SlideShare a Scribd company logo
Activesync
What is Activesync
 Activesync technology is specifically designed for data
synchronization between windows mobiles and windows devices
 It was developed by Microsoft.
 Data transfer and Data Synchronization are different.
 Data Transfers just sends the data between the 2 devices. It won’t
check for data difference between 2 devices.
 Data Synchronization checks data difference between 2 devices
and sends only the differenced data , not entire data.
 Once Activesync service provider is installed and the required
registry entries are created ,your data will be synchronized
automatically between the desktop computer and the Windows
machine.
Activesync Architecture
Activesync Manager
 Activesync Manager is built into windows CE service.
 Activesync Manager takes care of many
synchronization like data synchronization between the
devices ,resolving conflicts between the device while
synchronizing the data.
Activesync Service Provider
 There are 2 modules in Activesync service Provider.
i) Desktop module
ii) Windows Based Device Module
 These modules usually Dynamic Link Libraries ( dll )
Activesync Naming Conventions
 In Activesync every item is called as “Object”
Ex: Contacts, emails, tasks...
 The Object type is the name for a group of
synchronization objects.
Ex:”appointment” for the set of appointments in Microsoft
Outlook
 Store contains all the objects for our application i.e.,
database or a file
Activesync working
 In order to synchronize the data, first we must define
Object, Object type, and store.
 Object must have 32-bit value, it must be unique, can
not be changed, can't be used ones it was deleted.
 An object synchronize the data based on version
number and last user time stamp.
 Application enumerate the objects consistently by
converting an object into series of bytes for
transmission.

More Related Content

Viewers also liked

Medical helicopters
Medical helicoptersMedical helicopters
Medical helicopters
Martin Gòmez-Palacio Duarte
 
3 web design
3 web design3 web design
3 web design
Mahbubur Rahman
 
PSUT Wireless Routers Distribution's Presentation
PSUT Wireless Routers Distribution's PresentationPSUT Wireless Routers Distribution's Presentation
PSUT Wireless Routers Distribution's Presentation
HassanMusleh
 
Mocha Raspberry Pi hacking - Stephen Chin
Mocha Raspberry Pi hacking - Stephen ChinMocha Raspberry Pi hacking - Stephen Chin
Mocha Raspberry Pi hacking - Stephen Chin
jaxconf
 
Death of the library website redesign
Death of the library website redesignDeath of the library website redesign
Death of the library website redesign
tallgood
 
Top ESXi command line v2.0
Top ESXi command line v2.0Top ESXi command line v2.0
Top ESXi command line v2.0
Concentrated Technology
 
Solutions mix sound systems
Solutions mix sound systemsSolutions mix sound systems
Solutions mix sound systems
yadavadevil
 
Specifying the behaviour of building automation systems
Specifying the behaviour of building automation systemsSpecifying the behaviour of building automation systems
Specifying the behaviour of building automation systems
João Aguiam
 
Behaviour Driven Development with Cucumber, RSpec, and Shoulda
Behaviour Driven Development with Cucumber, RSpec, and ShouldaBehaviour Driven Development with Cucumber, RSpec, and Shoulda
Behaviour Driven Development with Cucumber, RSpec, and Shoulda
drmanitoba
 
Website building
Website buildingWebsite building
Website building
rtimlett
 
Biz Case - IP Media Servers
Biz Case - IP Media ServersBiz Case - IP Media Servers
Biz Case - IP Media Servers
Videoguy
 
Implementation of the Laws for Restricting Use of Loudspeakers and High Volum...
Implementation of the Laws for Restricting Use of Loudspeakers and High Volum...Implementation of the Laws for Restricting Use of Loudspeakers and High Volum...
Implementation of the Laws for Restricting Use of Loudspeakers and High Volum...
sabrangsabrang
 
Penetration testing
Penetration testingPenetration testing
Penetration testing
Ashok Kumar
 
Trouble shooting Storage Area Networks for virtualisation deployments
Trouble shooting Storage Area Networks for virtualisation deploymentsTrouble shooting Storage Area Networks for virtualisation deployments
Trouble shooting Storage Area Networks for virtualisation deployments
Kevin Walker
 

Viewers also liked (14)

Medical helicopters
Medical helicoptersMedical helicopters
Medical helicopters
 
3 web design
3 web design3 web design
3 web design
 
PSUT Wireless Routers Distribution's Presentation
PSUT Wireless Routers Distribution's PresentationPSUT Wireless Routers Distribution's Presentation
PSUT Wireless Routers Distribution's Presentation
 
Mocha Raspberry Pi hacking - Stephen Chin
Mocha Raspberry Pi hacking - Stephen ChinMocha Raspberry Pi hacking - Stephen Chin
Mocha Raspberry Pi hacking - Stephen Chin
 
Death of the library website redesign
Death of the library website redesignDeath of the library website redesign
Death of the library website redesign
 
Top ESXi command line v2.0
Top ESXi command line v2.0Top ESXi command line v2.0
Top ESXi command line v2.0
 
Solutions mix sound systems
Solutions mix sound systemsSolutions mix sound systems
Solutions mix sound systems
 
Specifying the behaviour of building automation systems
Specifying the behaviour of building automation systemsSpecifying the behaviour of building automation systems
Specifying the behaviour of building automation systems
 
Behaviour Driven Development with Cucumber, RSpec, and Shoulda
Behaviour Driven Development with Cucumber, RSpec, and ShouldaBehaviour Driven Development with Cucumber, RSpec, and Shoulda
Behaviour Driven Development with Cucumber, RSpec, and Shoulda
 
Website building
Website buildingWebsite building
Website building
 
Biz Case - IP Media Servers
Biz Case - IP Media ServersBiz Case - IP Media Servers
Biz Case - IP Media Servers
 
Implementation of the Laws for Restricting Use of Loudspeakers and High Volum...
Implementation of the Laws for Restricting Use of Loudspeakers and High Volum...Implementation of the Laws for Restricting Use of Loudspeakers and High Volum...
Implementation of the Laws for Restricting Use of Loudspeakers and High Volum...
 
Penetration testing
Penetration testingPenetration testing
Penetration testing
 
Trouble shooting Storage Area Networks for virtualisation deployments
Trouble shooting Storage Area Networks for virtualisation deploymentsTrouble shooting Storage Area Networks for virtualisation deployments
Trouble shooting Storage Area Networks for virtualisation deployments
 

Similar to Activesync

Nsm overview
Nsm overviewNsm overview
Nsm overview
Ganesh Kumar Veerla
 
computer software (cont.)
computer software (cont.)computer software (cont.)
computer software (cont.)
Jelz JZ
 
Virtual Network Computing Based Droid desktop
Virtual Network Computing Based Droid desktopVirtual Network Computing Based Droid desktop
Virtual Network Computing Based Droid desktop
IOSR Journals
 
.NET,ASP .NET, Angular Js,LinQ
.NET,ASP .NET, Angular Js,LinQ.NET,ASP .NET, Angular Js,LinQ
.NET,ASP .NET, Angular Js,LinQ
Avijit Shaw
 
Password security system for websites
Password security system for websitesPassword security system for websites
Password security system for websites
Mike Taylor
 
Software engg. pressman_ch-10
Software engg. pressman_ch-10Software engg. pressman_ch-10
Software engg. pressman_ch-10
Dhairya Joshi
 
Communication Diagram
Communication DiagramCommunication Diagram
Communication Diagram
University of Texas at Dallas
 
The Pc And Its Operating Systems
The Pc And Its Operating SystemsThe Pc And Its Operating Systems
The Pc And Its Operating Systems
Amber Wheeler
 
Alphabet soup deployment
Alphabet soup deploymentAlphabet soup deployment
Alphabet soup deployment
Stephen Rose
 
Note This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdfNote This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdf
sagaraccura
 
Private Apps in the Public Cloud - DevConTLV March 2016
Private Apps in the Public Cloud - DevConTLV March 2016Private Apps in the Public Cloud - DevConTLV March 2016
Private Apps in the Public Cloud - DevConTLV March 2016
Issac Goldstand
 
This project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfThis project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdf
ableelectronics
 
15 hacks for better ITAM with ServiceDesk Plus
15 hacks for better ITAM with ServiceDesk Plus15 hacks for better ITAM with ServiceDesk Plus
15 hacks for better ITAM with ServiceDesk Plus
Leeben Amirthavasagam
 
Trends on Information Technology
Trends on Information TechnologyTrends on Information Technology
Trends on Information Technology
Carlos J. Costa
 
This project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfThis project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdf
adinathfashion1
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacy
Adeel Javaid
 
29041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-200329041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-2003
rafiq123
 
Running Head System Proposal .docx
Running Head System Proposal                                     .docxRunning Head System Proposal                                     .docx
Running Head System Proposal .docx
agnesdcarey33086
 
Blockchain SEMINAR PPT Graduate.ppt
Blockchain SEMINAR PPT Graduate.pptBlockchain SEMINAR PPT Graduate.ppt
Blockchain SEMINAR PPT Graduate.ppt
kingkhan1234567890
 
AWS April Webinar Series - Easily Build and Scale Mobile Apps with AWS Mobile...
AWS April Webinar Series - Easily Build and Scale Mobile Apps with AWS Mobile...AWS April Webinar Series - Easily Build and Scale Mobile Apps with AWS Mobile...
AWS April Webinar Series - Easily Build and Scale Mobile Apps with AWS Mobile...
Amazon Web Services
 

Similar to Activesync (20)

Nsm overview
Nsm overviewNsm overview
Nsm overview
 
computer software (cont.)
computer software (cont.)computer software (cont.)
computer software (cont.)
 
Virtual Network Computing Based Droid desktop
Virtual Network Computing Based Droid desktopVirtual Network Computing Based Droid desktop
Virtual Network Computing Based Droid desktop
 
.NET,ASP .NET, Angular Js,LinQ
.NET,ASP .NET, Angular Js,LinQ.NET,ASP .NET, Angular Js,LinQ
.NET,ASP .NET, Angular Js,LinQ
 
Password security system for websites
Password security system for websitesPassword security system for websites
Password security system for websites
 
Software engg. pressman_ch-10
Software engg. pressman_ch-10Software engg. pressman_ch-10
Software engg. pressman_ch-10
 
Communication Diagram
Communication DiagramCommunication Diagram
Communication Diagram
 
The Pc And Its Operating Systems
The Pc And Its Operating SystemsThe Pc And Its Operating Systems
The Pc And Its Operating Systems
 
Alphabet soup deployment
Alphabet soup deploymentAlphabet soup deployment
Alphabet soup deployment
 
Note This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdfNote This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdf
 
Private Apps in the Public Cloud - DevConTLV March 2016
Private Apps in the Public Cloud - DevConTLV March 2016Private Apps in the Public Cloud - DevConTLV March 2016
Private Apps in the Public Cloud - DevConTLV March 2016
 
This project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfThis project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdf
 
15 hacks for better ITAM with ServiceDesk Plus
15 hacks for better ITAM with ServiceDesk Plus15 hacks for better ITAM with ServiceDesk Plus
15 hacks for better ITAM with ServiceDesk Plus
 
Trends on Information Technology
Trends on Information TechnologyTrends on Information Technology
Trends on Information Technology
 
This project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfThis project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdf
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacy
 
29041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-200329041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-2003
 
Running Head System Proposal .docx
Running Head System Proposal                                     .docxRunning Head System Proposal                                     .docx
Running Head System Proposal .docx
 
Blockchain SEMINAR PPT Graduate.ppt
Blockchain SEMINAR PPT Graduate.pptBlockchain SEMINAR PPT Graduate.ppt
Blockchain SEMINAR PPT Graduate.ppt
 
AWS April Webinar Series - Easily Build and Scale Mobile Apps with AWS Mobile...
AWS April Webinar Series - Easily Build and Scale Mobile Apps with AWS Mobile...AWS April Webinar Series - Easily Build and Scale Mobile Apps with AWS Mobile...
AWS April Webinar Series - Easily Build and Scale Mobile Apps with AWS Mobile...
 

Recently uploaded

Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
AlexanderRichford
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
ScyllaDB
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 

Recently uploaded (20)

Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 

Activesync

  • 2. What is Activesync  Activesync technology is specifically designed for data synchronization between windows mobiles and windows devices  It was developed by Microsoft.  Data transfer and Data Synchronization are different.  Data Transfers just sends the data between the 2 devices. It won’t check for data difference between 2 devices.  Data Synchronization checks data difference between 2 devices and sends only the differenced data , not entire data.  Once Activesync service provider is installed and the required registry entries are created ,your data will be synchronized automatically between the desktop computer and the Windows machine.
  • 4. Activesync Manager  Activesync Manager is built into windows CE service.  Activesync Manager takes care of many synchronization like data synchronization between the devices ,resolving conflicts between the device while synchronizing the data.
  • 5. Activesync Service Provider  There are 2 modules in Activesync service Provider. i) Desktop module ii) Windows Based Device Module  These modules usually Dynamic Link Libraries ( dll )
  • 6. Activesync Naming Conventions  In Activesync every item is called as “Object” Ex: Contacts, emails, tasks...  The Object type is the name for a group of synchronization objects. Ex:”appointment” for the set of appointments in Microsoft Outlook  Store contains all the objects for our application i.e., database or a file
  • 7. Activesync working  In order to synchronize the data, first we must define Object, Object type, and store.  Object must have 32-bit value, it must be unique, can not be changed, can't be used ones it was deleted.  An object synchronize the data based on version number and last user time stamp.  Application enumerate the objects consistently by converting an object into series of bytes for transmission.