloud. Public clouds dramatically
simplify implementation and are typically billed CONCLUSION
based on usage. This transfers the cost from a
capital expenditure to an operational expense Cloud computing offers real alternatives to IT
and can quickly be scaled to meet the departments for improved flexibility and
organization‘s needs. Temporary applications or lower cost. Markets are developing for the
applications with burst resource requirements delivery of software applications, platforms,
typically benefit from the public cloud‘s ability and infrastructure as a service to IT
to ratchet up resources when needed and then departments over the ―Cloud‖. These services
scale them back when they are no longer are readily accessible on a pay-per-use basis
needed. In a private cloud, the company would and offer great alternatives to businesses that
need to provision for the worst case across all need the flexibility to rent infrastructure on a
the applications that share the infrastructure. temporary basis or to reduce capital costs.
This can result in wasted resources when Architects in larger enterprises find that it
utilization is not at its peak. Public clouds have may still be more cost effective to provide the
the disadvantage of hosting your data in an desired services in-house in the form of
offsite organization outside the legal and ―Private Clouds‖ to minimize cost and
regulatory umbrella of your organization. In maximize compatibility with internal
addition, as most public clouds leverage a standards and regulations. If so, there are
worldwide network of data centers, it is difficult several options for future-state systems and
to document the physical location of data at any technical architectures that architects should
particular moment. These issues result in consider to find the right trade-off between
potential regulatory compliance issues which cost and flexibility. Using an architectural
preclude the use of public clouds for certain framework will help architects evaluate these
organizations or business applications. trade-offs within the context of the business
architecture and design a system that
Hybrid Clouds accomplishes the business goal. In any case,
Oracle‘s complete, open, and integrated
To meet the benefits of both approaches, newer
product set offers a compelling value
execution models have been developed to
proposition at each level of the design and our
combine public and private clouds into a unified
certified Oracle Enterprise Architects can
solution. Applications with significant legal,
help customers discover a cloud roadmap that
regulatory or service level concerns for
works for them.
information can be directed to a private cloud.
Other applications with less stringent regulatory REFERENCES
or service level requirements can leverage a
http://www.reservoir-fp7.eu
public cloud infrastructure .Implementation of a
http://sla-at-soi.eu/
hybrid model requires additional coordination http://www.kitchensoap.com/2009/04/03/

43
BOS.CON 2012 Technical Reports

Brief Survey on Popular Mobile Applications


Francis Xavier S1, Pushpa Raj2, Jerome Reginald3
IT Group: Flock; Don Bosco College, Yelagiri Hills
{ xavijoram@gmail.com; arockiab1006@gmail.com; jeromrejinold@gmail.com}

Abstract
The growth of mobile phone market has generated a huge demand for various mobile applications. Numerous mobile
phone applications are available that simplify various tasks for the users. This report is a survey of popular mobile
apps being used by Indian people.

Keywords: PDF Readers, Task Killers, Noting Software, Image-based Search, Mobile Games, FM Music, Mobile
Antivirus

search feature that lets you directly reach the


In the past couple of years we have witnessed
portion of the document that you want. The
tremendous growth in mobile users all over the
reader can handle encrypted documents, but
world as the entry of smartphones in the market
can‘t fill up forms. The app is pretty
at affordable prices has triggered their usage.
lightweight, although opening large files is not
We have experienced a major shift in the way
we access the internet today with mobiles advisable. Platforms: Windows Mobile,
Symbian, Blackberry, Palm and Android
becoming the primary access point for Internet
usage. In today‘s fast paced world, phones are ADVANCED TASK KILLER
not just used for calling, playing games etc. but
with smartphones, we can schedule our The Android platform can multitask very well,
complete day, check emails, make conference but can get trapped with too many processes
calls, connect using social network and perform running in the background. Advanced Task
a host of other activities. Killer is an application that lists these processes
and allows the user to close multiple
The growth of mobile phone market has background processes at once. By default, all
generated a huge demand for various mobile the processes are checked, so ending all the
applications. Numerous mobile phone running processes on an Android device is two
applications are available that simplify various taps away because of the large and satisfying
tasks for the users due to which we see an ―KILL selected apps‖ button. The app also has
accelerated growth of software/application an ‗ignore list‘ to hide necessary processes.
development for mobile devices. Mobile Platforms: Android
application development is the course of action
by which application software is designed and EVERNOTE
developed for hand-held devices like mobile
phones, personal digital assistants, and so on. Evernote is essentially a universal notepad, with
There are some popular mobile apps being used two appealing strong points. The notes can be in
in India. The following are some of the almost any format—audio, video or image. As
highlights on such apps. long as your device supports it, Evernote does
as well. Notes can be tagged and made
ADOBE READER LE favorites. The other strong point is that all the
notes taken in Evernote (up to 40MB for free
Adobe Reader LE allows users to read PDF users) can be stored on their online service. This
documents on the go. The application supports means that you can access your files from any
zooming and panning, as well as a feature that platform, anywhere. Platforms: Windows
makes the fonts more legible in relation to how Mobile, Java, BlackBerry, iPhone, Palm,
zoomed-in the document is. There is a handy
44
Technical Reports CLOUD AND MOBILITY FOR INDIAN MASSES

Android subscription. Last.fm is one of the most highly


rated webware apps for the iPhone. Platforms:
GOOGLE GOGGLES iPhone, Windows Mobile

Developed specifically for the Android NETQIN MOBILE ANTIVIRUS


platform, the Google Goggles application feels
like it is back from the future. The application NetQin Mobile Antivirus is the most widely
allows users to search using an image as the used mobile antivirus application. The software
input. Books, landmarks, logos and visiting is available for the two mobile platforms most
cards are just some of the supported objects that susceptible to malware, spyware or virus
can be photographed. The Google Goggles app attacks. The application has a real-time
is constantly updated with new features and scanning module and performs regular updates.
fixes, with more functionality being packed in You can scan the contents of your phone at the
every now and then. Platforms: Android click of a button, and First Aid rescues the
phone in case of an emergency. There is also a
JELLYCAR feature thrown in that lets you speed up your
boot process, which works well on Windows
JellyCar is one of the highest rated iPhone
Mobile phones. There are a bunch of other
games around, despite being free. JellyCar gives
optimization tools in system management.
you a car made of jelly, and a side-scrolling-plat
Platforms: Symbian, Windows Mobile
forming puzzle environment as a single level.
Each level is refreshingly unique. The car is not CONCLUSION
rigid, and can change size, stretch, or crunch up
a bit according to the situation. All these To conclude, we view the Indian mobile
abilities are used to navigate through a series of application market as a big opportunity rather
obstacles that are made up of simple jelly than a challenge. There are still the hurdles of
shapes. You will have to come up with some ease of use, awareness, slow speed of
interesting uses of the accelerometer to play this connections, and pricing that needs to
game successfully. A very addictive game, but overcome for mass adoption of mobile data
the iTunes page has a complaint by a concerned services. Most importantly, locally relevant
parent about the leaderboards screen being full content in local languages will be the key to
of offensive names. Platforms: iPhone grow the mobile data services market in India.

LAST.FM

Last.fm killed off third-party mobile MOBILEWARE ONLINE


applications such as Mobbler that could stream Android Apps: www.androidtapp.com
music from Last.fm, and replaced them with its Evernote: www.evernote.com
own version. Unfortunately, the app is not Goggles: www.google.com/mobile/goggles
available on all platforms. The application is iTunes: itunes.apple.com
Last FM: www.last.fm
pretty well thought out, and offers all the regular NetQin: www.netqin.com
features of Last.fm available on the site. This
ranges from loving tracks to scrobbling, to
streaming radio stations directly to the phone.
The actual services available vary from region
to region, according to the platform, and depend
on whether or not the user has a Last.fm

45
BOS.CON 2012 Technical Reports

Cloud Computing: Types and Deployments


Thomson I.1 and Vivek E.2
IT Group: Sea Monkey; Don Bosco College, Yelagiri Hills
{thomsonb1043@yahoo.com}

Abstract
This report will help readers to know the basics of cloud computing and also to gain an understanding on how cloud
computing works. It will be beneficial to all people who want to save money on infrastructures. Cloud-based on-
demand web-services, such as databases, queues, identity management, data on-demand, widgets, etc. are meeting
with browser-based thick-client frameworks such as AJAX, Adobe Flex, MS Silverlight, etc. to create a new breed of
applications, built on a resuscitated Client/Server (Client/Server 2.0) SOA-based paradigm. The traditional "business
logic"application server middle-tier is ceding the way to cloud-based pay-per-use SOA.

Keywords: Infrastructure as a service (IaaS), Platform as a service (PaaS), Software as a service (SaaS), Storage as a
service (STaaS), Security as a service (SECaaS), Data as a service (DaaS), Database as a service (DBaaS), Test
environment as a service (TEaaS), Desktop virtualization, API as a service (APIaaS), Backend as a service (BaaS)

Cloud computing is the use of computing WHAT IS CLOUD COMPUTING?


resources (hardware and software) that are Various definitions and interpretations of
delivered as a service over a network (typically, ―clouds‖ and/or ―cloud computing‖ exist. With
the Internet). The name comes from the use of a particular respect to the various usage scopes
cloud-shaped symbol as an abstraction for the the term is employed to, we will try to give a
complex infrastructure it contains in system representative (as opposed to complete) set of
diagrams. Cloud computing entrusts remote definitions as recommendation towards future
services with a user's data, software and usage in the cloud computing related research
computation. In this report all the types of the space. This report does not claim completeness
cloud computing is clearly explained. with this respect, as it does not introduce a new

Figure 1: Concept Map on Cloud Computing

46
Technical Reports CLOUD AND MOBILITY FOR INDIAN MASSES

terminology, but tries to capture an abstract term and run their software solutions on a cloud
in a way that best represents the technological platform without the cost and complexity of
aspects and issues related to it. buying and managing the underlying hardware
and software layers. With some PaaS offers, the
underlying computer and storage resources
scale automatically to match application
demand such that cloud user does not have to
allocate resources manually.
2.3. Software As A Service (SaaS)
In this model, cloud providers install and
operate application software in the cloud and
cloud users access the software from cloud
clients. The cloud users do not manage the
cloud infrastructure and platform on which the
application is running.
Figure 2: Types of Cloud Computing 4. DEPLOYMENT TYPES
Source: Wikipedia
4.1. Private Clouds

2. TYPES OF CLOUD COMPUTING Private Clouds are typically owned by the


respective enterprise and/or leased.
Functionalities are not directly exposed to the
2.1. Infrastructure As A Service (IaaS) customer, though in some cases services with
This most basic cloud service model providers cloud enhanced features may be offered - this is
offer computers, as physical or more often as similar to (Cloud) Software as a Service from
virtual machines and other resources. The the customer point of view.
virtual machines are run as guests by a Private Clouds example: eBay
hypervisor, such as Xen or KVM. Management
of pools of hypervisors by the cloud operational
support system leads to the ability to scale to 4.2. Public Clouds
support a large number of virtual machines. Enterprises may use cloud functionality from
Other resources in IaaS clouds include images in others, respectively offer their own services to
a virtual machine image library, raw (block) and users outside of the company. Providing the
file-based storage, firewalls, load balancers, IP user with the actual capability to exploit the
addresses, virtual local area networks (VLANs) cloud features for his/her own purposes also
and software bundles. allows other enterprises to outsource their
2.2. Platform As A Service (PaaS) services to such cloud providers, thus reducing
costs and effort to build up their own
In the PaaS model, cloud providers deliver a infrastructure. As noted in the context of cloud
computing platform typically including types, the scope of functionalities thereby may
operating system, programming language differ.
execution environment, database, and
webserver. Application developers can develop Public Cloud examples: Amazon, Google

47
BOS.CON 2012 Technical Reports

Apps, Windows Azure. cases, which should not be confused with


―proprietariness‖ of the platform: specialization
4.3. Hybrid Clouds
implies providing additional, use case specific
Though public clouds allow enterprises to methods, whilst proprietary data implies that
outsource parts of their infrastructure to cloud structure of data and interface are specific to the
providers, they at the same time would lose provider.
control over the resources and the distribution
management of code and data. In some cases, 5. CONCLUSION
this is not desired by the respective enterprise. When your business grows, your IT needs grow
too. The scalability and speed of deployment
4.4. Community Clouds
offered by cloud computing means, you can
Typically cloud systems are restricted to the expand your IT provision instantly to meet
local infrastructure, i.e. providers of public increased requirements and you can also scale it
clouds offer their own infrastructure to down again whenever you want. Security is
customers. Though the provider could actually typically greatly enhanced, along with
resell the infrastructure of another provider, resilience and the flexibility and responsiveness
clouds do not aggregate infrastructures to build of cloud-based IT services mean that you can
up larger, cross-boundary structures. In react quickly to a changing business
particular smaller SMEs could profit from environment. Waste (of both time and
community clouds to which different entities resources) is reduced, allowing you to
contribute with their respective (smaller) effectively do more with less. This provides
infrastructure. Community clouds can either you a leaner, more efficient IT model, available
aggregate public clouds or dedicated resource on demand.
infrastructures.
REFERENCES
4.5. Special Purpose Clouds
● http://theinstitute.ieee.org/technology-focus/
IaaS clouds originating from data centers have a technology-topic/a-view-inside-the-cloud.
‗general purpose‘ appeal to them, as their ● http://it.tmcnet.com/channels/cloud-storage/
according capabilities can be equally used for a articles/211183-rising-cloud-storage-market-
wide scope of use cases and customer types. As opportunity-strengthens-vendors.htm
opposed to this, PaaS clouds tend to provide ● http://www.thectoforum.com/content/converged-
functionalities more specialized to specific use infrastructure-0

48
Technical Reports CLOUD AND MOBILITY FOR INDIAN MASSES

Cloud Engineering: Its Advantages and Disadvantages


Venisha1, Gnana Amala Rani2 and Mary Suni3
IT Group: Mozilla Firefox, Don Bosco College, Yelagiri Hills
{anbudanvenisha@gmail.com, amalarani53@gmail.com, sunimeji@gmail.com}

Abstract
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a
network (typically the Internet). The name comes from the use of a cloud-shaped symbol as an abstraction for the
complex infrastructure it contains in system diagrams. Cloud computing entrusts remote services with a user's data,
software and computation. End users access cloud-based applications through a web browser or a light-weight
desktop or mobile app while the business software and user's data are stored on servers at a remote location.
Proponents claim that cloud computing allows enterprises to get their applications up and running faster, with
improved manageability and less maintenance, and enables IT to more rapidly adjust resources to meet fluctuating
and unpredictable business demand Cloud computing relies on sharing of resources to achieve coherence and
economies of scale similar to a utility (like the electricity grid) over a network. At the foundation of cloud computing is
the broader concept of converged infrastructure and shared services. Cloud computing is the use of computing
resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name
comes from the use of a cloud-shaped symbol as an abstraction for the complex.

Keywords: Cloud computing, Cloud Engineering, Services of cloud, Architecture of Cloud Computing

Cloud computing is a comprehensive solution to be in the same location as your data storage
that delivers IT as a service. It is an Internet- device, the cloud takes away that step. The
based computing solution where shared cloud removes the need for you to be in the
resources are provided like electricity same physical location as the hardware that
distributed on the electrical grid. Computers in stores your data. Your cloud provider can both
the cloud are configured to work together and own and house the hardware and software
the various applications use the collective necessary to run your home or business
computing power as if they are running on a applications.
single system. The flexibility of cloud
computing is a function of the allocation of
resources on demand. This facilitates the use of This is especially helpful for businesses that
the system's cumulative resources, negating the cannot afford the same amount of hardware and
need to assign specific hardware to a task. storage space as a bigger company. Small
Before cloud computing, websites and server- companies can store their information in the
based applications were executed on a specific cloud, removing the cost of purchasing and
system. With the advent of cloud computing, storing memory devices.
resources are used as an aggregated virtual
computer. This amalgamated configuration
One requirement is that you need to have an
provides an environment where applications
internet connection in order to access the cloud.
execute independently without regard for any
This means that if you want to look at a specific
particular configuration.
document you have housed in the cloud, you
must first establish an internet connection either
HOW CAN YOU USE THE CLOUD? through a wireless or wired internet or a mobile
broadband connection. The benefit is that you
The cloud makes it possible for you to access can access that same document from wherever
your information from anywhere at any time. you are with any device that can access the
While a traditional computer setup requires you

49
BOS.CON 2012 Technical Reports

internet. These devices could be a desktop, cloud components communicating with each
laptop, tablet, or phone. This can also help your other over a loose coupling mechanism such as
business to function more smoothly because a messaging queue. Elastic provision implies
anyone who can connect to the internet and your intelligence in the use of tight or loose coupling
cloud can work on documents, access software, as applied to mechanisms such as these and
and store data. Imagine picking up your smart others. The Intercloud is an interconnected
phone and downloading a .pdf document to global "cloud of clouds" and an extension of the
review instead of having to stop by the office to Internet "network of networks" on which it is
print it or upload it to your laptop. This is the based.
freedom that the cloud can provide for you or
Advantages
your organization.
● Easy Access to Information
ARCHITECTURE ● Quick Deployment
● Almost Unlimited Storage
● Backup and Recovery

Disadvantages
● Technical Issues
● Prone to Attack
● Security & Privacy
● Dependency (loss of control)
● Cost
Figure 1: Cloud Computing Sample Architecture ● Decreased flexibility

Cloud architecture, the systems architecture of CONCLUSION


the software systems involved in the delivery of
To summarize, the cloud provides many
cloud computing, typically involves multiple
options for the everyday computer user as well
as large and small
businesses. It opens up the
world of computing to a
broader range of uses and
increases the ease of use
by giving access through
any internet connection.
However, with this
increased ease also come
drawbacks. You have less
control over who has
access to your information
and little to no knowledge
of where it is stored. You
also must be aware of the
Figure 2: Universal Cloud Stack

50
Technical Reports CLOUD AND MOBILITY FOR INDIAN MASSES

security risks of having data stored on the cloud.


The cloud is a big target for malicious
individuals and may have disadvantages because
it can be accessed through an unsecured internet
connection.
REFERENCES
http://www.sei.cmu.edu/newsitems/cloudcomputing.cfm
(2009).
http://www.sei.cmu.edu/library/abstracts/whitepapers/
cloudcomputingbasics.cfm (2010).
http://www.sei.cmu.edu/library/abstracts/
reports/10tn009.cfm
http://answers.orielly.com
http://en.wikipedia.org/wiki/Cloud_Computing
http://mobiledevices.about.com/od/additional resources/a/
cloud computing

51
BOS.CON 2012 Technical Reports

Future Waves of Computing Models for India


Ranjitha Mary G.1 and Saini Sophia2
IT Group: Google Chrome, Don Bosco College, Yelagiri Hills
{ranjithainbiit@gmail.com; shinikaroline67@gmail.com}

Abstract
Computational model is a computer program, or network of computers that attempts to simulate an abstract model of
a particular system. And it would be useful for the Indian people mostly in the areas of mathematical modeling of
many natural systems in physics (computational physics), astrophysics, chemistry, and biology, human systems in
economics, psychology, social science, and engineering.

Keywords: Computing Models, Client-Server Computing, Network Technology, Database Access, Transaction
Processing, Office Systems, Components of Network

A Computing model is a computer program or problems.


network of computers. It simulates an abstract
5. Jungle Computing: Jungle computing
model of a particular system. It used to capture
refers to the use of diverse, distributed and
the behaviors of the system being used. Most
highly non-uniform high performance
prevalent computing models are, Cloud
computer systems to achieve peak
Computing, Distributed computing, Cluster
performance.
computing, DNA Computing, Jungle
Computing, Volunteer Computing, Grid 6. Volunteer Computing: Volunteer
Computing, Green Computing and Parallel computing is a type of distributed
Computing. computing in which computer owners
donate their computing resources (such as
1. Cloud Computing: Cloud Computing is the
processing power and storage) to one or
computing where the resources are stored
more "projects".
over the cloud to be accessed by all.
7. Grid Computing: Grids are a form of
2. Distributed Computing: Distributed
distributed computing whereby a ―super
computing refers to the use of distributed
virtual computer‖ is composed of many
systems to solve computational problems or
networked loosely coupled computers
to achieve a common goal. In distributed
acting together to perform large tasks.
computing, a problem is divided into many
tasks, each of which is solved by one or 8. Green Computing: Green computing
more computers. refers to environmentally sustainable
computing. The goals of green computing
3. Cluster Computing: A computer cluster
are to reduce the use of hazardous materials,
consists of a set of loosely connected
maximize energy efficiency during the
computers that work together so that in
product's lifetime, and promote the
many respects they can be viewed as a
recyclability or biodegradability of defunct
single system. Clusters are usually deployed
products and factory waste.
to improve performance and availability
over that of a single computer. 9. Parallel Computing: Parallel computing is
a form of computation in which many
4. DNA Computing: DNA computing
calculations are carried out simultaneously
addresses the design of complex genetic
to be divided into smaller ones, which are
circuits by using cellular logical circuits. It
then solved in parallel. Let us see
models to solve complex computational

52
Technical Reports CLOUD AND MOBILITY FOR INDIAN MASSES

elaborately about one of the computing Server's Functionalities


models. 1. Listen for a client's query.
What is Client/Server Computing? 2. Process that query.
C/s computing is a computing where the server 3. Return the results back to the client.
software accepts the request from the client soft-

Client and Server Interaction Process


Network ● User runs client software to create a query
● Client connects to the server
● Client sends the query to the server
● Server analyzes the query
ware and returns the request to the client. ● Server computes the results of the query
Why Client /Server Computing? ● Server sends the results to the client
We go for client/server computing, because it ● Client presents the results to the user
has strong central security and it provides ● Repeat when necessary
security according to the user‘s requirement.

Components of Client/Server Computing


Model
● Client
● Server
● Communication Networks

NETWORK TECHNOLOGY
Technology used in client/server computing is
network technology. A brief elucidation as
below:
CLIENT'S RESPONSIBILITIES
● Network Classifications: LAN, WAN,
1. Handle the user interface.
MAN and so on.
2. Translate the user's request into the desired
● Network Topologies: Ring, Star, Bus and so
protocol.
on.
3. Send the request to the server.
● Network Devices: Hub, Switch, Bridge,
4. Wait for the server's response. Router, Gateway and so on.
5. Translate the response into "human-
readable" results.
6. Present the results to the user.

53
BOS.CON 2012 Technical Reports

critical system must run continuously. If it is


unavailable even for a brief moment, the
organizations will experience server
repercussions. The transactions are generated at
the client and sent to the server for processing.
The server may in turn, send one or more
operations to the other servers. For a transaction
to be considered complete all operations must
be successfully performed. If any operation of
transaction cannot be completed, that
operations that have taken effect must be
reversed using a process called commit and
APPLICATIONS
rollback.
Some of the applications of client/server
computing‘s, Data base access, Transaction
processing (TP) and Office Systems. OFFICE SYSTEMS
Many organizations are employing client-server
computing to improve winter personal
DATABASE ACCESS
communications both internally and externally.
This is the most important kind of application in Many organizations are using their linked
client and server computing. Applications in LAN‘s as a network for enterprise-wide mail
GUI s are written to access corporate data. This systems and work group applications. In this
query oriented applications provide a single way personal in organization can improve
window to the data of the organization. In some coordination and actively participate in strategy
cases these applications are read-only, in others formulation and decision -making of the
they are read-write. Benefits of these systems company.
are also ease of use and increased worker
productivity. Productivity with these systems is
measured by how easily workers can access the MERITS
data they need to do the job. As we can see, we ● Distribution or sharing of processing load
have networked web of workstations for among several independent computers.
workers to access at any node, their productivity
● Centralized data storage on server, hence
will increase tremendously. This kind of
easy to implement security of data access
database system also provides transparent and
consistent access to data whether it is located. ● Clients with the appropriate permissions
may be permitted to access and change data
● Centralized data; hence, easy to administer.
TRANSACTION PROCESSING (TP)
OLTP (Online-Transaction processing
application), also known as mission critical DEMERITS
applications; include order entry, inventory and Traffic congestion on the network (number of
point-of-sale systems. This kind of mission clients request to a server) can cause a server to

54
Technical Reports CLOUD AND MOBILITY FOR INDIAN MASSES

become overloaded and unable to service the use of many natural systems in physics,
client‘s requests. Under client-server, should a astrophysics, chemistry, and biology, human
critical server fail, clients‘ requests cannot be systems in economics, psychology, social
fulfilled. science, and engineering.
CONCLUSION
Computational model is a computer program, or
network of computers which can be applied for

Why are we buying more boxes? Why do


we need more software for cloud
computing? ...The cloud is not a box. It
just isn't. There are no apps
marketplaces if your cloud is a box.
[After the launch of Oracle’s Private Cloud in a Box ]

55
BOS.CON 2012 Technical Reports

Mobile Computing: Devices, Connectivity Constraints and Limitations


Karthick Raj1 and Santosh Kora2
IT Group: Midori, Don Bosco College, Yelagiri Hills
{karthijose@gmail.com; santhoshkora512@gmail.com}

Abstract
Mobile computing is human-computer interaction by which a computer is expected to be transported during normal
usage. Two main trends of development in the mobile computing area can be characterized by the development to
enhance communications by mobile network computers and how manufacturers add more and more functionality to
small mobile computers. Mobile network computers have a continuous connection with a main system to use the
server's capabilities to become less expensive and with fewer parts, moving parts more reliable. Needs and
expectations of wireless mobile users are actually about easy to use, simple products. These two trends have been
chosen to investigate possible products.

Keywords: mobile computing, SMS concepts, mobile devices, mobile appliances, mobile e-services

Mobile computing is the discipline for creating Mobile computing is human–computer


an information management platform, which is interaction by which a computer is expected to
free from spatial and temporal constraints. The be transported during normal usage. Mobile
freedom from these constraints allows its users computing involves mobile communication,
to access and process desired information from mobile hardware, and mobile software.
anywhere in the space. The state of the user, Communication issues include ad-hoc and
static or mobile, does not affect the information infrastructure networks as well as
management capability of the mobile platform. communication properties, protocols, data
A user can continue to access and manipulate formats and concrete technologies. Hardware
desired data while traveling on plane, in car, on includes mobile devices or device components.
ship, etc. Thus, the discipline creates an illusion Mobile software deals with the characteristics
that the desired data and sufficient processing and requirements of mobile applications.
power are available on the spot, where as in "Mobile computing: being able to use a
reality they may be located far away. computing device even when being mobile and
therefore changing location. Portability is one
aspect of mobile computing."
MOBILE COMPUTING: DEFINED
The discipline of mobile computing has its
origin in Personal Communications Services MOBILE COMPUTING DEVICES
(PCS). PCS refers to a wide variety of wireless Smartphones
access and personal mobility services provided A smartphone is a mobile phone built on a
through a small terminal (e.g., cell phone), with mobile operating system, with more advanced
the goal of enabling communications at any
computing capability and connectivity than a
time, at any place, and in any form. PCS are feature phone. The first smartphones combined
connected to Public Switched Telephone the functions of a personal digital assistant
Network (PSTN) to provide access to wired (PDA) with a mobile phone. Later models
telephones. PCS include high-tier digital cellular added the functionality of portable media
systems for widespread vehicular and pedestrian players, low-end compact digital cameras,
services and low-tier telecommunication system pocket video cameras, and GPS navigation
standards for residential, business, and public units to form one multi-use device.
cordless access applications.

56
Technical Reports CLOUD AND MOBILITY FOR INDIAN MASSES

Example: Blackberry MOBILE COMPUTING CONNECTIVITY


CONSTRAINTS
PDAs
The mobile connectivity between two nodes
A personal digital assistant (PDA) phone is a
exists if they are continuously connected
handheld computer and cell phone in one,
through wireless channel and can utilize the
sometimes referred to as a smartphone. Features
channel without being subjected to spatial and
vary depending on the brand and model, but a
temporal constraints.
PDA phone can incorporate everything from
wireless Internet to Bluetooth® networking, 1. Revising technical architecture: Mobile
camera, video, integrated audio player, a users are important to the business world.
calendar, address book, to-do list and notepad To provide complete connectivity among
along with other applications. Touch screen users the current communication technology
technology is available on select models. must be revised to incorporate mobile
connectivity.
Example: Compact Mobile Computers
2. Reliability, coverage, capacity, and cost:
EDAs
At present wireless network is less reliable,
Enterprise digital assistant (EDA) is a handheld have less geographic coverage and reduced
computer, born of the Personal digital assistant bandwidth, are slower, and cost more than
popularity which was adapted for enterprise the wired-line network services.
level needs.
3. End-to-end design and performance:
Examples: Dolphin Series Mobile Computer Since mobile computing involves multiple
Tablet PCs networks (including wired) and multiple
application server platforms, end-to-end
Tablet computer is a kind of mobile computer,
technical compatibility, server capacity
usually having a touchscreen or pen-enabled
design, and network response time
interface. It is a class of tablet which runs an
estimates are difficult to achieve.
adapted version of a desktop operating system
4. Security: Wireless networks have relatively
Example: Microsoft Tablet PC
more security requirements than wired
Ultra Mobile PCs network. A number of approaches have
Ultra-Mobile Personal Computer or UMPC is a been suggested and also the use of
small form factor version of a pen computer, a encryption is has been proposed.
class of laptop whose specifications were The Figure below illustrates the concept of a
launched by Microsoft and Intel in spring 2006. fully connected information space where every
Example: AMtek's T700 and Samsung's Q1. unit is fully connected to other units in the
information space.
Wearable Computers
Wearable computers, also known as body-borne
computers are miniature electronic devices that
are worn by the bearer under, with or on top of
clothing.
Example: Bryan Bergeron

57
BOS.CON 2012 Technical Reports

as speech or handwriting recognition require


training.
CONCLUSION
At present the current technology only provides
limited transaction processing capabilities but
soon such facilities will be available on all
mobile devices such as cell phones, laptops,
palmtops, etc. In fact, it is not incorrect to say
that the mobile computing is one of the main
Figure: Fully Connected Information Space components of today's information technology
such as e-commerce, web and so on.
LIMITATIONS IN MOBILE COMPUTING
Range and Bandwidth: Mobile Internet access is
FUTURE WORK
generally slower than direct cable connections,
using technologies such as GPRS and EDGE, ● Connectedness and interactivity are driving
and more recently HSDPA and HSUPA 3G and mobile technologies for higher education.
4G networks. Higher speed wireless LANs are ● Widespread innovations in creative,
inexpensive but have very limited range. compelling, education-focused mobile
Security Standards: When working mobile, applications.
one is dependent on public networks, requiring ● To address privacy issues in colleges and
careful use of VPN. Security is a major concern universities, need to educate students and
while concerning the mobile computing implement less complex security systems.
standards on the fleet. One can easily attack the
VPN through a huge number of networks
interconnected through the line. REFERENCES
Power Consumption: When a power outlet or Mitchell, Bradley. "Satellite Internet"
portable generator is not available, mobile
http://compnetworking.about.com/od/
computers must rely entirely on battery power.
internetaccessbestuses/g/bldef_satellite.htm
Combined with the compact size of many
mobile devices, this often means unusually
expensive batteries must be used to obtain the "Introduction to Global Satellite Systems",
necessary battery life. Compass Rose International Publications
Transmission Interferences: Weather, terrain, http://www.compassroseintl.com/pubs/
and the range from the nearest signal point can Intro_to_sats.html
all interfere with signal reception. Reception in
tunnels, some buildings, and rural areas is often
poor. Case studies, www.netmotionwireless.com

Human Interface with Device: Screens and http://www.netmotionwireless.com/resources/


keyboards tend to be small, which may make case_studies.aspx
them hard to use. Alternate input methods such

58
Technical Reports CLOUD AND MOBILITY FOR INDIAN MASSES

Phifer, Lisa. "Mobile VPN: Closing the Gap", The Wall Street Journal, December 11, 2007.
SearchMobileComputing.com, July 16, 2006. http://en.wikipedia.org/wiki/
http://searchmobilecomputing.techtarget.com/ The_Wall_Street_Journal
tip/0,289483,sid40_gci1210989_mem1,00.html www.mobcomfuture.com

www.mobilecomputing.com
Cheng, Roger. "Lost Connections"
http://online.wsj.com/article/
SB119717610996418467.html

The Internet creates as well as destroys.


Social networks, search advertising, and cloud
computing are multibillion dollar industries that
didn't exist 10 years ago. They are products
of the same force that has rendered the
Postal Service's core business obsolete.
John Sununu

59
BOS.CON 2012 Technical Reports

Mobile Applications for India


Geetha R.1, Vanitha2 and Lavanya Mary3
IT Group: Internet Explorer, Don Bosco College, Yelagiri Hills
{geethabics@gmail.com; aashavanitha@gmail.com; lavanyamary@gmail.com}

Abstract
This report presents overview of mobile applications for Indian people, the networks and technologies that are used in
mobile applications. This document also discusses how mobile applications are useful for the Indian people and it
explains why mobile applications are needed. The report provides various types of mobile applications used in various
places. Now-a-days, most of the people use mobiles in India. From this report, reader can understand the various
features used in mobiles and how it is being handled in business.

Keywords: Mobile Applications, Trends, Networks, Development, Features

A mobile app is software that runs on a browsers and slow data connections available to
handheld devices (phone, tablet, e-reader, iPod, most feature phone use. Any time you have a
etc.) that can connect to WiFi or wireless carrier data-based interactive tool, try to find a way to
networks, and has an operating system that make at least part of it work reasonably well on
supports standalone software. Usually, when a feature phone web browser.
people hear ―mobile app‖ they assume you
mean native app. Mobile apps have a ―smart‖
operating system, which supports standalone MOBILE MARKETING IN INDIA
software and can connect to the Internet via Wi- While, ownership of Internet-connected PCs
Fi or a wireless carrier network. People might still be relatively low across the country
download native mobile apps from app stores and reserved mainly for the more affluent city
such as the Apple app store or the Android dweller, mobile phone ownership is more wide
Market. A native app can only be ―native‖ to spread and growing rapidly. The mobile device
one type of mobile operating system: iOS, offers a great way for marketers to bridge the
Android, BlackBerry, Symbian, Windows gap between the physical and digital world and
Phone, WebOS, etc. This is why an iPhone app you don‘t have to rely on the latest, most
works only in iOS devices. If you want to make sophisticated smartphones to engage your
your app experience available to Android or audience. Why not think about the options that
Blackberry users, you‘ll need to develop and can be offered by shortcodes text back
maintain a separate piece of software, which is response, SMS, Interactive Voice Response and
expensive and complicated. automated outbound dialing? India is the third
biggest country in terms of Internet users in the
world, with a highly social and mobile
FEATURE PHONE AND APPS audience. This snapshot takes a closer look at
‗Feature Phone‘ is the telecom industry term for India‘s digital consumer and the key trends
non-smartphones. According to ComScore, 73% driving the country towards a digital future. It's
of the mobile handsets in use in the US are estimated as many as 121 million Indians are
feature phones. Most of these phones can logged onto the Internet. It is a sizeable
connect to the Internet and browse the Web. number, but still a relatively small proportion of
You can design interactive ―appish‖ web-based the country's 1.2 billion population.
tools that work well and deliver value to mobile
users - via the primitive, stripped down web

60
Technical Reports CLOUD AND MOBILITY FOR INDIAN MASSES

TRENDS OF MOBILE APPLICATION In India, their growth has been slow up till now,
mainly due to the unavailability of fast Internet
1) Business Apps
connections on the phone. But now, with the
In India, there has been a boom in gaming and advent of 3G and faster data transfer speeds,
other leisure mobile applications. But, till now this domain is all set to grow at a very fast pace.
there has been no mobile applications used by
the business community. In the western
countries, there has been a surge of business 3) Location-based Apps (LBA)
apps recently. There are apps that have various LBA are used in a variety of contexts, such as
business functionalities like stock market health, indoor object search, entertainment,
tracking, uploading videos and presentations to work, personal life, etc. It includes services to
the cloud, social networking (yammer), identify a location of a person or object, such
analytics tools, mind maps, etc. The few as discovering the nearest banking cash
business apps that exist in India, like the NSE machine or the whereabouts of a friend or
trading mobile app are very complicated to employee.
operate and very few people know about their
existence. But this is about to change. Many of It can be also used in other creative marketing
the mobile app developers in India are entering purposes as well. For example, the popular
into this domain. Many of them already have Finnish iPhone game Shadow Cities, which
expertise in this field as they have developed recently made its debut in the U.S., uses the city
products for foreign companies. of each player as a game board, allowing them
to roam their neighborhood casting spells and
taking over city blocks. Players can engage
2) Cloud Computing with others nearby by either teaming up or
Although, there has been much innovation and fighting over territory.
R&D in cloud computing, not a lot of it has
reached the mobile application domain in India.
It presents a valuable opportunity to marketers
In the U.S., the increase in cloud computing who want to foster emotional connections with
apps has been exponential. These are among the their audiences. These apps have not found a
most popular apps sold on the iPhone and market in India because:
Android marketplaces.
● They have never been customized for the
Indian market.
According to a recent survey the cloud
● Slow data transfer rates and poor GPS
computing apps have the following number of facilities.
users:
● Lack of awareness of these apps among the
● Location (38%) like Visa users.
● Notification (36%) like Facebook
● Rating & Reviews (11%) like IMDB But now several developers have already
● Photo (8%) like Instagram started venturing into this domain. For
Example, an Indian developer has developed an
● Check-ins (7%) like FourSquare
app called hoppr, which is based on

61
BOS.CON 2012 Technical Reports

FourSquare‘s idea and also gives location-based MOBILE APPLICATION PLATFORM


discounts. Mobile application development ranges
bespoke mobile, smartphone and tablet-based
application development services. These
4) Mobile Payment
assorted services are, Android Apps
Mobile payment is an alternative payment Development, iPad Apps Development, iPhone
method. Instead of paying with cash, check, or Apps Development, Blackberry Apps
credit cards, a consumer can use a mobile phone Development, Windows Mobile Apps
to pay for a wide range of services and digital or Development and J2ME Mobile.
hard goods. This segment is expected to exceed
$300B globally by 2013.
MOBILE APPLICATION
DEVELOPMENT
In India, due to issues in security and unreliable
Internet, this market is still nascent. But as Mobile phones have become a way of life.
awareness about this technology spreads, the While you might be able to decide which
platform would be best for your app, based on
market will expand because this has many
advantages like cash free transactions, whether the larger reach of Android customer
instantaneous payments, etc. There has been a segment or the higher disposable income of the
growth in the mobile banking segment in India iPhone user is more important, it is also
as many players like mcheck have forayed into essential to understand the technology of each
platform and how it could be used optimally for
it.
your users. Whether it is iOS app development
or Android app development, when you
5) Windows Phone outsource mobile apps development to us, you
can be sure of one thing: 100% Peace of Mind.
Although, the UI of Windows Phone OS has
been very poor and there are very few apps as
compared to iPhone or Android, it is likely to CONCLUSION
change very soon. Microsoft has officially
announced the first details of Windows Phone 8 Mobile Apps are easy to use and helps us solve
(Apollo) that include a better interface and many problems or reach goals while we‘re on the
new features. The partnership with Nokia is move. It helps us feel connected to our friends,
certainly helping, as will the announcement that family and coworkers, so we never feel alone.
the Windows Phone Marketplace is now up to The app helps us quickly access information we
100,000 apps with more coming - from the need. It is entertaining, so we enjoy spending
time using the application and feel drawn to it
PayPal support for Wallet to iPhone must-haves
like Words with Friends and Audible, plus when we‘re away from it. Our mobile devices
Zynga‘s newly acquired Draw Something. have a lot of applications on them, so we have a
Although, this phenomenon is not particular to huge amount of choice on where to spend our
India as this market will grow at a very fast pace time fruitfully.
worldwide, but as the India is going to grow
faster, so this will be a market to keep an eye
REFERENCES
out for.
Computer Express (Magazine)

62
Technical Reports CLOUD AND MOBILITY FOR INDIAN MASSES

Mobile Technologies: Evolution & Applications Trends


Adaikala Praveen1, Arockiasamy2 and Gnana Pragasam3
IT Group: Opera, Don Bosco College, Yelagiri Hills
{praveesh01@yahoo.com; pragasamb1016@gmail.com; samybics@gmail.com}

Abstract
Mobile technology is the technology used for cellular communication. Mobile Code Division Multiple Access (CDMA)
technology has evolved rapidly over the past few years. Since the start of this millennium, a standard mobile device
has gone from being no more than a simple two-way pager to being a mobile phone, Global Positioning System
(GPS), an embedded web browser and instant messaging client and a handheld game console. Many experts argue
that the future of computer technology rests in mobile computing with wireless networking. Mobile computing by way
of tablet PCs are becoming quite popular in India.

Keywords: Mobile Evolution, Potentiality and Pitfalls, Mobile Technologies and Applications

End-user mobile devices such as smartphones, generation (3G) technology has added
PDAs and tablets, offer the promise of multimedia facilities to 2G phones. And now,
anywhere, anytime computing and talks are on for the next-generation mobile
communication. Indeed, users increasingly technology with more advanced features.
expect their mobile device to support the same Systems in the late 1970s were a quantum leap
activities (and same performance) as their in mobile communication, especially in terms
desktop counterparts: seamless multitasking, of capacity and mobility. Semiconductor
ubiquitous data access, social networking, game technology and microprocessors made smaller,
playing and real work, all on-the-go. lighter, and more sophisticated mobile systems
a reality.
To support mobility, these devices are typically
constrained in terms of their computer power, 1G
energy and network bandwidth. Supporting the The 1G cellular systems is capable of
full-array of desired desktop applications and transmitting only analogue voice information.
behavior; yet retaining the flexibility of the The prominent ones among 1G systems were
mobile cannot always be met using local advanced mobile phone system (AMPS),
resources alone. To achieve this vision, Nordic mobile telephone (NMT), and total
additional resources must be easily harnessed on access communication system (TACS). With
-demand. Possible sources of such external the introduction of 1G phones, the mobile
resources can be servers, proxies, CDNs, as well market showed annual growth rate of 30% to
as the public cloud, such as Amazon EC2 or 50%, rising to nearly 20 million subscribers by
Microsoft Azure, that can provide storage and 1990. The first generation 1G mobile phones
computational resources to be harnessed on- were based on the analogue system.
demand. The goals include improved
performance, energy efficiency, and richer user 2G
experience. 2G phones using Global System for Mobile
EVOLUTION FROM 1G TO 4G communications (GSM) were first used in the
early 1990s in Europe. GSM provides voice and
First-generation (1G) mobile phones had only limited data services and uses digital
voice facility. It was replaced by second- modulation for improved audio quality. The
generation (2G) digital phones with added fax, development of 2G cellular systems was driven
data and messaging services. The third-

63
BOS.CON 2012 Technical Reports

by the need to improve transmission quality, 3G


system capacity and coverage. Further advances The 3G technology adds multimedia facilities
in semiconductor technology and microwave to 2G phones by allowing video, audio, and
devices brought digital transmission to mobile graphics applications. Over 3G phones, you can
communications. Speech transmission still watch streaming video or have video telephony.
dominates the airways, but the demand for fax, The idea behind 3G is to have a single network
SMS and data transmission is growing rapidly. standard instead of the different types adopted
Supplementary services such as, fraud in the US, Europe, and Asia.
prevention and encryption of user data have
become standard features, comparable to those 4G
in fixed networks. 4G mobile communications will have
2.5G transmission rates up to 20 Mbps—higher than
of 3G. The technology was expected to be
The mobile technology using general packet available by the year 2010. Presently, NTT
radio service (GPRS) standard has been termed DoCoMo and Hewlett-Packard were on their
as 2.5G. 2.5G systems enhance the data capacity agenda to make it available by the year 2006.
of GSM and mitigate some of its limitations.
GPRS adds packet-switched capabilities to 4G is being developed with the following
existing GSM and TDMA networks. Working objectives:
on the basis of emails, it sends text and graphics 1. Speeds up to 50 times higher than of 3G.
-rich data as packets at very fast speed. The However, the actual available bandwidth of
circuit-switched technology has a long and 4G is expected to be about 10 Mbps.
successful history but it is inefficient for short
2. Three-dimensional virtual reality images,
data transactions and always-on service. The
personal video avatars and realistic
packet switched technology has grown in
holograms, and the ability to feel as if you
importance with the rise of the Internet and
are present at an event, even if you are not.
Internet protocol (IP).
People, places, and products will be able to
The second generation of mobile interact as the cyber and real worlds merge.
communications technology was all about
3. Increased interaction between corroborating
digital PCS. The problem however, was that
technologies; the smartcard in your phone
much of the digital network was implemented
will automatically pay for goods as you
for, or overlaid onto, proprietary networking
pass a linked payment kiosk, or will tell
equipment. Taken together, 2G and 2.5G
your car to warm up in the morning as your
technologies are far from seamless. These range
phone has noted you leaving the house.
spread from spectrum code-division multiple
access (CDMA) in North America to narrow- Currently, the most popular and pioneering
spectrum time-division multiple access (TDMA) tablet PCs continue to be iPad by Apple. More
and GSM in Europe and Asia. In addition to Tablet PCs are being available on 3G and 4G
these incompatibilities, both systems offer networks as well.
digital voice at a relatively low speed with very Growth Potential and Pitfalls of Mobile
little bandwidth left over for data. Technology
The impact of mobile trend is felt most keenly
by corporate IT staff. A global study

64
Technical Reports CLOUD AND MOBILITY FOR INDIAN MASSES

commissioned by security provider Symantec customer uses it.


Corp. found that 48%t of companies consider
mobile computing as ―somewhat‖ to
―extremely‖ challenging. As a conse¬quence, Heightened Smartphones Sales
roughly one-third of the IT staff at most Worldwide mobile phone sales are continuing
companies are involved somehow in managing to take a hit in the sluggish economy even as
mobile computing. smartphone figures rise, according to a Gartner
report. The mobile device industry sold 428
million units in the quarter, a 3% drop from the
Meanwhile, companies of all sizes have started same time, last year. Smartphone sales are up
leveraging the increased flexibility and potential 47% to 169 million units, however.
of their newly mobile workforce to develop and
deploy line-of-business applications designed
specifically for platforms such as iOS and Java-based i-mode programs
Android. Symantec also found that more than
Java-based i-mode programs, download, maps
70% of companies surveyed have begun, or
and displays charts of online information. It
intend to start, developing their own
also enables remote users to receive automatic
applications for sales force automation, ERPs
notifications of weather, traffic, appointments
and other lines of business, rather than relying
and so on, both online and from a company
on the consumer applications used by the
Intranet. The main bonus for users of this
majority of smartphone owners.
software is the additional security encryption,
which makes it suitable for e-commerce and
MOBILE TECHNOLOGY APPLICATIONS mobile banking. The software has been
developed by NTT and DoCoMo in conjunction
Microsoft's Foray into Mobile Stuff with Sun Microsystems.
Microsoft is developing its own Windows
Phone hardware - reportedly (i) is working with
Asian suppliers to create a new handset. While, i-Mode and m-Mode
Microsoft has several partners who are bringing Dubbed 4G, this i-mode technology will offer
out Windows Phone8 devices, including Nokia data transmission rates up to 200 times higher
and HTC, this would be the company's first than 2G at 20 Mbps. 3G data rate is currently 2
foray into the handset market as a hardware Mbps, which is very high compared to 2G‘s 9.6
manufacturer. kbps. 4G builds on the 3G standard, integrating
and unifying the different interfaces (CDMA,
CDMA2000, EDGE and so on).
US leading 4G World
Perhaps, the United States was not the first to
get into the 4G LTE wireless data game, but The development of 4G expands upon current i-
today it may be the most aggressive in rolling it mode technology that has gained wide success
out. The US has more miles of network, more in Japan. The streamlined and unified wireless
devices, and more subscribers than any other Internet technology works through iHTML to
place on Earth. If you listen to the advertising, it provide a high quality Web service. I-mode has
seems every carrier offers 4G and every speeded up data transmission of up to 40,000

65
BOS.CON 2012 Technical Reports

Internet sites for users. Charges are based on the carrying out an initial implementation of an
amount of data transmitted rather than the time example from each application class, along
spent on it. AT&T has launched the M-mode with a preliminary evaluation of the benefit.
service tailored to the US market. The service is Our preliminary evaluation above suggests that
based on WAP technology and offers a dual there are a greater potential for mobile
browser with I-mode. computation for application.

CONCLUSION REFERENCES
With the increasing number of rich applications Microsoft Hitting the Hard Stuff
available for mobile devices, users increasingly http://www.technewsworld.com/
expect their mobile device to support the same story/76542.html
activities (and same performance) as their
desktop counterparts. However, these devices US is King of 4G World
are typically constrained in terms of their http://www.technewsworld.com/
computing power, energy, and network story/76574.html
bandwidth. In this paper, we have explored the
Android, Samsung Boost Smartphones to New
potential benefits of mobile computation
Sales Heights
outsourcing to external nodes by (i) identifying
three classes of mobile applications that are http://www.technewsworld.com/
likely to benefit from such computation, and (ii) story/76641.html

The computing field is always in need of new


clichés. Alan Perlis

66
Technical Reports CLOUD AND MOBILITY FOR INDIAN MASSES

Models of Cloud Computing


Mathiyas A1. and Ashok Kumar2
IT Group: Amaya, Don Bosco College, Yelagiri Hills
{mathewmathiyas@yahoo.co.in; aashok@gmail.com}

Abstract
Today, IT is moving towards Cloud Computing. Cloud computing enables us to have access to hardware, software on
the go via cloud (known as, Internet). This has highly reduced the cost of purchasing any hardware or software. This
paper attempts to explain the various characteristics of cloud computing. It mainly focuses on various cloud
computing models such as, Service Models and Deployment Models.

Keywords: Infrastructure As A Service (IaaS), Platform As A Service (PaaS), Software As A Service (SaaS), Public
Cloud, Private Cloud, Hybrid Cloud, Community Cloud

Cloud Computing is the use of computing CONCEPTS


resources (hardware and software) that are Cloud computing shares similar characteristics
delivered as a service over a network (typically with the following computing models:
the Internet). The name comes from the use of a
cloud-shaped symbol as an abstraction for the 2.1. Client-Server - It refers broadly to any
complex infrastructure it contains in system distributed application that distinguishes
diagrams. Cloud computing entrusts remote between service providers (servers) and service
services with a user's data, software and requesters (clients).
computation. End users access cloud-based 2.2. Grid Computing - A form of distributed
applications through a web browser or a light- and parallel computing, whereby a 'super and
weight desktop or mobile app, while the virtual computer' is composed of a cluster of
business software and user's data are stored on networked, loosely coupled computers acting in
server at a remote location. concert to perform very large tasks.
2.3. Mainframe Computer - Powerful
1. HISTORY OF CLOUD COMPUTING computers used mainly by large organizations
for critical applications, typically bulk data
The origin of the term, ―cloud computing‖ is processing such as census, industry and
obscure, but it appears to have been derived consumer statistics, police and secret
from the practice of using drawings of stylized intelligence services, enterprise resource
clouds to denote networks in diagrams of planning (ERP), and financial transaction
computing and communications systems. The processing.
word ―cloud‖ is used as a metaphor for the
Internet, based on the standardized use of a 2.4. Utility Computing – This denotes the
cloud-like shape to denote a network on packaging of computing resources, such as
telephony schematics and later to depict the computation and storage, as a metered service
Internet in computer network diagrams as an similar to a traditional public utility, such as
abstraction of the underlying infrastructure it electricity.
represents. The cloud symbol has been used to 2.5. Peer-to-Peer - Distributed architecture
represent the Internet as early as 1994. without the need for central coordination, with
participants being at the same time both
suppliers and consumers of resources (in
2. ASSOCIATED SYSTEMS AND contrast to the traditional client-server model).

67
BOS.CON 2012 Technical Reports

2.6. Cloud Gaming - Also known as ‗on-demand without the cost and complexity of buying and
gaming‘, this is a way of delivering games to managing the underlying hardware and
computers. The gaming data will be stored in software layers. Examples of PaaS include:
the provider's server, so that gaming will be Amazon Elastic Beanstalk, Cloud Foundry,
independent of client computers used to play the Heroku, Force.com, EngineYard, Mendix,
game. Google App Engine, Windows Azure Compute
and OrangeScape.
3. SERVICE MODELS
3.3. Software as a Service (SaaS)
Cloud computing providers offer their services
according to three fundamental models: (1) In this model, cloud providers install and
Infrastructure as a Service (IaaS), (2) Platform operate application software in the cloud and
as a Service (PaaS), and (3) Software as a cloud users access the software from cloud
Service (SaaS), where IaaS is the most basic and clients. The cloud users do not manage the
each higher model abstracts from the details of cloud infrastructure and platform on which the
the lower models application is running. This eliminates the need
to install and run the application on the cloud
3.1. Infrastructure as a Service (IaaS)
user's own computers simplifying maintenance
In this most basic cloud service model, and support. It is common to refer to special
providers offer computers, as physical or more types of cloud-based application software with
often as virtual machines and other resources. a similar naming convention: ‗desktop as a
The virtual machines are run as guests by a service‘, ‗business process as a service‘, ‗test
hypervisor, such as Xen or KVM. Other environment as a service‘ and ‗communication
resources in IaaS clouds include images in a as a service‘.
virtual machine image library, raw (block) and
Examples of SaaS include: Google Apps,
file-based storage, firewalls, load balancers, IP
Microsoft Office 365, and Onlive.
addresses, virtual local area networks (VLANs),
and software bundles. IaaS refers not to a 4. DEPLOYMENT MODELS
machine that does all the work, but simply to a 4.1. Public Cloud
facility given to businesses that offers users the
leverage of extra storage space in servers and Public cloud applications, storage and other
data centers. resources are made available to the general
public by a service provider. These services are
Examples of IaaS include: Amazon free or offered on a pay-per-use model.
CloudFormation (and underlying services such Generally, public cloud service providers like
as Amazon EC2), Rackspace Cloud, Terremark, Amazon AWS, Microsoft and Google, own and
Windows Azure Virtual Machines, Google operate the infrastructure and offer access via
Compute Engine, and Joyent. Internet only (direct connectivity is not
3.2. Platform as a Service (PaaS) offered).
In the PaaS model, cloud providers deliver a 4.2. Community Cloud
computing platform typically including This shares infrastructure between several
operating system, programming language organizations from a specific community with
execution environment, database, and web common concerns (security, compliance,
server. Application developers can develop and jurisdiction, etc.), whether managed internally
run their software solutions on a cloud platform

68
Technical Reports CLOUD AND MOBILITY FOR INDIAN MASSES

or by a third-party and hosted internally or It is really a boon to IT industry and society as


a whole, as it reduces the cost of purchasing a
new hardware or software. A number of
researches are on to strengthen the security of
cloud computing.
REFERENCES
―The NIST Definition of Cloud Computing‖
NIST Special Publication 800-145 (September
2011). National Institute of Standards and
Technology, U.S. Department of Commerce.
externally. http://nvlpubs.nist.gov/nistpubs/sp/2011/sp800-
4.3. Hybrid Cloud 144.pdf

Hybrid cloud is a composition of two or more Timothy Grance, ―Guidelines on Security and
clouds (private, community or public) that Privacy in Public Cloud Computing‖ Wayne
remain unique entities but are bound together, Jansen and NIST Special Publication 800-144
offering the benefits of multiple deployment (December 2011). National Institute of
models. Hybrid cloud architecture requires both Standards and Technology, U.S. Department of
on-premises resources and off-site (remote) Commerce.
server-based cloud infrastructure. Hybrid clouds http://nvlpubs.nist.gov/nistpubs/sp/2011/sp800-
lack the flexibility, security and certainty of in- 144.pdf
house application.
Daniele Cattedu and Giles Hobben, ―Cloud
4.4. Private cloud Computing - Benefits, risks and
Private cloud is cloud infrastructure operated recommendation for information security‖
solely for a single organization, whether European Network and Information Security
managed internally or by a third-party and Agency 2009.
hosted internally or externally. http://www.enisa.europa.eu/activities/risk-
5. CONCLUSION management/files/deliverables/cloud-
computing-risk-assessment
In the era of IT, cloud computing is a novel
phenomenon. It is growing in leaps and bound.

The utility model of computing - computing


resources delivered over the network in much
the same way that electricity or telephone
service reaches our homes and offices today -
makes more sense than ever.
Scott McNealy

69
BOS.CON 2012 Abstracts

SOCIAL NETWORKING: MAKING MEN MORE SOCIAL


Jegan Prabu1 and Arvind Prasad2
Don Bosco College Dharmapuri-636809
{jeganprabu2525@gmail.com, rickyamla@gmail.com}

Today, IT is moving towards Cloud Computing. Cloud computing enables us to have access to hardware, software on
the go via cloud (known as, Internet). This has highly reduced the cost of purchasing any hardware or software. This
paper attempts to explain the various characteristics of cloud computing. It mainly focuses on various cloud
computing models such as, Service Models and Deployment Models.

Keywords: Infrastructure As A Service (IaaS), Platform As A Service (PaaS), Software As A Service (SaaS), Public
Cloud, Private Cloud, Hybrid Cloud, Community Cloud

SCANDI: BLUETOOTH – WIRELESS TECHNOLOGY


Bluetooth is a method for data communication that used short-range radio links to replace cables between computers
and their connected units. Industry-wide Bluetooth promises very substantial benefits for wireless network operations,
end workers and content developers of exciting new applications. This paper delves into the implementation and
architecture of Bluetooth. It also describes the functional overview and application of Bluetooth, and deals with the
development of a model for recording, printing, monitoring, and controlling of eight process variable at the same
time, using a distributed control system.

Keywords: Bluetooth History, Enabled Devices, Bluetooth Characteristics, Link Manager Protocol (LMP),
Competing technologies, Bluetooth Stack, Communication

OPEN SOURCE TECHNOLOGY


T. Darwin
Don Bosco College of Arts and Science, Dharmapuri
{darwin.star@gmail.com}

Open source software is becoming the most interesting ‘new’ phenomenon of the entire information technology
landscape, generating a level of interest similar to that of the first moments of the Internet. Although in recent years it
has reached a critical mass, which has allowed it to enter the mainstream software market. India is in a good position
to take early advantage of open source. The impact of open source technology is expected to be quite noticeable in the
software industry, and in society as a whole. It allows for novel development models, especially well suited to
efficiently take advantage of the work of software developers spread across all corners of the planet. It also enables
completely new business models, which are shaping a network of groups and companies based on open source
software development. And it has, in general, a very positive impact as an enabler for the creation of new markets and
business opportunities.

Keywords: Open Source Technology, Development Models, Business Models, Open Source Networks/Groups, Open
Source Market Opportunities

NETWORK SECURITY
K. Thufail Ahmed and N. MD Faraz
Islamiah College, Vaniyambadi

What Is Network Security? It is the Freedom from risk or danger from hacker and safety. Network security has
become more important to personal computer users, organizations, military, government, defense agencies, financial
institutions, banks and so on. The vast topic of network security is analyzed by researching the following: A historical
glance of network security; Types of network security; why do we need network security; who is vulnerable and the
Common security attacks and counter measures (Firewalls, Denial of Service Attacks, TCP Attacks, Packet Sniffing,
and Social Problems). The reports conclude with Benefits of Network Security and Future development in network
security hardware and software.

Keywords: Network Security, Types of Network Security, Vulnerability, Security Attacks

70
Abstracts CLOUD AND MOBILITY FOR INDIAN MASSES

SOCIAL NETWORKING
Arvind Prasad and Jegan Prabu
Don Bosco College, Dharmapuri

Man, a social animal finding comfort and solace in a society, today when hardly he is free, socializes through
participatory and self-expressive websites like Twitter, MySpace, Facebook-where members expose, discuss, reveal,
and expound on their personal lives, activities, hopes, dreams, and even fantasies for others to marvel upon.
Statistically 93% of Indian adolescents aging 12-17 years go online and 95% of college students have a Facebook
account and the numbers is increasing. This paper highlights the importance, functioning, pros and cons of social
networking and ways to improve it with due concern of its cloud and mobility for Indian masses.

Keywords: Social Networking, Self-expressive Websites, Social Networking Sites, Pros and Cons of Social
Networking, Cloud, Mobility

DATABASE TECHNOLOGY
A database is a persistent collection of logically related data. It contains not only the data but also the complete
definition of the database structure and constraints, which are stored in a system catalog. A DBMS manages this data.
It allows data sharing and integration of data of an organization in a single database.

Keywords: Database Persistency, Database Structure, Constraints, DBMS, Data Sharing, Data Integration

ENTERPRISE RESOURCE PLANNING (ERP)


Open source refers to a program in which the source code is available to the general public for use and/or
modification from its original design free of charge. Some ERP software are also available as open source. ERP
stands for Enterprise Resource planning systems. It attempts to integrate all data and processes of an organization
into a unified system. A typical ERP system will use multiple components of computer software and hardware to
achieve the integration. A key ingredient of most ERP systems is the use of a unified database to store data for the
various system modules. This paper which explains about the general work of an ERP system is applicable for any
type of organization with its various modules.

Keywords: ERP, Enterprise Resource Planning, Data Integration, Software Integration, Hardware Integration, Unified
Database

CLIENT/SERVER COMPUTING: THE WAVE OF THE FUTURE


Client-server computing is one of the several computing by which the client software sends the request to the server
software and the server software does the process and returns the result to the client. By adopting the client-server
technology, the organizations have changed from steep hierarchies to flattened hierarchies. Also, network
management is replacing virtual management. As a result off all this, the organization is running more efficient and
hence, making more profits.

Keywords: Client-Server Computing, Server Software, Network Management, Virtual Management

They don't call it the Internet anymore, they


call it cloud computing. I'm no longer resisting
the name. Call it what you want.
Larry Ellison

71
BOS.CON 2012 LAUGHTER ZONE

72
CLOUD AND MOBILITY FOR INDIAN MASSES

LAUGHTER ZONE

73
Dear Sponsors!

Yelagiri Well Wishers CSR Well Wishers


Peter, Athanavur Sr. Lizzy Chakkalakal, Thoppumpady
Ponurangam, Athanavur Sr. Sophy Thomas , Lablipet
Bennette Bengamin, Kottayur Sr. Jothi Gilda Mary , Servite Convent
Anuradha Selvam, Kottayur Sr. Philo, Mathigur
Loganathan, Kottayur Sr. Nirmala, Hosur
Pastor Sam Sr. Mary Sonia, Bangalore
Sivalingam C. sr. Margaret, Akividu
Dr. Nagam Arumugam Sr. Susan, Akividu
Hotel ARUVI, Athanavur Ms. Rajni Koppula, Dongargarh
Mani Mesthri, Athanavur
Jaison, Athanavur
Vetri, Tirupattur

By
BOS.CON’12 Community
Don Bosco College
Guezou Nagar, Yellagiri Hills, Vellore Dt., 635 853
(Affiliated to Thiruvaluvar University)
(Approved by the Govt. of Tamil Nadu, No. 187, Dated: 24-09-2012

Unique Features

 Managed by Salesians of Don  State-of-the-art technology and


Bosco who provide holistic and resource centers.
quality education all over the  Library with print and digital
world. services.
 An Institution with rich  Industrial exposure and
experience and expertise in opportunities to work on live
Computer Education for two projects.
decades.
 Indigenous methods to acquire
 Quality Job Oriented Education communication and language
Guaranteed with 100% skills.
placement.
 Hostel facilities for both boys
 Holistic development of persons and girls.
is the primary aim.
 Conducive atmosphere of a Hill-
 Qualified, experienced and station.
dedicated faculty members.

UG Programmes

 B.Sc. Computer Science


 B.C.A. Computer Application
 B.Com. Computer Application
 B.B.A. Business Administration
 B.Sc. Visual Communication

Eligibility Contact

Students having passed +2 Ph. 04179-245239


or equivalent pattern of Email: info@biit.edu.in
examination. Web: www.biit.edu.in

You might also like