CodeByte

Write your code smartly

Category Archives: Computer

Generate Database Script from SQL Server for SQL Azure

Hello,

Today I am going to guide you about how to create database script in SQL Server 2008 above to simply let it work on SQL Azure. SQL Azure implements different rules to work with the databases including Primary Key constraint is mandatory for every table. Before running the script on SQL Azure make sure you have created a Primary Key in each table of database. The Screenshots below will help you to create the SQL database script for SQL Azure.
The First step is to right-click on the database you want to make script of for SQL Azure.

post1Secondly, Going onto tasks and click Generate Scripts

post2Generate Scripts will launch the Generate and publish scripts window. Press next and then again next. After that provide the location where to generate script and click on “Advance” button. Scroll to the property “script for the database engine type” and select SQL Azure from there, as shown below

post3 post4 Press Ok and press next after that and again next, then finish. The script will be generated for SQL Azure which you directly paste in the SQL Azure new query window under a Database you already have created on Windows Azure.

For more queries regarding Windows Azure, SQL Azure , feel free to contact at addresses below

Email: jkhan@programmer.net

Skype: jibrankhan1990

Get Current Location of Windows Phone Device

Hello,

Today this post will give you an idea about , how you can get the current location of your Windows Phone device. This can be easily achieved by using `GeoCoordinateWatcher` class under the namespace using System.Device.Location;
Here is the code by which you can get the Longitude and Latitude values of the device location.geoimage

This code gets the current position of Windows Phone device in the form of Longitude and Latitude. Using these values, many different Location features can be implemented such as distance finding between two locations , mapping the location on Bing and Google maps and more.

For any further query you can contact on below addresses:

Email: jkhan@programmer.net

Skype: jibrankhan1990

Configure your PC for Blackberry Development

Hi, today I am  going to guide you about how can you configure your system for developing Blackberry applications.

First of all you need Java Development Kit to run Eclipse on your system and it can be downloaded from here.

Try to Install Java development Kit in the directory without spaces in between their names like C:\Java or something similar.

Once you installed the JDK you must configure you environment variables pointing to your Java folder like this.

Go to

System Properties ==>Advance System Properties==> Environment Variables==> In the bottom list select New==> Provide the variable name "JAVA_HOME" without quotation marks

Provide the value by putting the full path to the JAVA folder where you have installed the JDK version. I have mentioned above that if you installed it in drive C root then variable value will be C:\Java\jdk 1.7.0 (install at least 1.6.0 and replace the value I have written with your version).

Now you are done with it. You need to download the Blackberry Plugin for Eclipse from here.

Simply install the “exe” file on your system. Run the Plugin from the desktop if you have allowed the shortcut to be at desktop.

Select File ==> New==>Project==> Blackberry Project==>Next==>Give Project Name==>Next==>Next==>Select Hello Blackberry Template==>Finish.

Once you create your project , run the application from top green circle button. The simulator will be launched and you app icon will be displayed on the mobile desktop. Click on it and see your demo application running.

I hope this helped you and you soon will start blackberry apps development. Happy Coding!

Policy-Based Security Management in MANETs

Abstract:

It’s a fact that internationally, Mobile Ad-hoc networks are gaining lot of progress and adaptation rate is increasing because of the fast growing rate of business. Data communication is the major thing every one look to acquire while interacting with each other so whenever wireless devices get together can make up a network for instantly changing information.  The wireless devices are not fixed at their places and having some other issues to handle during this network life. As MANETs are the open networks can be formed using two or more mobile devices therefore, it raises the challenge of network management. These mobile devices can easily run out of batteries and location can change any time. Also during these open network communications security issues can also rise like eavesdropping, spoofing and denial-of-service attacks. Therefore, it is the main challenge to trust the communicated node before changing information. Policies based network management is normally used in fixed environment of networks so it is another challenge to implement policies based network management is MANETs considering the security issues.

To access full paper please subscribe for free and send your email to get the paper.

ji_jibran1990@hotmail.com

 

Hyper Text Transfer Protocol

HTTP is a foundation of communication on internet considering a client-server model. It is used to transfer or exchange hypertext by building network using links called hyperlinks.

Client may be a browser and the website can be a server. The client request through a message using HTTP to the server which uses HTML and provides a response in the form of status of the request and it can be a content with a message or data.

A HTTP client sends a request by building a TCP connection and HTTP waits for a request, after receiving the request a response from the server is made to the client by which the request-response clock starts which make up a HTTP session. Unless a clock of request-response is not stopped a session is alive else it is killed.

A response can be a HTML web page which is displayed on the client browser.

Domain Name Servers

DNS is a system which is used by the computers and devices using internet to assign the IP addresses to the domain names. The Internet is based on the IP addresses therefore it requires that a domain name must me translated into IP address so it is easily located.

DNS works like a phone book as it assigns a IP address to a domain name so that computer can communicate to the domain selected. But unlike phone book it updates it self without effecting the end user.

When a system is connected to home network (ISP) it sends the information to router which assigns the network address which also includes the DNS information so that it can acknowledge when to translate the domain name to IP address.

It is easy to remember the alphabetical names of the domain such as http://www.example.com rather than the IP address such as  70.42.251.42.

You can avoid the look up process performed by the browser when you put in a domain name e.g http://www.google.com  (try it) by directly providing the IP address of that domain.

DNS translates these domain names using a huge database also assigning the time allocated for the domain name  hence there are multiple addresses are assigned to a single domain name.

File Transfer Protocol

FTP is used to transfer files and web pages to server over a TCP based network such as internet. FTP is used to upload and download files from the server to the simple client development machine. It has separate controls and connections using user name and password authentication to connect to server and upload and download files.

There are some FTPs which allows to enter the server without authentication of any username and password valid, therefore might verify for the email address but it makes un-secure way of connecting to the server.

DHCP( Dynamic Host Configuration Protocol)

DHCP is an automated method of assigning the addresses i.e IP addresses to the devices connected in a network which decreases the overhead of the manual work done by the network administrator. It has a central database of devices attached to the network and helps to avoid replica of the resource assignment to the devices.

The hosts that does not use DHCP for address assigning can still use DHCP to obtain other configuration information.

It is very useful even in small networks as it can easily add new machines to the network. When the computer or device tries to attach to a network the DHCP sends a query to the DHCP server to get the information of the client system such as default gateway, domain name, name servers. After receiving the valid information DHCP assigns the computer a address and the time it will be valid till including subnet mask.

It uses two ports , port 67 to send data to servers and port 68 to receive data to client. Its communication is connectionless in nature.

Design a site like this with WordPress.com
Get started