0% found this document useful (0 votes)
6 views

Issuse 1 Final

Uploaded by

adityanawale200
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Issuse 1 Final

Uploaded by

adityanawale200
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

Government Polytechnic, Aurangabad

(An Autonomous Institute of Govt. of Maharashtra-Estd. In 1955)

B
Government Polytechnic, Osmanpura, Aurangabad – 431005, Maharashtra State, India

its &
ytes

Computer Engineering
Department presents

TECHNICAL
MAGAZINE

2022 - 2023
Presented by
VOLUME 1 - ISSUE 1
Computer Department
Computer Department

Vision
A center of excellence in the domain of Computer Science & Engineering to
cultivate "digital artifacts" for society.

Mission
To impart education in computer hardware and software required for industry
and business.
Developing skills resembling problem solving, interpersonal skill, high order
thinking skill and logical reasoning for entrepreneurship and employment.
Developing values and ethics for lifelong learning in the system environment.

Editorial Team
Smt. Shwetal S. Jaiswal Shri. Gajanan U. Jadhav
(HOD) (Lecturer)
Computer Department Computer Department

Vedanti Vitthal Yerawar Dakshayani Jagdish Vaishnav


(Editor-in-Chief) (Editor-in-Chief)

Sneha Abhijeet Bhalerao Siddhi Rajendra Khandarkar


(Editor) (Editor)
DevOps
A B S T R A C T

DevOps entails a set of integrated


activities or practices employed in
automation and interlink software
development processes with IT developers
with the aim of building, testing, and
releasing deliverables quickly and reliably.
Constantly, DevOps has resulted in the use
of infinite loops by the developers or
practitioners in showing the relationship
between development lifecycle phases.
Even though the various activities or steps
in a DevOps make a loop and flow
sequentially, the iteration indicates that the delivering software in the fast-paced dynamic
flow must be constantly collaborative and world of the Internet. As such DevOps has
repetitive to improve the entire lifecycle. If been well received in the software engineering
well explored by DevOps, various software community and has received significant
automation trends could be ready to handle attention particularly in the practitioner
the industry's latest software and literature . Annual 'State of DevOps' reports
technology. show that the number of DevOps teams has
increased from 19% in 2015 to 22% in 2016 to
INTRODUCTION 27% in 2017 . However, as observed in recent
studies, despite their growing popularity, there
The DevOps concept emerged to bridge is a lack of empirical research on the actual
the disconnect between the development of practice of DevOps beyond a discussion of
software and the deployment of that blog posts and industrial surveys .Beyond very
software into production within large few case studies ,the current literature does not
software companies .The main purpose of provide much insight on the actual
DevOps is to employ continuous software implementation and practices of DevOps and
development processes such as continuous their effectiveness in supporting continuous
delivery, continuous deployment, and software development.
microservices to support an agile software
development lifecycle. Other trends in this WORKING
context are that software is increasingly
delivered through the internet, either server- A DevOps team includes developers and IT
side (e.g. Software-as-a-Service) or as a operations working collaboratively throughout
channel to deliver directly to the customer, the product lifecycle, in order to increase the
and the increasingly pervasive mobile speed and quality of software deployment. It’s
platforms and technologies on which this a new way of working, a cultural shift, that has
software runs . These emerging trends significant implications for teams and the
support fast and short delivery cycles of organizations they work for. Under a DevOps
model, development and operations teams
are no longer “siloed.” Sometimes, these
two teams merge into a single team where
the engineers work across the entire
application lifecycle — from development
and test to deployment and operations —
and have a range of multidisciplinary skills.
DevOps teams use tools to automate and
accelerate processes, which helps to
increase reliability. A DevOps toolchain
helps teams tackle important DevOps
fundamentals including continuous
Plan
integration, continuous delivery, automation,
DevOps teams should adopt agile practices to
and collaboration.
improve speed and quality. Agile is an iterative
DevOps values are sometimes applied to
approach to project management and software
teams other than development. When
development that helps teams break work into
security teams adopt a DevOps approach,
smaller pieces to deliver incremental value.
security is an active and integrated part of
the development process. This is called
Build
DevSecOps.
Git is a free and open source version control
L I F E C Y C L E system. It offers excellent support for branching,
merging, and rewriting repository history, which
Because of the continuous nature of
has led to many innovative and powerful
DevOps, practitioners use the infinity loop to
workflows and tools for the development build
show how the phases of the DevOps
process.
lifecycle relate to each other. Despite
appearing to flow sequentially, the loop
Test
symbolizes the need for constant
Continuous integration (CI) allows multiple
collaboration and iterative improvement
developers to contribute to a single shared
throughout the entire lifecycle. The DevOps
repository. When code changes are merged,
lifecycle consists of eight phases
automated tests are run to ensure correctness
representing the processes, capabilities,
before integration. Merging and testing code often
and tools needed for development (on the
help development teams gain reassurance in the
left side of the loop) and operations (on the
quality and predictability of code once deployed.
right side of the loop). Throughout each
phase, teams collaborate and communicate
Deploy
to maintain alignment, velocity, and quality.
Continuous deployment (CD) allows teams to
release features frequently into production in an
Discover
automated fashion. Teams also have the option
Building software is a team sport. In
to deploy with feature flags, delivering new code
preparation for the upcoming sprint, teams
to users steadily and methodically rather than all
must workshop to explore, organize, and
at once. This approach improves velocity,
prioritize ideas. Ideas must align to strategic
productivity, and sustainability of software
goals and deliver customer impact. Agile
development teams.
can help guide DevOps teams.
Operate plugin extensions. Jenkins is an open-
Manage the end-to-end delivery of IT services source Java-based automation CI server
to customers. This includes the practices that is supported by multiple operating
involved in design, implementation, systems including Windows, macOS, and
configuration, deployment, and maintenance other Unix OSs. Jenkins can also be
of all IT infrastructure that supports an deployed on cloud-based platforms.
organization’s services.
4. Configuration Management Tool: Chef
T O O L S U S E D
Configuration management (CM) refers to
The DevOps approach brings collaboration the maintenance and control of the
between the software development and components of large complex systems in a
operation teams. While DevOps is a culture, known, consistent, and determined state
the right stack of tools makes it possible to throughout the DevOps life cycle.
implement DevOps successfully. Some of Components of an IT system may include
these tools are: servers, networks, storage, and
applications. Chef is an open-source
1. Version Control Tool: Git framework, uses a master-agent model and
Git is perhaps the best and most widely used has infrastructure as code (IAC) capabilities
version control tool in a development era to automate the configuration of
characterized by dynamism and collaboration. infrastructure.
Version control provides developers with a
means by which they can keep track of all the 5. Configuration Management Tool:
changes and updates in their codes such that Puppet
in the event of a mishap, it is quite easy to Puppet is also open-source and uses
return to previous version. Git DevOps tool is declarative programming for system
easy to implement as it is compatible with configuration, deployments, and server
most protocols including HTTP, SSH, and management DevOps tools. It is organized
FTP. into reusable modules for the speedy setup
of pre-configured servers and is compatible
2. Build Tool: Maven with most platforms.
Maven is one of the important DevOps tools
for building projects. Unlike the ANT build 6. Container Platforms: Docker
system, Apache Maven is more than just an Container platforms are application
automation build framework. It is also solutions that allow developers to build, test,
designed to manage reporting, and ship applications in resource-
documentation, distribution, releases, and independent environments. Each container
dependencies processes. Written in Java comprises a complete runtime environment
language, Maven can build and manage including the specific application, its
projects written in Java or C#, Ruby, Scala, libraries, source code, configurations, and
and other languages using project object all its dependencies. The Docker engine is
model (POM) plugins. designed to automate the development,
deployment, and management of
3. Continuous Integration Tool: Jenkins containerized applications on single nodes.
Jenkins is an integration DevOps tool. For Docker is open-source and compatible with
continuous integration (CI), Jenkins stands cloud services like AWS, GCP, and Azure
out as it is designed for both internal and Cloud.
C O N C L U S I O N
DevOps is a set of practices, tools, and
a cultural philosophy that automate and
integrate software development and IT
teams, emphasizing team empowerment,
communication, collaboration, and
technology automation. The DevOps
lifecycle is a continuous software
development process that employs DevOps
best practices to plan, build, integrate,
deploy, monitor, operate, and offer
continuous feedback throughout the
software's lifecycle. DevOps tool is critical
for the automation of the software
development life cycle. The DevOps
approach is evolving at a very fast pace and
emerging tools have been designed to
incorporate those with little or no
programming knowledge, microservices and
containerization, and other recent
technologies.

Authors:
1. Tanvi Chaudhari
2. Anisha Nemade
3. Sanika Paware
4. Purva Warade
BLOCKCHAIN AND
CRYPTOCURRENCY
A B S T R A C T
The blockchain technology is a relatively
new approach in the field of information
technologies. As one of its first implementations,
bitcoin as a cryptocurrency has gained a lot of
attention. They represent the very core of
modern cryptocurrency development. This paper
is meant to givea brief introduction to these
topics.
Keywords – Bitcoin; blockchain; cryptocurrency;

I N T R O D U C T I O N

Bitcoin and blockchain technology have


begun to shape and define new aspects in the C R Y P T O C U R R E N C Y
computer science and information technology. E S S E N T I A L S
The need for a decentralized money has been A cryptocurrency, crypto-currency, or
exploited more as a theoretical concept, but in crypto is a digital currency designed to work as
the past decade, it became viable, all thanks to a medium of exchange through a computer
the famous paper of Satoshi Nakamoto in 2008, network that is not reliant on any central
introducing Bitcoin and blockchain technology. authority, such as a government or bank, to
While there are controversies about Nakamoto’s uphold or maintain it. It is a decentralized
true identity, one is for sure: he brought system for verifying that the parties to a
something revolutionary to the world, and it is up transaction have the money they claim to have,
to the users to decide what they want to do with eliminating the need for
it. Some will take this opportunity and develop traditionalintermediaries, such as banks, when
their own application for solving various funds are being transferred between two
problems in the society, others will invest money entities. Individual coin ownership records are
in those ideas or simply trade with ups and stored in a digital ledger, which is a
downs of the cryptocurrencies’ values at the computerized database using strong
market. In this, we thought of bringing a small cryptography to secure transaction records,
introduction to the matter of blockchain and control the creation of additional coins, and
cryptocurrencies. We begin with the life of verify the transfer of coin ownership. Despite
people in the society without bitcoin or their name, cryptocurrencies are not
cryptocurrency, and then we go intothe very considered tobe currencies in the traditional
core of itsfunction. Bitcoin is then cryptocurrency sense, and while varying treatments have been
hold majority of the cryptocurrency market applied to them, including classification as
capitalization. Of course, as it happens with new commodities, securities, and currencies,
technologies, some limitations and problems cryptocurrencies are generally viewed as a
emerged, and we described them well. distinct asset class in practice.
Some crypto schemes use validators to
maintain the cryptocurrency. In a proof-of-
stake model, owners put up their tokens as
collateral.
In return, they get authority over the token in
proportion to the amount they stake.
Generally, these token stakers get additional
ownership in the token over time via network
fees, newly minted tokens, or other such
reward mechanisms.
Cryptocurrency does not exist in physical
form (like paper money) and is typically not
issued by a central authority.
B L O C K C H A I N
Cryptocurrencies typically use T E C H N O L O G Y
decentralized control as opposed to a Blockchain is the underlying technology of
central bank digital currency (CBDC). bitcoin. Blockchain is a public distributed ledger in
When a cryptocurrency is minted, or which transactions are recorded in chronological
created prior to issuance, or issued by a order. Any record or transaction added to the
single issuer, it is generally considered blockchain cannot be modified or altered,
centralized. meaning transactions are safe from hacking. A
When implemented with decentralized control, block is the smallest unit of a blockchain, and it is
each cryptocurrency works through distributed a container that holds all the transaction details. A
ledger technology, typically a blockchain, that block has four fields, or primary attributes:
serves as a public financial transaction 1. Previous hash: This attribute stores the value
database. of the hash of the previous block, and that's how
Traditional asset classes like currencies, the blocks are linked to one another.
commodities, and stocks, as well as 2. Data: This is the aggregated set of transactions
macroeconomic factors, have modest included in this block—the set of transactions that
exposures to cryptocurrency returns. were mined and validated and included in the
The first decentralized cryptocurrency was block.
Bitcoin, which was first released as open- 3. Nonce: In a “proof of work” consensus
source software in 2009. algorithm, which bitcoin uses, the nonce is a
As of March 2022, there were more than random value used to vary the output of the hash
9,000 other cryptocurrencies in the value. Every block is supposed to generate a
marketplace, of which more than 70 had a hash value, and the nonce is the parameter that
market capitalization exceeding $1 billion. is used to generate that hash value.
The proof of work is the process of transaction
verification done in blockchain. 4. Hash: This is
the value obtained by passing the previous hash
value, the data and the nonce through the SHA-
256 algorithm; it is the digital signature of the
block. SHA-256 is a cryptographic hash algorithm
that produces a unique 256-bit alphanumeric
hash value for any given input, and that is the
unique feature of this cryptographic algorithm:
Whatever input you give, it will always produce a
256-bit hash.
A D V A N T A G E S O F
B L O C K C H A I N
•Immutability. Blockchain supports
immutability, meaning it is impossible to erase
or replace recorded data. Therefore, the
blockchain prevents data tampering within the
network.
• Transparency. Blockchain is decentralized,
meaning any network member can verify data
recorded into the blockchain. Therefore, the
public can trust the network.
• Censorship. Blockchain technology is free
from censorship since it does not have control C O N C L U S I O N
of any single party. Therefore, no single
Blockchain is a relatively new technology
authority (including governments) can interrupt
that is still not widespread in all industries but it is
the operation of the network.
slowly gaining more momentum. Once
Blockchain becomes more widespread, it could
D I S A D V A N T A G E S O F
become a powerful tool for the democratization of
B L O C K C H A I N
data that will encourage transparency and ethical
business tactics. And the applications of
• Speed and performance. Blockchain is
Blockchain in the world are only increasing with
considerably slower than the traditional
the result of faster transactions, more
database because blockchain technology
transparency, and security as well as reduced
carries out more operations.
costs. Who knows, Blockchain may change the
• High implementation cost. Blockchain is
world in the future! Bitcoin is the most known and
costlier compared to a traditional database.
valuable cryptocurrency. It is based on blockchain
Additionally, businesses need proper planning
technology that is intended to promote a trust
and execution to integrate blockchain into their
mechanism in a peer-to-peer network based on
process.
the consensus of the majority ofthe nodes.
• Data modification. Blockchain technology
does not allow easy modification of data once Authors :
recorded, and it requires rewriting the codes in
all of the blocks, which is time-consuming and
1. Siddhi Vaishnav
expensive. The downside of this feature is that 2. Vedanti Yerawar
it is hard to correct a mistake or make any
necessary adjustments.
DIGITAL TWIN
I N T R O D U C T I O N

A digital twin is a digital representation


of a physical object, process, service or
environment that behaves and looks like
its counterpart in the real-world.

A digital twin can be a digital replica


of an object in the physical world, such
as a jet engine or wind farms, or even
larger items such as buildings or even
whole cities, alternatively digital twin
technology can be used to replicate
processes in order to collect data to
predict how they will perform.
The life of a digital twin begins with
A digital twin is, in essence, a computer experts in applied mathematics or data
program that uses real world data to create science researching the physics and
simulations that can predict how a product operational data of a physical object or
or process will perform. These programs system in order to develop a mathematical
can integrate the internet of things (Industry model that simulates the original.
4.0), artificial intelligence and software The developers who create digital twins
analytics to enhance the output. ensure that the virtual computer model can
receive feedback from sensors that gather
With the advancement of machine data from the real world version. This lets the
learning and factors such as big data, digital version mimic and simulate what is
these virtual models have become a happening with the original version in real time,
staple in modern engineering to drive creating opportunities to gather insights into
innovation and improve performance. performance and any potential problems.A
digital twin can be as complex or as simple as
In short, creating one can allow the you require, with differing amounts of data
enhancement of strategic technology determining how precisely the model simulates
trends, prevent costly failures in physical the real world physical version.
objects and also, by using advanced The twin can be used with a prototype to
analytical, monitoring and predictive offer feedback on the product as it is
capabilities, test processes and services. developed or can even act as a prototype in
its own right to model what could occur with a
physical version when built.

H O W D O E S D I G I T A L
T W I N T E C H N O L O G Y
W O R K ?
The concept of digital twins was first put This allows companies to develop the most
forward by David Gelernter’s 1991 book efficient production methodology. You can
‘Mirror Worlds,’ with Michael Grieves of the further optimize the process using product
Florida Institute of Technology going on to twins that correspond with every piece of
apply the concept to manufacturing. equipment involved. This helps companies
perform preventative maintenance, avoiding
By 2002, Grieves had moved to the costly downtimes. Manufacturing operations
University of Michigan when he formally are made safer, faster and more efficient.
introduced the digital twin concept at a
Society of Manufacturing Engineers
conference in Troy, Michigan.
System twins are copies of entire systems
(e.g., a factory). They collect massive amounts
However, it was NASA who first embraced
of operational data produced by devices and
the digital twin concept and, in a 2010
products in the system, gain insights and
Roadmap Report, John Vickers of NASA
create new business horizons to optimize all
gave the concept its name. The idea was
the processes and support the system’s
used to create digital simulations of space
integrity.
capsules and craft for testing.

The digital twin concept spread further still in


2017, when Gartner named it as one of the
top 10 strategic technology trends. Since
then, the concept has been used in an ever-
growing array of industrial applications and
processes.

T Y P E S O F D I G I T A L
T W I N

Product twins simulate separate objects. For


instance, manufacturers use a virtual W H E N T O U S E I T
prototype of a certain product before setting
up a production line to analyze how it will Digital twin can be broken down into three
perform under various conditions, and what broad types, which show the different times
issues may occur. This allows them to make when the process can be used:
necessary adjustments and create a more
efficient design of goods. Afterward, product Digital Twin Prototype (DTP) - This is
twins can be used to control product undertaken before a physical product is
performance in the physical world. created

Digital Twin Instance (DTI) – This is done


once a product is manufactured in order
Process twins are responsible for the to run tests on different usage scenarios
simulation of processes; for example,
manufacturing processes. In a virtual Digital Twin Aggregate (DTA) – This gathers
environment, you can create various DTI information to determine the capabilities
scenarios of a production process to see what of a product, run prognostics
will happen in different situations. and test operating parameters
D I G I T A L T W I N V S . To do so, the asset is equipped with
S I M U L A T I O N sensors and tracking devices that can
transmit data to an IoT platform where it will
be visualized and analyzed.
The terms simulation and digital twin are
often used interchangeably, but they are
different things. A simulation is designed with
a CAD system or similar platform, and can be
put through its simulated paces, but may not
have a one-to-one analog with a real physical
object.
A digital twin, by contrast, is built out of
input from IoT sensors on real equipment,
which means it replicates a real-world
system and changes with that system over
time. Simulations tend to be used during the
design phase of a product's lifecycle, trying
to forecast how a future product will work,
whereas a digital twin provides all parts of
the business insight into how some product
or system they're already using is working
now.
C O N C L U S I O N
H O W A R E D I G I T A L The growth in Digital Twin use has
T W I N S C R E A T E D seen a shift in recent years, facilitated by
an increase in the number of published
papers and industry leaders investing
Data collection - First of all, researchers heavily in developing Digital Twin
have to aggregate a variety of data about an technology. It would not be possible
asset: physical properties, appearance, without the same growth in the AI, IoT
behavior under certain conditions, cooperation and IIoT fields, which are becoming key
with other assets and more. enablers for Digital Twins.

Modeling - Using the gathered data and AI is becoming a component within


modeling software, engineers create a Digital Twins and exploring where these
mathematical model that accurately reflects all algorithms can be applied is another
the specifics of its real-world counterpart. The avenue of open research. The effects of
model has an identical appearance to the AI combined with Digital Twin are topics
corresponding object, including all minor amongst the publications but on a small
details, and behaves in the same way as the scale. The exciting and inevitable future
original object. AR, virtual reality and 3D research will explore scaling up smaller
technologies help with visualization. successful Digital Twin and AI projects.

Integration - Finally, you need to integrate


your asset with its digital model to enable Author:
continuous monitoring in real time.
1.Savani Sonawane
2.Siddhi Borse
3.Dakshayani Vaishnav
M E T A V E R S E
A B O U T M E T A V E R S E

Metaverse is a virtual space in which user


can interact with a computer-generated
environment and other users.The internet will
eventually evolve into the metaverse, which will
come to represent the next major computing
platform. combination of augmented, virtual and
mixed reality can be metaveraei What is the
Metaverse and Where Did the Concept Come
From The Metaverse can be traced back to
Neal Stephenson and his dystopian cyberpunk
novel snow Crash.Which describes a virtual
reality dataspace called the matrix.Likekeny
place in Reality, the Street is subject to
development. Developers can build theirm own
all streets feeding off of the main one.
They can build buildings, parks, signs, as well
as things that do not exist in Reality.Mark
Zuckerberg, the CEO of the newly named Meta
(formerly Facebook), estimates it could take five
to 10 years before the key features of the
metaverse become mainstream.Aspects of the
metaverse currently exist. Ultra-fast broadband
F U T U R E O F M E T A V E R S E
speed, virtual reality headsets and persistent
always-on online words are already up and Today's Metaverse: Virtual reality as the
running, even though they may not be "digital escape". Over the next few years the
accessible to all.The Metaverse : Where We futuremetaverse would be something very
Are and Where We're Headed similar to our real world in many aspects and
even replace some real-world activities (like
-Zuckerberg recently told tech podcaster Lex working or hanging out).A lot of people think
Fridman: "We're gone desktop to web to mobile
that virtual reality is an illusion, that it's not real.
from text to photos to video. But this isn't the
But i say that it has casual power , it exists
end of th line," writes.
outside of our mind, and is not an illusion".
Although it lacks many of the components that
- Zuckerberd in a recent letter to his employees.
would make it a genuinely next-generation
"The next platform will be even more
immersive-an embodied internet where you're digital experience, exciting use cases and
in the experience, not just looking at it. We call applications are already being seen in areas
this the metaverse, and it will touch every such as Augmented Reality (AR), Virtual
product we build". Reality (VR), 3D social media platforms,
blockchain-based marketplaces, and many
others.
M E T A V E R S E P U R P O S E
The metaverse project is a virtual
world designed to bring users together as
in real life, as they can meet and interact
with each other. It is a virtual universe
where users can use avatars that
represent their personality and wishes.
The metaverse project is a virtual version
of real life except that you can do
whatever you want. In this world, it is
possible to do activities that we usually do
in the real world such as skydiving or
shopping for example.
The design of the metaverse aims
to have a virtual universe where everyone
can interact as in the real world. Thus,
players will be able to make purchases or M E T A V E R S E
trade in this world. It adds prestige and S I G N I F I C A N C E
value to this universe. The metaverse is
even economically independent. Indeed, it The metaverse is the result of over 30 years
is not uncommon for users of the platform of technological progress. It required ubiquitous
to make trades (sales and purchase) high-speed internet access. The larger culture
using real money to trade in the needed to be familiar with concepts popularized
metaverse.The Metaverse is a spatial by video games, such as moving in virtual
computing platform that provides digital environments. And, of course, both standard and
experiences as an alternative to or replica graphical processing units are required to evolve
of the real world,along with its key to their current impressive state. Finally, display
civilizational aspects. technologies used in virtual and augmented
reality needed to become lightweight enough to
feel natural when worn.

VR HEADSETS
VR headsets have exploded in popularity
over the past few years. This is hardly a
surprise, given that VR gaming, the
metaverse, and similar technologies have
also become so popular. VR headsets are
one of the best ways to experience these new
cutting-edge attractions. You’ll soon find out
which virtual reality headsets can best fit your
particular needs.A VR consists of sensors to
track your field of vision and two screens that
provide a stereoscopic display.
M E T A V E R S E
I M P O R T A N C E -

The Metaverse is not a single system


but a collection of interconnected systems,
each with its own rules and capabilities. It is
made up of interconnected worlds that are
not limited by geographical boundaries,
meaning that technically everyone with an
internet connection and the right setup can
have access to it.
The Metaverse is the next evolution of the
internet and is changing how we live, work, C O N C L U S I O N
and play forever.Moreover, the metaverse is
Metaverse technology is far more advanced
important because it allows people to interact
than virtual reality, as per the detailed report of
with others that they may never have had the
differences between the Metaverse vs. virtual
chance to, in a setting, they may not be able
reality. Virtual reality is practically one of the basic
to visit. For example, if you work remotely
automation for the advancement of the Metaverse.
from home in California, but your employer’s
It grants the consumers to be a part of the
office is located in New York, you can use
metaverse universe. Nevertheless, high-tech VR
the metaverse to sit in the same office, in a
still has limited power leading to a fixed number of
shared virtual spaceThe metaverse also
efficient components.
allows for a more immersive experience in
entertainment, education, and other forms of
The Metaverse, on the other hand, is a vast
content all through virtual reality. The virtual
and rapidly expanding virtual environment that
environment enables people to communicate
would be a 3D depiction of the internet and the
with others, share ideas, and create content
real virtual world. Users may navigate around
easily.
virtual 3D environments in the Metaverse in the
same way they can browse through different
websites. Most essential of all, there is no end to
the potential of supporting advanced technologies
in the Metaverse.

Author:
1.Atharva Kanthak
2.Sneha Bhalerao
3.Renuka Patil
WIRELESS NETWORK
SYSTEM
A B S T R A C T
Computer networks that are not connected
by cables are called wireless networks. They
generally use radio waves for communication
between the network nodes. They allow devices
to be connected to the network while roaming
around within the network coverage.
A wireless network refers to a computer
network that makes use of Radio Frequency
(RF) connections between nodes in the network.
Wireless networks are a popular solution for
homes, businesses, and telecommunications
networks.

I N T R O D U C T I O N A P P L I C A T I O N S O F W S N :

There are more subtle technology differences


Internet of Things (IoT)
that come in to play between wired and wireless.
Surveillance and Monitoring for security,
Most modern wired networks are now “full
threat detection
duplex”, meaning that they can be
Environmental temperature, humidity, and
transmitting/receiving packets in both directions
air pressure
simultaneously. In addition, most wired
Noise Level of the surrounding
networks have a dedicated cable that runs to
Medical applications like patient monitoring
each end user device.
Agriculture
Landslide Detection
In a Wi-Fi network, the medium (the radio
frequency being used for the network) is a
shared resource, not just for the users of the C H A L L E N G E S O F W S N :
network, but often for other technologies as well WLAN Access Point:
(Wi-Fi operates in what are called ‘shared’ It receives the data which is sent by the
bands, where many different electronic devices Radio nodes wirelessly, generally through the
are approved to operate). This has several internet.
implications: 1) unlike a wired network, wireless Evaluation Software:
can’t both talk and listen at the same time, it is The data received by the WLAN Access
“half duplex” 2) All users are sharing the same Point is processed by a software called as
space must take turns to talk 3) everyone can Evaluation Software for presenting the report to
‘hear’ all traffic going on. This has forced Wi-Fi the users for further processing of the data
networks to implement various security which can be used for processing, analysis,
measures over the years to protect the storage, and mining of the data.
confidentiality of information passed wirelessly.
H O W D O E S W I - F I
N E T W O R K W O R K ?

A Wi-Fi based wireless network sends


signals using radio waves (cellular phones and
radios also transmit over radio waves, but at
different frequencies and modulation).

In a typical Wi-Fi network, the AP (Access


Point) will advertise the specific network that it
offers connectivity to. This is called a Service
Set Identifier (SSID) and it is what users see
when they look at the list of available networks
on their phone or laptops. The AP advertises
this by way of transmissions called beacons.
The beacon can be thought of as an
announcement saying “Hello, I have a network
Assuming all goes well, we come to the part
here, if it’s the network you’re looking for, you
that is the end user’s ultimate goal: passing data.
can join”.
Data from the client (or from the AP to the client)
is converted from digital data into an RF
A client device receives the beacon
modulated signal and transmitted over the air.
transmitted by the AP and converts the RF
When received, this is de-modulated, converted
signal into digital data, then that data is passed
back to digital data, and then forwarded along to
along to the device for interpretation. If the
its destination (often the internet or a resource on
user wants to connect to the network, it can
the larger internal network).
send messages to the AP trying to join and
(when security is enabled) providing the proper
Wi-Fi communication is only approved to
credentials to prove they have the right to join.
transmit on specific frequencies, in most parts of
These processes are known as Association &
the world these are the 2.4 GHz and 5 GHz
Authentication. If either of these fail, the
frequency bands, although many countries are
device will not successfully join the network
now adding 6GHz frequencies as well. These
and will be unable to further communicate with
frequency bands are not the same that cellular
the AP.
networks use, so cell phones and Wi-Fi are not in
competition for use of the same frequencies.
However that does not mean that there are not
other technologies that can operate in these
bands. In the 2.4GHz band in particular there are
many products, including Bluetooth, ZigBee,
cordless keyboards, and A/V equipment just to
name a small subset that does use the same
frequencies and can
Wi-Fi communication is only approved to
transmit on specific frequencies, in most parts
of the world these are the 2.4 GHz and 5 GHz
frequency bands, although many countries are
now adding 6GHz frequencies as well. These
frequency bands are not the same that cellular
networks use, so cell phones and Wi-Fi are
not in competition for use of the same
frequencies. However that does not mean that
there are not other technologies that can
operate in these bands. In the 2.4GHz band in
particular there are many products, including
Bluetooth, ZigBee, cordless keyboards, and
A/V equipment just to name a small subset
that does use the same frequencies and can

D I S A D V A N T A G E S O F W N S :

A D V A N T A G E S O F W N S :
Limited range: The range of wireless
communication in WSNs is limited, which can
be a challenge for large-scale deployments or
Low cost: WSNs consist of small, low-
in environments with obstacles that obstruct
cost sensors that are easy to deploy,
radio signals.
making them a cost-effective solution for
many applications.
Limited processing power: WSNs use low-
power devices, which may have limited
Wireless communication: WSNs
processing power and memory, making it
eliminate the need for wired connections,
difficult to perform complex computations or
which can be costly and difficult to install.
support advanced applications.
Wireless communication also enables
flexible deployment and reconfiguration of
Data security: WSNs are vulnerable to
the network.
security threats, such as eavesdropping,
tampering, and denial of service attacks,
Energy efficiency: WSNs use low-power
which can compromise the confidentiality,
devices and protocols to conserve energy,
integrity, and availability of data.
enabling long-term operation without the
need for frequent battery replacements.
Interference: Wireless communication in
WSNs can be susceptible to interference from
Scalability: WSNs can be scaled up or
other wireless devices or radio signals, which
down easily by adding or removing
can degrade the quality of data transmission.
sensors, making them suitable for a range
of applications and environments.
Deployment challenges: Deploying WSNs
can be challenging due to the need for proper
Real-time monitoring: WSNs enable
sensor placement, power management, and
real-time monitoring of physical
network configuration, which can require
phenomena in the environment, providing
significant time and resources.
timely information for decision making and
control.
TYPES OF WIRELESS MAN
NETWORK CONNECTIONS A metropolitan-area network is a computer
network that spans across a city, small
geographical area, or business or college
In addition to a LAN, there are a few other campus. One feature that differentiates a MAN
types of common wireless networks: personal- from a LAN is its size. A LAN usually consists of a
area network (PAN), metropolitan-area solitary building or area. A MAN can cover
network (MAN), and wide-area network several square miles, depending on the needs of
(WAN). the organization.

LAN
A local-area network is a computer Large companies, for example, may use a
network that exists at a single site, such as an MAN if they have a spacious campus and need to
office building. It can be used to connect a manage key components, such as HVAC and
variety of components, such as computers, electrical systems.
printers, and data storage devices. LANs
consist of components like switches, access
points, routers, firewalls, and Ethernet cables WAN
to tie it all together. Wi-Fi is the most A wide-area network covers a very large
commonly known wireless LAN. area, like an entire city, state, or country. In fact,
the internet is a WAN. Like the internet, a WAN
PAN can contain smaller networks, including LANs or
A personal-area network consists of a MANs. Cellular services are the most commonly
network centralized around the devices of a known wireless WANs.
single person in a single location. A PAN
C O N C L U S I O N
could have computers, phones, video game
consoles, or other peripheral devices. They
are common inside homes and small office In conclusion, wireless network systems
buildings. Bluetooth is the most commonly have transformed the way we live and work,
known wireless PAN. and their potential for innovation and growth is
limitless. As technology continues to advance,
wireless networks will continue to play a critical
role in powering the future of connectivity,
enabling new applications, and shaping the
way we interact with the digital world. It is
imperative to invest in research, development,
and standards to further enhance the
capabilities of wireless networks and unlock
their full potential for the benefit of society at
large.

Author:
1.Harshad Shelke
2.Siddhi Khandarkar
3.Gargi Wawre
4.Pritam Aher
THE RISE OF LOW-CODE DEVELOPMENT
PLATFORMS: HOW THEY ARE CHANGING
THE SOFTWARE DEVELOPMENT
LANDSCAPE

I N T R O D U C T I O N
The article discusses the rise of
low-code development platforms and how
they are changing the software
development landscape. These platforms
offer a visual interface that enables
developers to build applications at a
faster pace, with fewer resources, and at
a lower cost, compared to traditional
software development methods. Low-
code development platforms democratize
software development and improve
collaboration between business
stakeholders and developers, resulting in
better-designed applications that meet
business needs more effectively
However, there are also some challenges
that organizations need to be aware of,
such as limited customization, vendor
lock-in, and security concerns. Overall,
low-code development platforms offer
significant benefits to organizations
looking to build applications at a faster
pace and at a lower cost.
W H A T I S L O W - C O D E ?
In recent years, the software
development landscape has undergone a A software development approach that
significant transformation, thanks to the requires minimal hand-coding i.e, it uses the
emergence of low-code development GUI with little coding for software
platforms. These platforms have enabled development.
developers to build applications at a
faster pace, with fewer resources, and at There are several platforms that provide users
a lower cost, compared to traditional with low-level coding like –
software development methods.Low-code
development platforms offer a visual Quickbase, ZohoCreator, Oracle APEX,
interface that enables developers to drag- Mendix ,Salesforce lightning,Airtable,
and-drop pre-built components and Kissflow Low Code, Appian,
integrate them into the application. This OutSystems etc.
approach to development is often referred
to as model-driven development..
B E N E F I T S O F L O W - C O D E
D E V E L O P M E N T P L A T F O R M S

Low-code development platforms offer


several benefits to organizations looking to
build applications.
Here are some of the most significant
advantages:
1. Faster Time to Market: Low-code
development platforms allow developers
to build applications at a much faster
pace compared to traditional software
development methods. The visual
interface and pre-built components
eliminate the need for developers to
write code from scratch, which
significantly reduces the development
time. I M P A C T O F L O W - C O D E
2. Lower Costs: Building applications using D E V E L O P M E N T P L A T F O R M S
low-code development platforms requires
Low-code development platforms are
fewer resources, which means lower
changing the software development landscape in
development costs. By reducing the
several ways. :
need for manual coding, companies can
1. Democratization of Software Development:
lower the number of developers required
Low-code development platforms are making
to build an application, leading to a
it possible for non-technical stakeholders to
significant reduction in development
build applications. This democratization is
costs.
reducing the reliance on developers, resulting
3. Increased Collaboration: Low-code
in more innovative solutions as individuals
development platforms enable business
from different business functions bring their
stakeholders to work together more
perspectives to the application development
effectively. The visual interface and pre-
process.
built components make it easy for
2. Improved Collaboration: Low-code
stakeholders to provide feedback,
development platforms are empowering
resulting in more effective collaboration
business stakeholders to become more
between developers and business
involved in the development process,
stakeholders.
resulting in more efficient and effective
4. Better Agility: Low-code development
collaboration. This approach is leading to
platforms enable developers to quickly
better-designed applications that meet
make changes to the application as per
business needs more effectively.
changing business needs. This agility is
3. Increased Speed of Innovation: Low-code
critical in today's fast-paced business
development platforms enable developers to
environment.
build applications at a faster pace, resulting in
a quicker time to market. This speed of
innovation is giving companies a competitive
edge in the marketplace.
C H A L L E N G E S O F L O W - C O D E
D E V E L O P M E N T P L A T F O R M S

While low-code development platforms


offer several benefits, there are also some
challenges that organizations need to be
aware of. Here are some of the most
significant challenges:
1. Limited Customization: Low-code
development platforms are best suited for
building applications that require standard
functionality. For applications that require
extensive customization, developers may
still need to write custom code.
2. Vendor Lock-in: Organizations that use
low-code development platforms are often
dependent on the vendor for ongoing
support and maintenance. This C O N C L U S I O N
dependence may make it challenging for
organizations to switch to a different Low-code development platforms are
platform in the future. transforming the software development
3. Security Concerns: Low-code landscape by offering a more efficient, cost-
development platforms often require effective, and collaborative approach to
developers to share access to the building applications. Organizations that use
platform, which may raise security low-code development platforms can benefit
concerns. Organizations need to ensure from a faster time to market, reduced
that adequate security measures are in development costs, improved collaboration,
place to protect their data and
and better agility. While there are challenges
applications.
that organizations need to be aware of, low-
code development platforms are likely

Author:
1.Aaditya Dhondkar
2.Gaurang Khanderay
3.Yogesh Palode
ROBOTICS
R O B O T I C S :

Robotics is a branch of engineering


that involves the conception, design,
manufacture and operation of robots. The
objective of the robotics field is to create
intelligent machines that can assist
humans in a variety of ways.
Robotics can take on a number of
forms. A robot may resemble a human, or
it may be in the form of a robotic
application, such as robotic process
automation (RPA), which simulates how
humans engage with software to perform
repetitive, rules-based tasks.
While the field of robotics and
exploration of the potential uses and
functionality of robots have grown
substantially in the 20th century, the idea
is certainly not a new one.

HISTORY OF ROBOTICS
The term robotics is an extension of
the word robot.One of its first use came
By 2040 computing power should make third-
from Czech writer Karel Čapek, who
generation robots withmonkeylike minds
used the word in his play,Rossum's
possible. Such robots would learn from mental
Universal Robots, in 1920.
rehearsalsin simulations that would model
Perhaps about the year 2020 the
physical, cultural, and psychologicalfactors.
process will have produced the first
broadly competent “universal robots” with
lizardlike minds that can be programmed
for almost any routine chore.
By 2030 second-generation robots
with trainable mouselike minds may
become possible. . Besides application
programs, these robots may host a suite
of software “conditioning modules” that
generate positive- and
negativereinforcement signals in
predefined i crcumstances.
Robots have a wide range of uses and
applications across different industries and
fields including:
Manufacturing and production: Robots
are widely used in the manufacturing sector
for tasks such as assembly, inspection, and
packaging. They can work in hazardous or
repetitive environments, reducing the risk of
injury to human workers and increasing
productivity.
Healthcare: Robots are used in the
healthcare for various purposes, such as
assisting in surgery, rehabilitation, and
elderly care. For example, surgical robots
can perform precise movements and reduce
the risk of human error during operations. A D V A N T A G E
Agriculture: Agricultural robots are used
There are several advantages of robotics,
for tasks such as planting, harvesting, and
some of which are:
monitoring crops. They can help
1. Precision: Robots can perform tasks with high
increase efficiency and reduce the need for
precision, accuracy, and repeatability that is
manual labor in agriculture.
difficult for humans to achieve.
Retail and logistics: Retail and logistics
They can carry out tasks with consistent quality
robots are used for tasks such as inventory
and precision without getting
management, order fulfillment, and
tired or making mistakes.
customer service. They can help increase
2. Efficiency: Robots can work continuously
efficiency and reduce costs in these
without taking breaks or getting tired, leading to
industries.
increased productivity and efficiency. They can
Space exploration: Robots are used for
also perform tasks that are too dangerous or
space exploration, including missions to
tedious for humans to undertake.
Mars and other planets. They can
3. Cost Savings: Robots can help organizations
perform tasks such as collecting and
reduce labor costs by automating various tasks.
analyzing data, drilling for samples, and
They can also help reduce production costs by
mapping the terrain.
minimizing scrap and rework.
Search and rescue: Robots are used in
4. Flexibility: Robots can be programmed to
search and rescue operations, where they
perform a wide range of tasks, making them
can access dangerous or difficultto-reach
highly
areas to search for survivors or provide
adaptable to changing production needs. They
assistance
can also perform tasks in hazardous or difficult-
Military: Robots are used in military
toreach areas.
operations for tasks such as
reconnaissance, surveillance, and bomb
disposal.
D I S A D V A N T A G E S :

1. High Cost: One of the major


disadvantages of robotics is the high cost of
design, manufacturing, and
implementation. The advanced robotics
technology is expensive in every aspect,
from purchasing to maintenance,
and requires a significant financial
investment.
2. Lack of Flexibility: Robots are designed
to perform specific tasks, and are not easily
adaptable when it comes to new, non-
standard jobs. They need to be
reprogrammed or redesigned to make
changes within their function,
unlike human workers who can easily adapt
to new challenges. C O N C L U S I O N
3. Job Loss: The rise of robotic technology
Today we find most robots working for
has led to a decrease in job opportunities
people in industries, factories, warehouses,
for human workers, particularly in industries
and laboratories. Robots are useful in many
such as manufacturing, where robots can
ways. For instance, it boosts economy
perform tasks more efficiently and for longer
because businesses need to be efficient to
hours without
keep up with the industry competition.
fatigue.
Therefore, having robots helps business
4. Technical Issues: Robotics systems are
owners to be competitive, because robots can
complex and require a high level of
do jobs better and faster than humans can,
technical expertise to design, develop,
e.g. robot can built, assemble a car. Yet robots
and repair.
cannot perform every job; today robots roles
include assisting research and industry.
Finally, as the technology improves, there will
be new ways to use robots which will bring
new hopes and new potentials.

Author:
1.Arya Dandnaik
2.Shivani Khanderay
CLOUD COMPUTING
C L O U D C O M P U T I N G

Cloud computing is a relatively new


approach in the field of information
technologies. It involves storing and
accessing data and applications over the
internet, rather than through a physical
server or computer. As one of its core
implementations, cloud technology has
gained a lot of attention in recent years. It
represents the very core of modern IT
infrastructure and development. This
article is meant to provide a brief
introduction to the fundamental concepts
of cloud computing, including its key
components and benefits.

I N T R O D U C T I O N

Cloud computing and its associated


technologies have begun to shape and
define new aspects in the computer science E S S E N T I A L S -
and information technology fields. The need Cloud computing is a digital technology
for flexible and scalable computing designed to work as a flexible and scalable
resources has been growing rapidly, and in computing infrastructure that allows for the
the past decade, cloud computing has exchange of data and applications over a
emerged as a viable solution. network that is not reliant on any central
While there are still debates about the authority, such as a government or bank, to
best ways to use cloud technology and its uphold or maintain it.
potential risks, one thing is certain: it has It is a decentralized system for processing
brought something revolutionary to the and storing data, eliminating the need for
world, and it is up to the users to decide how traditional intermediaries, such as physical
to leverage it. servers, when resources are being used
Some will take advantage of cloud between two entities. Individual data ownership
computing to develop their own applications records are stored in a digital ledger, which is a
for solving various problems in society, while computerized database using strong
others will invest in cloud-based solutions or cryptography to secure transaction records,
simply use cloud services to improve their control the creation of additional data, and
business operations. verify the transfer of data.
Despite its name, cloud computing is
not considered to be computing in the
traditional sense, and while varying
treatments have been applied to it, including
classification as a service, platform, and
infrastructure, cloud computing is generally
viewed as a distinct technology class in
practice. Some cloud schemes use
validators to maintain the infrastructure. In a
pay-as-you-go model, users pay for the
computing resources they use on a per-use
basis. Generally, these users get additional
computing resources over time via network
upgrades, software updates, or other such
reward mechanisms. Cloud computing does
not exist in physical form (like a computer or
server) and is typically not controlled by a
central authority. Cloud computing typically
uses decentralized control as opposed to a
centralized server model. When a cloud C L O U D C O M P U T I N G
infrastructure is set up, it can be considered T E C H N O L O G Y
centralized if managed by a single provider.
Cloud computing is a type of computing
When implemented with decentralized
model that relies on a network of remote servers
control, each cloud infrastructure works
hosted on the internet to store, manage, and
through distributed technology, typically a
process data. It eliminates the need for local
network of interconnected servers, that
servers and physical storage devices. Cloud
serves as a public computing resource
computing offers several advantages, including
database. Traditional computing models, as
cost savings, scalability, and flexibility.
well as technological factors, have modest
There are three main types of cloud
exposures to cloud computing returns. The
computing: public, private, and hybrid. Public
first mainstream cloud provider was
clouds are owned and operated by third-party
Amazon Web Services, which was first
providers, while private clouds are managed by
released as a public service in 2006. As of
the organization that uses them. Hybrid clouds
March 2022, there were more than 100
combine elements of both public and private
cloud providers in the marketplace, of which
clouds. The key components of cloud computing
more than 10 had a market share exceeding
are virtualization, software-defined networking,
$1 billion.
and automation. Virtualization enables multiple
operating systems to run on a single physical
machine, while software-defined networking
allows for more flexible and efficient network
management. Automation streamlines processes
and reduces manual labor, making it easier to
manage large-scale cloud infrastructure.
"There is no cloud it is just someone else's
computer."
S E C U R I T Y
C O N S I D E R A T I O N S

As more organizations migrate their


data and applications to the cloud,
ensuring the security of these resources
has become a top priority. While cloud
providers typically have robust security
measures in place, customers still need to
take steps to ensure the security of their
data and applications. One of the key
considerations for securing data and
applications in the cloud is implementing
strong access controls, which includes
limiting access to only those who need it,
using strong passwords or two-factor
authentication, and regularly reviewing
access logs to identify potential security C O N C L U S I O N
risks. Another important step is encrypting
Moving on to cloud computing, it is a model
sensitive data both in transit and at rest,
of providing on-demand access to shared
which can help protect data from
computing resources over the internet. It enables
interception or theft, even if it falls into the
users to access data, applications, and services
wrong hands. In addition to access
from anywhere in the world, without the need for
controls and encryption, organizations
physical hardware. There are several benefits of
should also monitor for potential security
cloud computing such as scalability, cost-
breaches, including regularly reviewing
effectiveness, flexibility, and increased efficiency.
logs and network traffic to identify
Cloud computing can be categorized into three
potential threats.
main service models: Infrastructure as a Service
(IaaS), Platform as a Service (PaaS), and
Software as a Service (SaaS).
Cloud computing is widely used in businesses
of all sizes, from startups to large enterprises,
due to its ability to offer cost-effective solutions
for data storage, processing, and management.
With the increasing adoption of cloud computing,
it is expected that it will continue to revolutionize
the way businesses operate and deliver services
to their customers.

Authors :
1. Piyush Holkar
2. Shubham Jadhav
3. Ishan Chipate
4. Mayur Pandit
R E F R E N C E S

https://papers.ssrn.com/sol3/papers.cfm? https://www.twi-global.com/technical-
abstract_id=3798877 knowledge/faqs/simulation-vs-digital-twin

https://www.redhat.com/en/topics/devops https://www.altexsoft.com/blog/digital-twins/

https://www.altexsoft.com/blog/engineering/d https://www.fisdom.com/what-is-metaverse-
evops-principles-practices-and-devops- all-you-need-to-know-about-metaverse/
engineer-role/
https://www.mendix.com/low-code-guide/
https://www.twi-global.com/technical-
knowledge/faqs/what-is-digital-twin https://www.futurelearn.com/info/courses/begi
n-robotics/0/steps/2845
https://ieeexplore.ieee.org/document/834554
7

https://www.investopedia.com/metaverse-
definition-5206578

https://www.fortinet.com/cn/resources/cybergl
ossary/wireless-network

https://azumo.com/insights/the-rise-of-low-
code-and-no-code-development-platforms-
how-they-are-revolutionizing-the-software-
development

https://www.techtarget.com/whatis/definition/r
obotics#:~:text=Robotics%20is%20a%20bran
ch%20of,on%20a%20number%20of%20form
s.

https://www.investopedia.com/terms/c/cryptoc
urrency.asp

https://www.simplilearn.com/tutorials/blockch
ain-tutorial/what-is-cryptocurrency

https://www.zdnet.com/article/what-is-cloud-
computing-everything-you-need-to-know-
about-the-cloud/r
B its &
ytes

TECHNICAL
MAGAZINE
2022 - 2023 ISSUE - 1

B its &
ytes
Presented by
Computer Department

You might also like