Sei sulla pagina 1di 42

INFORMATION

AND
COMMUNICATION
TECHNOLOGIES

BY ARUN SHARMA
E GOVERNANCE INITIATIVES IN INDIA

The World Bank in its report on E-Governance has defined E-Governance as:
Use by government agencies of information technologies to improve and transform
relations with citizens, businesses, and other arms of government.

E-governance is an innovative phenomenon for redeveloping Indian public


administration purely because of the fact that its objectives are to enhance the quality of
government services to citizens, speed up communications through the use of
technology, reduce government expenditure, bring in more transparency, reduce
corruption and subjectivity, reduce costs for citizens and make government more
accessible and accountable.

There are four pillars of E-Governance:-


1. CONNECTIVITY:-Connectivity is required to connect the people to the services of the
government. There should be a strong connectivity for an effective e-governance.

2. KNOWLEDGE: - Here knowledge refers to IT knowledge. Government should employ


skill full engineers who can handle the e-governance in an efficient way. These
engineers also handle all kind of fault that may occur during the working of
egovernance.

3. DATA CONTENT: - To share any kind of knowledge or information over the internet,
there should be its database. This database should have the data content which is
related to government services.

4. CAPITAL:-Capital can be on public or private partnership. It refers to money used by


government to provide their services or to that sector of the economy based on its
operation

It is an imperative for economic progress in today's world. Today many government


departments have started using information and communications technology (ICT) to
automate their works because of ease of access to computer technology and the
numerous developments in the field of information and communications technology.

There has also been an increased efficiency in the functioning of the government
services because of computerization of services like ration cards, income certificates,
building licences, Passport/VISA, Pensions, Road Transport, Property Registration,
Railway services, land records, and income tax payments etc. which has made life
convenient, efficient and transparent for the citizens.

The growth of e-governance first began with National Informatics Centre (NIC)
being established in 1977. This was a first major step towards e-Governance in India.
Subsequently there were many initiatives that were launched to support the growth of
e-governance in India. The launch of NICNET in 1987 was one of the driving forces for
e-Governance.

E-Governance was started in India by AHSHAYA in Kerala. This project involves setting
up around 5000 multipurpose community technology centers called Akshaya e-
Kendras across Kerala. Run by private entrepreneurs, each e-Kendra set up within 2-3
1 | Page
BY ARUN SHARMA
E GOVERNANCE INITIATIVES IN INDIA

kilometers of every household, will cater to the requirements of around 1000-3000


families to make available the power of networking and connectivity to
common man. Akshaya is a social and economic catalyst focusing on the various facets
of e-learning, e-transaction, egovernance, information and communication.

The other significant initiatives include the creation of A Union Ministry of Information
Technology in 1999, identification of a 12-point minimum agenda for e-Governance by
Government of India for implementation in all the Union Government Ministries and
Departments by 2000 and the National e-Governance Plan (NeGP) established in
2006, which set out an impressive agenda for developing e-Government services.

eKranti or NeGP 2.0 was also conceptualized with a focus on electronic delivery
of services. LATER DIGITAL INDIA WHICH WAS LAUNCHED ON 1 JULY 2015 IS AN
INITIATIVE TO ENSURE THAT GOVERNMENT SERVICES ARE MADE AVAILABLE TO
CITIZENS ELECTRONICALLY BY IMPROVING ONLINE INFRASTRUCTURE AND BY
INCREASING INTERNET CONNECTIVITY. (ESE 2017)

According to an administrative reforms commission report e-Governance initiatives


implemented in the last 10 to 15 years can be categorized into the following

Government to Citizen (G2C) is an initiative which deals with extending the


reach of governance to have a major impact on the people at large. Projects taken
in this direction are Computerization of Land Records (Department of Land
Resources, Government of India), Bhoomi Project: Online Delivery of Land
Records, Gyandoot, Lokvani Project, e-Mitra Project, Project FRIENDS, eSeva,
Revenue Administration through Computerized Energy (RACE) Billing Project,
Admission to Professional Colleges Common Entrance Test (CET) etc..
Government to Business (G2B) is an initiative which deals with activities of
government which impinge upon business organizations. The objective of
bringing activities like registrations, licenses and exchange of information
between government and business under e-Governance is to provide an amiable
legal environment to business, speed up processes and provide relevant
information to business. Some of the projects are e-Procurement Project,
e-Procurement, MCA 21, etc
Government to Government (G2G) is an initiative which deals with large scale
processing of information and decision making within government systems. This
initiative has been taken to help in making the internal government processes
more efficient. Some of projects are Khajane Project in Karnataka, SmartGov
(Andhra Pradesh), etc
1. E-Seva, a Government to Citizen Project: (Andhra Pradesh)

This project is designed to provide Government to Citizen and e-Business to Citizen


services. Originally, it was implemented in the form of the TWINS (Twin Cities Integrated
Network Services) project in 1999 in the twin cities of Hyderabad and Secunderabad.

Its services include online payment of utility bills, issuing certificates, issuing licenses &
permits, e-forms etc started in 1999.It was designed to provide Government to Citizen
services. It delivers services online to consumers by connecting them to the respective

2 | Page
BY ARUN SHARMA
E GOVERNANCE INITIATIVES IN INDIA

government departments and providing online information at the point of service


delivery.

Presently, eSeva is providing One-stop-shop for over 66 G2Cand B2Cservices in 46 eSeva


centres in the twin cities and Ranga Reddy district. Centres have also been opened in 20
other districts. The services include online payment of utility bills, issuing certificates,
issuing licenses & permits, e-forms etc. Payments can be made by cash/cheque/DD/credit
card/Internet.

The project has become very popular among the citizens especially for payment of
utility bills. Success of this project is largely based on payment of electricity bills. It
exemplifies the potential for integration of delivery of Union, State and Local
Government services at one point. However, it also shows that the model based on
payment of utility bills could not be rolled out in the rural hinterland.

2. BHOOMI PROJECT IN KARNATAKA : ONLINE DELIVERY OF LAND RECORDS

Bhoomi is a self-sustainable e-Governance project for the computerized delivery of 20


million rural land records to 6.7 million farmers through 177 Government-owned kiosks in
the State of Karnataka. It was felt that rural land records are central conduits to delivering
better IT-enabled services to citizens because they contain multiple data elements: ownership,
tenancy, loans, nature of title, irrigation details, crops grown etc. In addition to providing the
proof of title to the land, this land record is used by the farmer for a variety of purposes: from
documenting crop loans and legal actions, to securing scholarships for school-children.
Through this project, computerised kiosks are currently offering farmers two critical services
- procurement of land records and requests for changes to land title..

3. GYANDOOT (MADHYA PRADESH)

Gyandoot is an Intranet-based Government to Citizen (G2C) service delivery initiative. It


was initiated in the Dhar district of Madhya Pradesh in January 2000 with the twin objective
of providing relevant information to the rural population and acting as an interface between
the district administration and the people. The basic idea behind this project was to establish
and foster a technologically innovative initiative which is owned and operated by the
community itself. The services offered through the Gyandoot network include

Daily agricultural commodity rates Rural Hindi email


(mandi bhav)
BPL family list
Income certificate
Rural Hindi newspaper
Domicile certificate

Caste certificate

Public grievance redressal

3 | Page
BY ARUN SHARMA
E GOVERNANCE INITIATIVES IN INDIA

4. LOKVANI PROJECT IN UTTAR PRADESH

Lokvani is a public-private partnership project at Sitapur District in Uttar Pradesh which was
initiated in November, 2004. Its objective is to provide a single window, self sustainable
e-Governance solution with regard to handling of grievances, land record maintenance and
providing a mixture of essential services. As 88 per cent of the District population resides in
villages and the literacy rate is only 38 per cent, the programme had to be designed in a way
which was user-friendly and within the reach of the people both geographically as well as
socially. To achieve this, the programme format uses the local language, Hindi, and is spread
throughout the district to a chain of 109 Lokvani Kiosk Centres. These Kiosks have been
established by licensing the already existing cyber cafes. The services offered by Lokvani are:

a. Availability of land records j. Other useful information of


(khataunis) on the internet public interest

b. Online registration, disposal


and monitoring of public
grievances

c. Information of various
Government schemes

d. Online availability of
prescribed Government
forms

e. Online status of Arms


License applications

f. GPF Account details of


Basic Education teachers

g. Details of work done under


MPLAD/Vidhayak Nidhi

h. Details of allotment of funds


to Gram Sabhas under
different development
schemes

i. Details of allotment of food


grains to Kotedars (fair price
shops)

4 | Page
BY ARUN SHARMA
E GOVERNANCE INITIATIVES IN INDIA

5. E-MITRA PROJECT IN RAJASTHAN

This e-Governance initiative builds upon the experiences gained through the LokMitra and
JanMitra pilot projects launched in 2002. While LokMitra was centred in the city of Jaipur,
JanMitra was piloted in Jhalawar district to provide information and services under one roof
to urban and rural populations. e-Mitra is an integration of these two projects in all the 32
districts using PPP model. There are two major components back office processing and
service counters. Back office processing includes computerization of participating
departments and establishing an IT enabled hub in form of a mini data centre at the district
level (e-Mitra data centre). All participating departments and the service centres hook up to
this data centre. It is managed by the Facility Management Service Provider on behalf of the
district e-Governance Society (under Chairmanship of the district collector). Private partners
(Local Service Providers) run the kiosks/centres. In case of collection on account of payment
of utility bills and government levies, the Local Service Provider does not charge the citizen,
but gets reimbursement from the concerned organization through the e-Mitra Society. In case
of other services, the transaction fees is prescribed by the Society.

6. Project FRIENDS, a Government to Citizen Project (KERALA)

FRIENDS (Fast, Reliable, Instant, Efficient Network for the Disbursement of Services)
which was launched in June 2000 is a Single Window Facility providing citizens the
means to pay taxes and other financial dues to the State Government. Its services are
provided through FRIENDS Janasevana Kendrams. This project is a classic case of
achieving front end computerized service delivery to citizens without waiting for
completion of back end computerization in various government departments.

This project thus tries to avoid the complex issues involved in business process
re-engineering in the participating departments. FRIENDS counters are not even
networked with the participating departments or entities. Print-outs of payments made
through the counters are physically distributed to participating entities for processing.

To remove bottlenecks at the time of processing, a government order was issued to


treat a receiptfrom a FRIENDS counter as equivalent to a rceipt from the concerned
government
entity.

7. Revenue Administration through Computerized Energy (RACE) Billing Project, Bihar

8. E-Procurement Project, a Government to Business Project:

Prior to the introduction of an e-Procurement system procurement in Government


departments was done through a manual tendering process. The process consisted of a
long chain of internal authorizations and scrutiny which necessitated several visits by
the suppliers to government departments.

5 | Page
BY ARUN SHARMA
E GOVERNANCE INITIATIVES IN INDIA

The manual tender system suffered from various deficiencies, including discrimination,
cartel formation, delays, lack of transparency etc. The e-Procurement project was
introduced in 2003. The benefits of the new system are as follows were reduction in
tender cycle time, reduction in opportunities for corrupt practices,

Cost Savings, substantial reduction in the advertisement costs in the press media,
Transparency in the bidding process .Besides, it has made a visible social impact, as
citizens are assured that government procurement is conducted in a transparent
manner, saving taxpayers money.

9. MCA 21

The Ministry of Corporate Affairs has implemented the MCA 21 Mission Mode Project under
the NeGP in September 2006 and presently the project is in the post-implementation phase.
The project aims at providing easy and secure online access to all registry related services
provided by the Union Ministry of Corporate Affairs to corporates and other stakeholders at
any time and in a manner that best suits them. The goals of this project were formulated
keeping in mind different stakeholders. These were:

a. Business: to enable registration of a company and file statutory documents


quickly and easily.

b. Public: to get easy access to relevant records and effective grievances redressal.

c. Professionals: to enable them to offer efficient services to their client


companies.

d. Financial Institutions: to easily find charges for registration and verification.

e. Employees: to enable them to ensure proactive and effective compliance of


relevant laws and corporate governance.

10.SmartGov, a Government to Government Project (Andhra Pradesh)

The processing of information in the Government is predominantly workflow intensive.


Information moves in the form of paper files from one officer to another for seeking
opinions, comments. SmartGov was developed to streamline operations, enhance
efficiency through workflow automation and knowledge management.

The solution automates the functioning of all levels of Government entities and provides
a well defined mechanism for transforming the hard copy environment to a digital
environment. It enhances productivity through use of IT as a tool.

SmartGov replaces the paper file with an e-file. SmartGov provides the features of
creation, movement, tracking and closure of e-files, automation of repetitive tasks,
decision support system through knowledge management, prioritization of work, easy

6 | Page
BY ARUN SHARMA
E GOVERNANCE INITIATIVES IN INDIA

access to files through an efficient document management system and collaboration


between departments.

11. KHAJANE PROJECT IN KARNATAKA , G2G INITIATIVE

It is a comprehensive online treasury computerization project of the Government of


Karnataka. The project has resulted in the computerization of the entire treasury related
activities of the State Government and the system has the ability to track every activity right
from the approval of the State Budget to the point of rendering accounts to the government.
The project was implemented to eliminate systemic deficiencies in the manual treasury
system.

Digital India:
Digital India is the latest initiative which is being coordinated and implemented by the
Department of Electronics and IT, it is a program that aims at transforming the country
through leveraging information and communication technologies in every sphere of
economy and society.

It is centered around providing digital infrastructure as a utility to every citizen,


governance and services on demand, and digital empowerment of citizens. This was
launched keeping in view that despite the successful implementation of many
e-Governance projects across the country, e-Governance as a whole has not been able to
make the desired impact and fulfill all its objectives.

The approach and methodology being adopted for the programme according to
the Digital India portal are

Ministries, Departments and States would fully leverage the Common and
Support ICT Infrastructure established by Government of India. Department of
Electronics and Information Technology (DeitY) would also evolve or lay down
standards and policy guidelines, provide technical and handholding support,
undertake capacity building, R&D, etc.
The existing or ongoing e-Governance initiatives would be suitably revamped to
align them with the principles of Digital India. Scope enhancement, Process
Reengineering, use of integrated & interoperable systems and deployment of
emerging technologies like cloud & mobile would be undertaken to enhance the
delivery of Government services to citizens.
States would be given flexibility to identify for inclusion additional state-specific
projects, which are relevant for their socio-economic needs.
E-Governance would be promoted through a centralized initiative to the extent
necessary, to ensure citizen centric service orientation, interoperability of
various e-Governance applications and optimal utilization of ICT infrastructure/
resources, while adopting a decentralized implementation model.
Successes would be identified and their replication promoted proactively with
the required productization and customization wherever needed.
Public Private Partnerships would be preferred wherever feasible to implement
e-Governance projects with adequate management and strategic control.

7 | Page
BY ARUN SHARMA
E GOVERNANCE INITIATIVES IN INDIA

Adoption of Unique ID would be promoted to facilitate identification,


authentication and delivery of benefits.
Restructuring of NIC would be undertaken to strengthen the IT support to all
government departments at Centre and State levels.
The positions of Chief Information Officers (CIO) would be created in at least 10
key Ministries so that various e-Governance projects could be designed,
developed and implemented faster. CIO positions will be at Additional
Secretary/Joint Secretary level with over-riding powers on IT in the respective
Ministry.
Some of the projects which have already been implemented or are in the process
of being implemented in the Digital India initiative are:

MyGov.in which is a platform that has been implemented for citizens to


interactively engage within the government.
An Aadhaar based biometric attendance system is being implemented in the
central government offices in Delhi to begin with.
JeevanPramaan Portal: A portal which allows pensioners to submit their life
certificate, which can later be disbursed to the agencies for necessary processing.
e-Greetings a portal for government greetings
www.ebasta.in which is an eBook Platform has been developed; this can be used
to upload e-books.
eSAMPARK which is operational is an IT Platform for Messages to Elected
Representatives
Digital Locker
Revamping of Mission Mode and Other e-Governance Projects like Transport,
PDS, e-Prisons, National Scholarship Portal, Payonline, Checkpost online, etc.
Policies to help departments in speedy implementation of e-governance projects
have been developed. There are also hurdles that are needed to be sorted out. To
begin with, there is a lack of digital infrastructure.
Another prime concern has been broadband penetration. According to a report released
by The UN Broadband Commission released India ranked 131 out of 189 countries on
fixed-broadband subscriptions in 2014.Then there is a concern about rural connectivity,
the government is this with the aim to connect more than 2 lakh village panchayats. The
monitoring and evaluation system is also weak and needs to be improved.

For e-governance initiatives to be truly successful government support at the highest


level is required, next application of Information Technology should be preceded by
process re-engineering; then an intellectual and empowered leader with a dedicated
team who can conceptualize and implement e-Governance projects with the help of
officials at all levels and technological solution providers are needed; Issues of
connectivity and electricity supply are of paramount importance; and In case of complex
projects, all components need to be identified and analyzed at the outset, followed by
meticulous planning and project implementation.

E-Governance is not only popular in India but also worldwide. To make working of
government more efficient, responsive and transparent many developed and
developing countries have taken some useful steps for the expansion of egovernance

8 | Page
BY ARUN SHARMA
E GOVERNANCE INITIATIVES IN INDIA

in their respective countries. Countries which are in the race of e-governance


implementation are UK, USA, New Zealand, Brazil etc. Below following countries with
their respective projects has been described:-
USA: On July 18, 2001 Task Force to identify priority actions
that achieve strategic improvements in government and set in
motion a transformation of government around citizen needs
was done .
Various projects:-
1. Recreation One Stop: - This project was started on 31 April 2002. It aimed to:-
Agreement with private sector reached on implementation of new recreation
online projects.
Additional recreation projects available online.

2. EZ Tax filling:-This project was started on 31april, 2002. It aimed to:-


Filling and refunding of taxes online.
Initial deployment of industry partnership free efilling solution for 2003season.
3. Federal Assets Sales:-started on 31march, 2003. It aimed to:-
Develop pilot business integration
Re-host federal sales.

4. E-Payroll/HR: - started on 31 March, 2002. Aimed to:-


complete and submit business case to PMC
integrated enterprise architecture

5. E-Authentication: - started on 1july, 2002. Aimed at:-


Initial authentication gateway prototype
Full deployment

UK: In April 2000, the cabinet Office in the UK came out with the document E
Government: A Strategic Framework for Public Services in the Information Age .
Various projects:-

1. Cornwall Electronic Health Record Pilot: - this project was started in April 2000. It
aimed to:-
Pan-community EHR demonstrator
Connect all General Practitioners to NHSnet (national-level NHS Virtual Private
Network or intranet)
24 hour emergency care record
Common information architecture
Condition-specific care modules mental health, coronary heart disease, diabetic
care

2. Go-between Project: - this project is for Calne Community Area in Wiltshire. This
project is designed to assist a local rural community organize its transport services by
identifying unmet local demand and matching it with spare capacity

3. Plymouth Bus Project:-Commissioned by Plymouth City Council to undertake a


comprehensive study of the bus network and propose initiatives for its future
development and investment. (Completed in January 2009)
9 | Page
BY ARUN SHARMA
E GOVERNANCE INITIATIVES IN INDIA

4. Integrating Transport:-Started in South West Hertfordshire. Lead consultant on a


project commissioned by Watford Borough Council. Preparation of a sustainable
transport strategy for implementation over the next ten years.
(Completed October 2008)

New Zealand
In May 2000,Realising the importance of opportunities offered by ICT, the New Zealand
Government came out with its e-government vision document and an E-Government
Unit was established by the State Services commission

Various projects:-
The Treaty of Wetangi: It is the founding document of New Zealand. This website,
launched in 2003, to provide information and resources for an informed understanding
and greater public knowledge of the treaty

10 | Page
BY ARUN SHARMA
E -LEARNING IN INDIA

NPTEL e-Yantra is an initiative to incorporate


NPTEL provides E-learning through Robotics into engineering education
online Web and Video courses in with the objective of engaging students
Engineering, Science and humanities and teachers through exciting hands-on
streams. The mission of NPTEL is to application of math, computer science,
enhance the quality of Engineering and engineering principles.
education in the country by providing
Digital Library Inflibnet
free online courseware.
The UGC-Infonet Digital Library
Virtual Labs Consortium was formally launched in
Objectives of the Virtual Labs to provide December, 2003 by Honourable Dr. A P J
remote-access to Labs in various Abdul Kalam, the President of India
disciplines of Science and Engineering. soon after providing the Internet
These Virtual Labs would cater to connectivity to the universities in the
students at the undergraduate level, year 2003 under the UGC-Infonet
post graduate level as well as to programme.
research scholars.
Quantum & Nano Computing
Talk to Teacher The Quantum-Nano Centre is a
A-VIEW is an award winning multidisciplinary centre at Dayalbagh
indigenously built multi-modal, Educational Institute, Agra set up under
multimedia e-learning platform that MHRD National Mission on Education
provides an immersive e-learning through ICT, with partners as IIT
experience that is almost as good as a Kanpur, IIT Delhi and IIT Madras,
real classroom experience developed by besides several international
Amrita e-Learning Research Lab. collaborators.

Spoken Tutorial
ERP Mission
The Spoken Tutorial project is the
The ERP mission is to Implement,
initiative of the Talk to a Teacher
maintain, improve, and support the
activity of the National Mission on
County's integrated financial,
Education through Information and
procurement, human resource and
Communication Technology (ICT),
payroll information systems.
launched by the Ministry of Human
Resources and Development, ISLERS
Government of India.
This project is aimed to develop an
CEC automatic Indian Sign Language
education and recognition platform for
Annually CEC organises Video
hearing impaired students of India. The
Competition and Prakriti.Prakriti is an
system can substantially help in the
annual film festival on
primary/vocational/higher education of
environment,human rights &
hearing impaired students and people of
development.Video Competition is an
India. The framework is proposed to be
annual competition meant to nurture
extended to 14 different languages of
within media centres and other
India with extensive interactive features
educational institutes in the country.
in the audio-visual mode. .
E-Yantra
Oscar++
1 | Page
BY ARUN SHARMA
SOURCE :MHRD+ others
E -LEARNING IN INDIA

Project OSCAR (Open Source postgraduate level. It is an initiative of


Courseware Animations Repository) Institute of Life-Long Learning,
provides a repository of web-based University of Delhi. Conceived in 2012,
interactive animations and simulations, VLE today boasts state of art material
that we refer to as learning objects that addresses emerging needs of a
(LOs). These learning objects span diverse student body, not only of Delhi
topics in science and engineering at the University but other universities as well.
college level, and maths and science at Drawing from several successful Moodle
the school level. Students and teachers models, the multi-media interactive
can view, run and download these contents loaded on VLE are categorized
learning objects. discipline-wise.

Fossee Aakash Educational Portal


FOSSEE project is part of the National This project envisions empowerment of
Mission on Education through ICT with teachers, through workshops conducted
the thrust area being "Adaptation and for thousands of teachers at one go,
deployment of open source simulation using a unique blend of technology and
packages equivalent to proprietary an innovative pedagogy. Thousands
software, funded by MHRD, based at the have experienced the effectiveness of
Indian Institute of Technology Bombay this approach, and of the resulting open
(IITB). source contents.
OSS for Maths Edu.
E-Kalpa
Project consists of organizing four
This project on 'Creating
workshops (of 5 days each) for
Digital-learning Environment for
popularization of Open Source
Design' also called 'e-kalpa' is sponsored
Mathematical Software at the National
by the Ministry of Human Resources,
level in the educational eld. The aim of
Government of India as part of the
the workshops will be to familiarize the
National Mission in Education through
participants to Mathematical Software
Information and Communication
for teaching and learning of
Technology.
Mathematics.
Pedagogy Project
SOS Tools
This project is an experiment to
Software and simulation packages are
systematically design and develop
useful tools for the analysis of systems
learner-centric curricula, suitable for
and solving problems by the students of
outcome-based learning for 4 year
Science, Social Science, Engineering,
degree programmes in six major
Management and related discipline
engineering disciplines. This project is
NOT, yet another attempt to develop SWAYAM is a programme initiated by
content, although each curriculum Government of India and designed to
document is expected to include around achieve the three cardinal principles of
80 pages of course notes and 120-125 Education Policy viz., access, equity and
self assessment problems and solutions. quality. The objective of this effort is to
take the best teaching learning
Virtual Learning Environment
resources to all, including the most
VLE, an online environment of disadvantaged. SWAYAM seeks to
e-resources caters to several disciplines bridge the digital divide for students
taught at undergraduate and
2 | Page
BY ARUN SHARMA
SOURCE :MHRD+ others
E -LEARNING IN INDIA

who have hitherto remained untouched


The pilot project SAKSHAT: A One Stop
by the digital revolution and have not
Education Portal launched on October
been able to join the mainstream of the
30, 2006 by His Excellency, the then
knowledge economy.
President of India to facilitate lifelong
This is done through an indigenous learning for students, teachers and
developed IT platform that facilitates those in employment or in pursuit of
hosting of all the courses, taught in knowledge free of cost to them. The
classrooms from 9th class till content development task for
post-graduation to be accessed by SAKSHAT was looked after by the
anyone, anywhere at any time. All the Content Advisory Committee (CAC) for
courses are interactive, prepared by the the respective subject, which consisted
best teachers in the country and are of representatives from educational
available, free of cost to the residents in institutions like IGNOU, Delhi
India. More than 1,000 specially chosen University, Kendriya Vidyalaya
faculty and teachers from across the Sangthan (KVS), Navodyaya Vidyalaya
Country have participated in preparing Sangthan (NVS), National Institute of
these courses. Open Schooling (NIOS) and National
Council for Educational Research and
SARANSH is a tool for comprehensive
Training (NCERT) and prominent
self- review and analysis for CBSE
academicians in the field. In addition,
affiliated schools and parents. It enables
some NGOs had also provided the
them to analyze students performance
contents developed by them free of cost
in order to take remedial measures.
for this portal.
Saransh brings schools, teachers and
parents closer, so thhat they can
monitor the progress of students and The vision is to scale up this pilot
help them improve their performance project SAKSHAT to cater to the
learning needs of more than 50 crore
IMPRINT is the first of its kind MHRD
people through a proposed scheme of
supported Pan-IIT + IISc joint initiative
National Mission in Education through
to address the major science and
Information and Communication
engineering challenges that India must
Technology (ICT). The scheme is to
address and champion to enable,
provide connectivity to all institutions
empower and embolden the nation for
of higher learning to world of
inclusive growth and self-reliance. This
knowledge in the cyber space, to
novel initiative with twofold mandate is
leverage the potential of ICT, in
aimed at:
providing high quality knowledge
modules with right e-contents, to
(a) Developing new engineering
address to the personalized needs of
education policy
learners, in order to take care of their
(b) Creating a road map to pursue
aspirations. These modules are to be
engineering challenges
delivered through SAKSHAT. The
scheme may also have a provision of
IMPRINT provides the overarching
certification of competencies of the
vision that guides research into areas
human resources acquired through
that are predominantly socially relevant.
formal or non-formal means as also to
SAKSHAT: A One Stop Education
Portal

3 | Page
BY ARUN SHARMA
SOURCE :MHRD+ others
E -LEARNING IN INDIA

develop and maintain the database of technology and the internet, at selected
profile of human resources. remote centers across the country.

National Mission on Education GSAT-3, known as EDUSAT is meant


through ICT (NMEICT) for distant class room education from
school level to higher education. This
was the first dedicated "Educational
Under the National Mission on Satellite" that provide the country with
Education through ICT (NMEICT), satellite based two way communication
funded by the Ministry of Human to class room for delivering educational
Resources Development, Government of materials.
India, a proper balance between content
generation, research in critical areas
relating to imparting of education and
connectivity for integrating our
knowledge with the latest
advancements is being attempted. For
this, what is needed is a critical mass of
experts in every field working in a
networked manner with dedication.
Although disjointed efforts have been
going on in this area by various
institutions / organizations and isolated
success stories are also available, a
holistic approach is the need of the hour.
This Mission seeks to support such
initiatives and build upon the synergies
between various efforts by adopting a
holistic approach

"Train 10 thousand teachers" is a major


initiative under the NMEICT, in which
IIT Kharagpur and IIT Bombay are
working as partner institutes to
improve the teaching skills of
engineering college teachers of the
country in core Engineering and Science
subjects. Under the programme,
two-week ISTE workshops are held
during the vacation period in summer
and winter. Live lectures are given by
IIT faculty. The participating teachers
attend at a remote center close to their
own college, and also attend tutorial and
lab sessions conducted in the same
center. The lecture transmission and
live interaction takes place through
distance mode using the AVIEW
4 | Page
BY ARUN SHARMA
SOURCE :MHRD+ others
SOME FACTS TO KNOW ABOUT SOCIAL NETWORKING
1. Skype is an instant messaging app that provides online text message and video
chat services. Users may transmit both text and video messages and may
exchange digital documents such as images, text, and video. Skype allows video
conference calls.

2. Google Talk (also known as Google Chat) is an instant messaging service that
provides both text and voice communication.

3. MSN (stylized as msn) MICROSOFT NETWORKS is a web portal and related


collection of Internet services and apps for Windows and mobile devices,
provided by Microsoft and launched on August 24, 1995, the same release date
as Windows 95.

4. Messenger (sometimes abbreviated Y!M; commonly stylized as Yahoo


Messenger) is an advertisement-supported instant messaging client and
associated protocol provided by Yahoo.

5. Facebook Messenger (sometimes abbreviated as Messenger) is an instant


messaging service and software application. It is integrated with Facebook's
web-based chat feature and built on the open MQTT protocol.

6. Electronic mail, or email, is a method of exchanging digital messages between


people using digital devices such as computers, tablets and mobile phones

7. Wiki software is a type of collaborative software that runs a wiki system,


allowing web pages to be created and edited using a common web browser. It
may be implemented as a series of scripts behind an existing web server, or as a
standalone application server that runs on one or more web servers.

8. Wikipedia is a free online encyclopedia that aims to allow anyone to edit


articles. Wikipedia is the largest and most popular general reference work on the
Internet and is ranked among the ten most popular website

9. A newsgroup is a discussion about a particular subject consisting of notes


written to a central Internet site and redistributed through Usenet, a worldwide
network of news discussion groups. Usenet uses the Network News Transfer
Protocol (NNTP).

10.RSS (Rich Site Summary; originally RDF Site Summary; often called Really Simple
Syndication) uses a family of standard web feed formats to publish frequently
updated information: blog entries, news headlines, audio, video. ... RSS
feeds enable publishers to syndicate data automatically.

11.YouTube is an American video-sharing website headquartered in San Bruno,


California. The service was created by three former PayPal employeesChad
Hurley, Steve Chen, and Jawed Karimin February 2005. Google bought the site
in November 2006 for US$1.65 billion; YouTube now operates as one of
1 | Page
BY ARUN SHARMA
SOME FACTS TO KNOW ABOUT SOCIAL NETWORKING
Google's subsidiaries. The site allows users to upload, view, rate, share, add to
favorites, report and comment on videos, subscribe to other users, and it makes
use of WebM, H.264/MPEG-4 AVC, and AdobeFlash Video technology to display a
wide variety of user-generated and corporate media videos

12. An ePortfolio (electronic portfolio) is an electronic collection of evidence that


shows your learning journey over time. Portfolios can relate to specific academic
fields or your lifelong learning.

13. An Internet forum, or message board, is an online discussion site where people
can hold conversations in the form of posted messages. They differ from chat
rooms in that messages are often longer than one line of text, and are at least
temporarily archived.

14.Facebook is a popular free social networking website that allows registered


users to create profiles, upload photos and video, send messages and keep in
touch with friends, family and colleagues.

15.Myspace is a social networking website offering an interactive, user-submitted


network of friends, personal profiles, blogs, groups, photos, music, and videos. It
is headquartered in Beverly Hills, California.

Myspace was acquired by News Corporation in July 2005 for $580 million From
2005 to 2009, Myspace was the largest social networking site in the world, and in
June 2006 surpassed Google as the most visited website in the United States In
April 2008, Myspace was overtaken by Facebook in the number of unique
worldwide visitors, and was surpassed in the number of unique U.S. visitors in
May 2009, though Myspace generated $800 million in revenue during the 2008
fiscal year. Since then, the number of Myspace users has declined steadily in
spite of several redesigns. As of October 2016, Myspace was ranked 2,154 by
total Web traffic, and 1,522 In the United States.

16.Orkut was a social networking website owned and operated by Google. The
service was designed to help users meet new and old friends and maintain
existing relationships. The website was named after its creator, Google
employee Orkut Buyukkokten. On June 30, 2014, Google announced it would be
closing Orkut on September 30, 2014. No new accounts could be created starting
from July 2014. Users can download their profile archive by Google Takeout.
Orkut was one of the most visited websites in India and Brazil in 2008. In 2008
Google announced that Orkut would be fully managed and operated in Brazil, by
Google Brazil, in the city of Belo Horizonte. This was decided due to the large
Brazilian user base and growth of legal issues.

17.Twitter is an online news and social networking service where users post and
interact with messages, "tweets," restricted to 140 characters. Registered users

2 | Page
BY ARUN SHARMA
SOME FACTS TO KNOW ABOUT SOCIAL NETWORKING
can post tweets, but those who are unregistered can only read them. Users
access Twitter through its website interface, SMS or a mobile device app. Twitter
Inc. is based in San Francisco, California, United States, and has more than 25
offices around the world.Twitter was created in March 2006 by Jack
Dorsey, Noah Glass, Biz Stone, and Evan Williams and launched in July, whereby
the service rapidly gained worldwide popularity. In 2012, more than 100 million
users posted 340 million tweets a day, and the service handled an average of 1.6
billion search queries per day. In 2013, it was one of the ten most-visited
websites and has been described as "the SMS of the Internet". As of 2016, Twitter
had more than 319 million monthly active users. On the day of the 2016 U.S.
presidential election, Twitter proved to be the largest source of breaking news,
with 40 million tweets sent by 10 p.m. (Eastern Time) that day.

18.Instagram is a mobile photo-sharing application and service that allows users to


share pictures and videos either publicly or privately on the service, as well as
through a variety of other social networking platforms, such
as Facebook, Twitter, Tumblr, and Flickr. Originally, a distinctive feature was
that it confined photos to a square shape, similar to Kodak Instamatic and
Polaroid SX-70 images, in contrast to the 4:3 aspect ratio typically used by
mobile device cameras. In August 2015, version 7.5 was released for mobile
devices, allowing users to upload media captured in any aspect ratio, but not at
full size. Users can also apply various digital filters to their images. In June 2013,
Instagram added support for videos, allowing prerecorded square standard
definition resolution clips of up to 15 seconds to be shared; later updates
introduced support for widescreen resolutions at 360p and longer recording
times for either pre-recorded (up to one minute per video, or up to 10 minutes
with a multi-video post) or disappearing live videos (up to one hour)

19.Yahoo! Search is a web search engine owned by Yahoo. As of February 2015 it is


the third largest search engine in the US by the query volume at 12.8%, after its
competitors Google at 64.5% and Bing at 19.8%. Originally, "Yahoo Search"
referred to a Yahoo-provided interface that sent queries to a searchable index of
pages supplemented with its directory of websites. The results were presented
to the user under the Yahoo! brand. Originally, none of the actual web crawling
and data housing was done by Yahoo! itself. In 2001, the searchable index was
powered by Inktomi and later was powered by Google until 2004, when Yahoo!
Search became independent. On July 29, 2009, Microsoft and Yahoo! announced
a deal in which Bing would henceforth power Yahoo! Search

20.GOOGLE: Originally known as BackRub, Google is a search engine that started


development in 1996 by Sergey Brin and Larry Page as a research project at
Stanford University to find files on the Internet. Larry and Sergey later decided
the name of their search engine needed to change and decide upon Google, which

3 | Page
BY ARUN SHARMA
SOME FACTS TO KNOW ABOUT SOCIAL NETWORKING
is inspired from the term googol. The domain google.com was later registered on
September 15, 1997, and the company incorporated on September 4, 1998.

21. A blog is an internet entity (like a website) which acts as a journal, or a diary, or
a canvas to post your thoughts and opinions pertaining to a particular subject
matter.

Blog = Web( Internet, world wide web)+ Log (diary, journal entry, record)

22.INTRANET is a private network of an organisation to which only authorized


employes have acesss( login and password)

23.EXTRANET is a part of intranet, to which independent collaborators have


access

4 | Page
BY ARUN SHARMA
MALWARE + FIREWALL

MALWARE

Malware, short for malicious software, is any software used to disrupt computer or
mobile operations, gather sensitive information, gain access to private computer
systems, or display unwanted advertising. Before the term malware was coined by
Yisrael Radai in 1990, malicious software was referred to as computer viruses. The first
category of malware propagation concerns parasitic software fragments that attach
themselves to some existing executable content. The fragment may be machine code
that infects some existing application, utility, or system program, or even the code used
to boot a computer system. Malware is defined by its malicious intent, acting against the
requirements of the computer user, and does not include software that causes
unintentional harm due to some deficiency.

Malware may be stealthy, intended to steal information or spy on computer users for an
extended period without their knowledge, as for example Regin, or it may be designed
to cause harm, often as sabotage (e.g., Stuxnet), or to extort payment (CryptoLocker).
'Malware' is an umbrella term used to refer to a variety of forms of hostile or intrusive
software, including computer viruses, worms, trojan
horses, ransomware, spyware, adware, scareware, and other malicious programs. It can
take the form of executable code, scripts, active content, and other software. Malware is
often disguised as, or embedded in, non-malicious files. As of 2011 the majority of active
malware threats were worms or trojans rather than viruses.

In law, malware is sometimes known as a computer contaminant, as in the legal codes


of several U.S. states.

Spyware or other malware is sometimes found embedded in programs supplied


officially by companies, e.g., downloadable from websites, that appear useful or
attractive, but may have, for example, additional hidden tracking functionality that
gathers marketing statistics. An example of such software, which was described as
illegitimate, is the Sony rootkit, a Trojan embedded into CDs sold by Sony, which silently
installed and concealed itself on purchasers' computers with the intention of preventing
illicit copying; it also reported on users' listening habits, and unintentionally created
vulnerabilities that were exploited by unrelated malware.

Software such as anti-virus and firewalls are used to protect against activity identified
as malicious, and to recover from attacks.
Viruses
A computer program usually hidden within another seemingly innocuous program that
produces copies of itself and inserts them into other programs or files, and that usually
performs a malicious action (such as destroying data).
Trojan horses
In computing, Trojan horse, or Trojan, is any malicious computer program which
misrepresents itself to appear useful, routine, or interesting in order to persuade a
victim to install it. The term is derived from the Ancient Greek story of the wooden
horse that was used to help Greek troops invade the city of Troy by stealth.

1 | Page
By ARUN SHARMA
MALWARE + FIREWALL

Trojans are generally spread by some form of social engineering, for example where a
user is duped into executing an e-mail attachment disguised to be unsuspicious, (e.g., a
routine form to be filled in), or by drive-by download. Although their payload can be
anything, many modern forms act as a backdoor, contacting a controller which can then
have unauthorized access to the affected computer. While Trojans and backdoors are
not easily detectable by themselves, computers may appear to run slower due to heavy
processor or network usage.

Unlike computer viruses and worms, Trojans generally do not attempt to inject
themselves into other files or otherwise propagate themselves.
Rootkits
Once a malicious program is installed on a system, it is essential that it stays concealed,
to avoid detection. Software packages known as rootkits allow this concealment, by
modifying the host's operating system so that the malware is hidden from the user.
Rootkits can prevent a malicious process from being visible in the system's list
of processes, or keep its files from being read.

Some malicious programs contain routines to defend against removal, not merely to
hide themselves. An early example of this behavior is recorded in the Jargon File tale of
a pair of programs infesting a Xerox CP-V time sharing system:
Each ghost-job would detect the fact that the other had been killed, and would start a
new copy of the recently stopped program within a few milliseconds. The only way to
kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash
the system.
Backdoors
A backdoor is a method of bypassing normal authentication procedures, usually over a
connection to a network such as the Internet. Once a system has been compromised,
one or more backdoors may be installed in order to allow access in the future, invisibly
to the user.

The idea has often been suggested that computer manufacturers preinstall backdoors
on their systems to provide technical support for customers, but this has never been
reliably verified. It was reported in 2014 that US government agencies had been
diverting computers purchased by those considered "targets" to secret workshops
where software or hardware permitting remote access by the agency was installed,
considered to be among the most productive operations to obtain access to networks
around the world. Backdoors may be installed by Trojan horses, worms, implants, or
other methods.
Evasion
Since the beginning of 2015, a sizable portion of malware utilizes a combination of
many techniques designed to avoid detection and analysis.
The most common evasion technique is when the malware evades analysis and
detection by fingerprinting the environment when executed.
The second most common evasion technique is confusing automated tools'
detection methods. This allows malware to avoid detection by technologies such

2 | Page
By ARUN SHARMA
MALWARE + FIREWALL

as signature-based antivirus software by changing the server used by the


malware.
The third most common evasion technique is timing-based evasion. This is when
malware runs at certain times or following certain actions taken by the user, so
it executes during certain vulnerable periods, such as during the boot process,
while remaining dormant the rest of the time.
The fourth most common evasion technique is done by obfuscating internal data
so that automated tools do not detect the malware.
An increasingly common technique is adware that uses stolen certificates to
disable anti-malware and virus protection; technical remedies are available to
deal with the adware.
Nowadays, one of the most sophisticated and stealthy ways of evasion is to use
information hiding techniques, namely stegomalware.

Grayware
Grayware is a term applied to unwanted applications or files that are not classified as
malware, but can worsen the performance of computers and may cause security risks.

It describes applications that behave in an annoying or undesirable manner, and yet are
less serious or troublesome than malware. Grayware
encompasses spyware, adware, fraudulent dialers, joke programs, remote access
tools and other unwanted programs that harm the performance of computers or cause
inconvenience. The term came into use around 2004.

Another term, potentially unwanted program (PUP) or potentially unwanted


application (PUA), refers to applications that would be considered unwanted despite
often having been downloaded by the user, possibly after failing to read a download
agreement. PUPs include spyware, adware, and fraudulent dialers. Many security
products classify unauthorised key generators as grayware, although they frequently
carry true malware in addition to their ostensible purpose.

Software maker Malwarebytes lists several criteria for classifying a program as a PUP.
Some adware (using stolen certificates) disables anti-malware and virus protection;
technical remedies are available.

A zombie is a computer connected to the Internet that has been compromised by


a hacker, computer virus or trojan horse program and can be used to perform malicious
tasks of one sort or another under remote direction
FIREWALL (COMPUTING)
In computing, a firewall is a network security system that monitors and controls the
incoming and outgoing network traffic based on predetermined security rules. A
firewall typically establishes a barrier between a trusted, secure internal network and
another outside network, such as the Internet, that is assumed not to be secure or
trusted. Firewalls are often categorized as either network firewalls or host-based
firewalls. Network firewalls filter traffic between two or more networks; they are
either software appliances running on general purpose hardware, or
hardware-based firewall computer appliances. Host-based firewalls provide a layer of
3 | Page
By ARUN SHARMA
MALWARE + FIREWALL

software on one host that controls network traffic in and out of that single machine.
Firewall appliances may also offer other functionality to the internal network they
protect, such as acting as a DHCP or VPN server for that network.

First generation: packet filters

The first type of firewall was the packet filter which looks at network addresses and
ports of the packet and determines if that packet should be allowed or blocked.

Packet filters act by inspecting the "packets" which are transferred between computers
on the Internet. If a packet does not match the packet filter's set of filtering rules, the
packet filter will drop (silently discard) the packet or reject it (discard it, and send
"error responses" to the source). Conversely, if the packet matches one or more of the
programmed filters, the packet is allowed to pass. This type of packet filtering pays no
attention to whether a packet is part of an existing stream of traffic (i.e. it stores no
information on connection "state"). Instead, it filters each packet based only on
information contained in the packet itself (most commonly using a combination of the
packet's source and destination address, its protocol, and, for TCP and UDP traffic,
the port number). TCP and UDP protocols constitute most communication over the
Internet, and because TCP and UDP traffic by convention uses well known ports for
particular types of traffic, a "stateless" packet filter can distinguish between, and thus
control, those types of traffic (such as web browsing, remote printing, email
transmission, file transfer), unless the machines on each side of the packet filter are
both using the same non-standard ports.

Packet filtering firewalls work mainly on the first three layers of the OSI reference
model, which means most of the work is done between the network and physical layers,
with a little bit of peeking into the transport layer to figure out source and destination
port numbers. When a packet originates from the sender and filters through a firewall,
the device checks for matches to any of the packet filtering rules that are configured in
the firewall and drops or rejects the packet accordingly. When the packet passes
through the firewall, it filters the packet on a protocol/port number basis (GSS). For
example, if a rule in the firewall exists to block telnet access, then the firewall will block
the TCP protocol for port number 23.
Second generation: "stateful" filters
Second-generation firewalls perform the work of their first-generation predecessors but
operate up to layer 4 (transport layer) of the OSI model. This is achieved by retaining
packets until enough information is available to make a judgement about its
state. Known as stateful packet inspection, it records all connections passing through it
and determines whether a packet is the start of a new connection, a part of an existing
connection, or not part of any connection. Though static rules are still used, these rules
can now contain connection state as one of their test criteria.

4 | Page
By ARUN SHARMA
MALWARE + FIREWALL

Certain denial-of-service attacks bombard the firewall with thousands of fake


connection packets in an attempt to overwhelm it by filling its connection state
memory.
Third generation: application layer
This was known as the first transparent application firewall. The key benefit
of application layer filtering is that it can "understand" certain applications and
protocols (such as File Transfer Protocol (FTP), Domain Name System (DNS),
or Hypertext Transfer Protocol (HTTP)). This is useful as it is able to detect if an
unwanted application or service is attempting to bypass the firewall using a protocol on
an allowed port, or detect if a protocol is being abused in any harmful way.

As of 2012, the so-called next-generation firewall (NGFW) is nothing more than the
"wider" or "deeper" inspection at application stack. For example, the existing deep
packet inspection functionality of modern firewalls can be extended to include
Intrusion prevention systems (IPS)
User identity management integration (by binding user IDs to IP or MAC addresses
for "reputation")
Web application firewall (WAF). WAF attacks may be implemented in the tool "WAF
Fingerprinting utilizing timing side channels" (WAFFle)

Firewalls are generally categorized as network-based or host-based.


Network-based firewalls are positioned on the gateway computers
of LANs, WANs and intranets. Host-based firewalls are positioned on the network
node itself. The host-based firewall may be a daemon or service as a part of
the operating system or an agent application such as endpoint security or protection.
Each has advantages and disadvantages. However, each has a role in layered security.

Firewalls also vary in type depending on where communication originates, where it is


intercepted, and the state of communication being traced.
Network layer or packet filters
Network layer firewalls, also called packet filters, operate at a relatively low level of
the TCP/IP protocol stack, not allowing packets to pass through the firewall unless they
match the established rule set. The firewall administrator may define the rules; or
default rules may apply. The term "packet filter" originated in the context
of BSD operating systems.

Network layer firewalls generally fall into two sub-categories, stateful and stateless.
Stateful firewalls maintain context about active sessions, and use that "state
information" to speed packet processing. Any existing network connection can be
described by several properties, including source and destination IP address, UDP or
TCP ports, and the current stage of the connection's lifetime (including session
initiation, handshaking, data transfer, or completion connection). If a packet does not
match an existing connection, it will be evaluated according to the ruleset for new
connections. If a packet matches an existing connection based on comparison with the
firewall's state table, it will be allowed to pass without further processing.

5 | Page
By ARUN SHARMA
MALWARE + FIREWALL

Stateless firewalls require less memory, and can be faster for simple filters that require
less time to filter than to look up a session. They may also be necessary for filtering
stateless network protocols that have no concept of a session. However, they cannot
make more complex decisions based on what stage communications between hosts
have reached.

Newer firewalls can filter traffic based on many packet attributes like source IP address,
source port, destination IP address or port, destination service like HTTP or FTP. They
can filter based on protocols, TTL values, network block of the originator, of the source,
and many other attributes.
Application-layer
Application-layer firewalls work on the application level of the TCP/IP stack (i.e., all
browser traffic, or all telnet or FTP traffic), and may intercept all packets traveling to or
from an application. They block other packets (usually dropping them without
acknowledgment to the sender).

On inspecting all packets for improper content, firewalls can restrict or prevent outright
the spread of networked computer worms and Trojans. The additional inspection
criteria can add extra latency to the forwarding of packets to their destination.

Application firewalls function by determining whether a process should accept any


given connection. Application firewalls accomplish their function by hooking into socket
calls to filter the connections between the application layer and the lower layers of the
OSI model. Application firewalls that hook into socket calls are also referred to as socket
filters. Application firewalls work much like a packet filter but application filters apply
filtering rules (allow/block) on a per process basis instead of filtering connections on a
per port basis. Generally, prompts are used to define rules for processes that have not
yet received a connection. It is rare to find application firewalls not combined or used in
conjunction with a packet filter.

Also, application firewalls further filter connections by examining the process ID of data
packets against a rule set for the local process involved in the data transmission. The
extent of the filtering that occurs is defined by the provided rule set. Given the variety of
software that exists, application firewalls only have more complex rule sets for the
standard services, such as sharing services. These per-process rule sets have limited
efficacy in filtering every possible association that may occur with other processes. Also,
these per-process rule sets cannot defend against modification of the process via
exploitation, such as memory corruption exploits. Because of these limitations,
application firewalls are beginning to be supplanted by a new generation of application
firewalls that rely on mandatory access control (MAC), also referred to as sandboxing, to
protect vulnerable services.
Proxies
A proxy server (running either on dedicated hardware or as software on a
general-purpose machine) may act as a firewall by responding to input packets
(connection requests, for example) in the manner of an application, while blocking
other packets. A proxy server is a gateway from one network to another for a specific

6 | Page
By ARUN SHARMA
MALWARE + FIREWALL

network application, in the sense that it functions as a proxy on behalf of the network
user.

Proxies make tampering with an internal system from the external network more
difficult, so that misuse of one internal system would not necessarily cause a security
breach exploitable from outside the firewall (as long as the application proxy remains
intact and properly configured). Conversely, intruders may hijack a publicly reachable
system and use it as a proxy for their own purposes; the proxy then masquerades as
that system to other internal machines. While use of internal address spaces enhances
security, crackers may still employ methods such as IP spoofing to attempt to pass
packets to a target network.

7 | Page
By ARUN SHARMA
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP

What is cloud computing?


Simply put, cloud computing is the delivery of computing servicesservers, storage,
databases, networking, software, analytics and moreover the Internet (the cloud).
Companies offering these computing services are called cloud providers and typically
charge for cloud computing services based on usage, similar to how you are billed for
water or electricity at home.

Uses of cloud computing

You are probably using cloud computing right now, even if you dont realise it. If you use
an online service to send email, edit documents, watch movies or TV, listen to music,
play games or store pictures and other files, it is likely that cloud computing is making it
all possible behind the scenes. The first cloud computing services are barely a decade
old, but already a variety of organisationsfrom tiny startups to global corporations,
government agencies to non-profitsare embracing the technology for all sorts of
reasons. Here are a few of the things you can do with the cloud:
Create new apps and services Deliver software on demand
Store, back up and recover data Analyse data for patterns and
make predictions
Host websites and blogs
Stream audio and video

1 | Page
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP

Top benefits of cloud computing

Cloud computing is a big shift from the traditional way businesses think about IT
resources. What is it about cloud computing? Why is cloud computing so popular? Here
are 6 common reasons organisations are turning to cloud computing services:
1. Cost

Cloud computing eliminates the capital expense of buying hardware and software and
setting up and running on-site datacentersthe racks of servers, the round-the-clock
electricity for power and cooling, the IT experts for managing the infrastructure. It adds
up fast.

2. Speed

Most cloud computing services are provided self service and on demand, so even vast
amounts of computing resources can be provisioned in minutes, typically with just a few
mouse clicks, giving businesses a lot of flexibility and taking the pressure off capacity
planning.

3. Global scale

The benefits of cloud computing services include the ability to scale elastically. In cloud
speak, that means delivering the right amount of IT resourcesfor example, more or
less computing power, storage, bandwidthright when its needed and from the right
geographic location.

4. Productivity

On-site datacenters typically require a lot of racking and stackinghardware set up,
software patching and other time-consuming IT management chores. Cloud computing
removes the need for many of these tasks, so IT teams can spend time on achieving
more important business goals.

5. Performance

The biggest cloud computing services run on a worldwide network of secure


datacenters, which are regularly upgraded to the latest generation of fast and efficient
computing hardware. This offers several benefits over a single corporate datacenter,
including reduced network latency for applications and greater economies of scale.

2 | Page
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP

6. Reliability

Cloud computing makes data backup, disaster recovery and business continuity easier
and less expensive, because data can be mirrored at multiple redundant sites on the
cloud providers network.

Types of cloud services: IaaS, PaaS, SaaS

Most cloud computing services fall into three broad categories: infrastructure as a
service (IaaS), platform as a service (PaaS) and software as a service (Saas). These are
sometimes called the cloud computing stack, because they build on top of one another.

3 | Page
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP

Knowing what they are and how they are different makes it easier to accomplish your
business goals.

INFRASTRUCTURE-AS-A-SERVICE (IAAS)

The most basic category of cloud computing services. With IaaS, you rent IT
infrastructureservers and virtual machines (VMs), storage, networks, operating
systemsfrom a cloud provider on a pay-as-you-go basis.
Infrastructure as a service (IaaS) is an instant computing infrastructure, provisioned
and managed over the Internet. Quickly scale up and down with demand and pay only
for what you use.

IaaS helps you avoid the expense and complexity of buying and managing your own
physical servers and other datacenter infrastructure. Each resource is offered as a
separate service component and you only need to rent a particular one for as long as
you need it. The cloud computing service provider manages the infrastructure, while
you purchase, install, configure and manage your own softwareoperating systems,
middleware and applications.

Common IaaS business scenarios

Typical things businesses do with IaaS include:

Test and development. Teams can quickly set up and dismantle test and development
environments, bringing new applications to market faster. IaaS makes it quick and
economical to scale up dev-test environments up and down.

Website hosting. Running websites using IaaS can be less expensive than traditional
web hosting.

Storage, backup and recovery. Organisations avoid the capital outlay for storage and
complexity of storage management, which typically requires a skilled staff to manage

4 | Page
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP

data and meet legal and compliance requirements. IaaS is useful for handling
unpredictable demand and steadily growing storage needs. It can also simplify planning
and management of backup and recovery systems.

Web apps. IaaS provides all the infrastructure to support web apps, including storage,
web and application servers and networking resources. Organisations can quickly
deploy web apps on IaaS and easily scale infrastructure up and down when demand for
the apps is unpredictable.

High-performance computing. High-performance computing (HPC) on


supercomputers, computer grids or computer clusters helps solve complex problems
involving millions of variables or calculations. Examples include earthquake and protein
folding simulations, climate and weather predictions, financial modeling and evaluating
product designs.

Big data analysis. Big data is a popular term for massive data sets that contain
potentially valuable patterns, trends and associations. Mining data sets to locate or
tease out these hidden patterns requires a huge amount of processing power, which
IaaS economically provides.
Advantages of IaaS

Eliminates capital expense and reduces ongoing cost. IaaS sidesteps the upfront
expense of setting up and managing an on-site datacenter, making it an economical
option for start-ups and businesses testing new ideas.

Improves business continuity and disaster recovery. Achieving high availability,


business continuity and disaster recovery is expensive, since it requires a significant
amount of technology and staff. But with the right service level agreement (SLA) in
place, IaaS can reduce this cost and access applications and data as usual during a
disaster or outage.

Innovate rapidly. As soon as you have decided to launch a new product or initiative,
the necessary computing infrastructure can be ready in minutes or hours, rather than
the days or weeksand sometimes monthsit could take to set up internally.

Respond quicker to shifting business conditions. IaaS enables you to quickly scale
up resources to accommodate spikes in demand for your application during the
holidays, for examplethen scale resources back down again when activity decreases
to save money.

Focus on your core business. IaaS frees up your team to focus on your organisations
core business rather than on IT infrastructure.

Increase stability, reliability and supportability. With IaaS there is no need to


maintain and upgrade software and hardware or troubleshoot equipment problems.

5 | Page
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP

With the appropriate agreement in place, the service provider assures that your
infrastructure is reliable and meets SLAs.

Better security. With the appropriate service agreement, a cloud service provider can
provide security for your applications and data that may be better than what you can
attain in-house.

Gets new apps to users faster. Because you dont need to first set up the infrastructure
before you can develop and deliver apps, you can get them to users faster with IaaS.
PLATFORM AS A SERVICE (PAAS)
Platform-as-a-service (PaaS) refers to cloud computing services that supply an
on-demand environment for developing, testing, delivering and managing software
applications. PaaS is designed to make it easier for developers to quickly create web or
mobile apps, without worrying about setting up or managing the underlying
infrastructure of servers, storage, network and databases needed for development.
Platform as a service (PaaS) is a complete development and deployment environment in
the cloud, with resources that enable you to deliver everything from simple cloud-based
apps to sophisticated, cloud-enabled enterprise applications. You purchase the
resources you need from a cloud service provider on a pay-as-you-go basis and access
them over a secure Internet connection.

Like IaaS, PaaS includes infrastructureservers, storage and networkingbut also


middleware, development tools, business intelligence (BI) services, database
management systems and more. PaaS is designed to support the complete web
application lifecycle: building, testing, deploying, managing and updating.

PaaS allows you to avoid the expense and complexity of buying and managing software
licenses, the underlying application infrastructure and middleware or the development
tools and other resources. You manage the applications and services you develop and
the cloud service provider typically manages everything else.
Common PaaS scenarios

Organisations typically use PaaS for these scenarios:

Development framework. PaaS provides a framework that developers can build upon
to develop or customise cloud-based applications. Similar to the way you create an
Excel macro, PaaS lets developers create applications using built-in software
components. Cloud features such as scalability, high-availability and multi-tenant
capability are included, reducing the amount of coding that developers must do.

Analytics or business intelligence. Tools provided as a service with PaaS allow


organisations to analyse and mine their data, finding insights and patterns and

6 | Page
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP

predicting outcomes to improve forecasting, product design decisions, investment


returns and other business decisions.

Additional services. PaaS providers may offer other services that enhance
applications, such as workflow, directory, security and scheduling.
Advantages of PaaS

By delivering infrastructure as a service, PaaS offers the same advantages as IaaS. But
its additional featuresmiddleware, development tools and other business toolsgive
you more advantages:

Cut coding time. PaaS development tools can cut the time it takes to code new apps
with pre-coded application components built into the platform, such as workflow,
directory services, security features, search and so on.

Add development capabilities without adding staff. Platform as a Service


components can give your development team new capabilities without your needing to
add staff having the required skills.

Develop for multiple platformsincluding mobilemore easily. Some service


providers give you development options for multiple platforms, such as computers,
mobile devices and browsers making cross-platform apps quicker and easier to develop.

Use sophisticated tools affordably. A pay-as-you-go model makes it possible for


individuals or organisations to use sophisticated development software and business
intelligence and analytics tools that they could not afford to purchase outright.

Support geographically distributed development teams. Because the development


environment is accessed over the Internet, development teams can work together on
projects even when team members are in remote locations.

Efficiently manage the application lifecycle. PaaS provides all of the capabilities that
you need to support the complete web application lifecycle: building, testing, deploying,
managing and updating within the same integrated environment.

SOFTWARE AS A SERVICE (SAAS)

Software-as-a-service (SaaS) is a method for delivering software applications over the


Internet, on demand and typically on a subscription basis. With SaaS, cloud providers
host and manage the software application and underlying infrastructure and handle any
maintenance, like software upgrades and security patching. Users connect to the
application over the Internet, usually with a web browser on their phone, tablet or PC.

7 | Page
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP

oftware as a service (SaaS) allows users to connect to and use cloud-based apps over the
Internet. Common examples are email, calendaring and office tools (such as Microsoft
Office 365).

SaaS provides a complete software solution which you purchase on a pay-as-you-go


basis from a cloud service provider. You rent the use of an app for your organisation and
your users connect to it over the Internet, usually with a web browser. All of the
underlying infrastructure, middleware, app software and app data are located in the
service providers data center. The service provider manages the hardware and
software and with the appropriate service agreement, will ensure the availability and
the security of the app and your data as well. SaaS allows your organisation to get
quickly up and running with an app at minimal upfront cost.
Common SaaS scenarios

If you have used a web-based email service such as Outlook, Hotmail or Yahoo! Mail,
then you have already used a form of SaaS. With these services, you log into your
account over the Internet, often from a web browser. The email software is located on
the service providers network and your messages are stored there as well. You can
access your email and stored messages from a web browser on any computer or
Internet-connected device.

The previous examples are free services for personal use. For organisational use, you
can rent productivity apps, such as email, collaboration and calendaring; and
sophisticated business applications such as customer relationship management (CRM),
enterprise resource planning (ERP) and document management. You pay for the use of
these apps by subscription or according to the level of use.
Advantages of SaaS

Gain access to sophisticated applications. To provide SaaS apps to users, you dont
need to purchase, install, update or maintain any hardware, middleware or software.
SaaS makes even sophisticated enterprise applications, such as ERP and CRM,
affordable for organisations that lack the resources to buy, deploy and manage the
required infrastructure and software themselves.

Pay only for what you use. You also save money because the SaaS service
automatically scales up and down according to the level of usage.

Use free client software. Users can run most SaaS apps directly from their web
browser without needing to download and install any software, although some apps
require plugins. This means that you dont need to purchase and install special software
for your users.

Mobilise your workforce easily. SaaS makes it easy to mobilise your workforce
because users can access SaaS apps and data from any Internet-connected computer or
mobile device. You dont need to worry about developing apps to run on different types
of computers and devices because the service provider has already done so. In addition,
8 | Page
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP

you dont need to bring special expertise onboard to manage the security issues
inherent in mobile computing. A carefully chosen service provider will ensure the
security of your data, regardless of the type of device consuming it.

Access app data from anywhere. With data stored in the cloud, users can access their
information from any Internet-connected computer or mobile device. And when app
data is stored in the cloud, no data is lost if a users computer or device fails.

TYPES OF CLOUD DEPLOYMENTS: PUBLIC, PRIVATE, HYBRID

Not all clouds are the same. There are three different ways to deploy cloud computing
resources: public cloud, private cloud and hybrid cloud.

Public cloud

Public clouds are owned and operated by a third-party cloud service provider, which
deliver their computing resources like servers and storage over the Internet. Microsoft
Azure is an example of a public cloud. With a public cloud, all hardware, software and
other supporting infrastructure is owned and managed by the cloud provider. You
access these services and manage your account using a web browser.

Private cloud

A private cloud refers to cloud computing resources used exclusively by a single


business or organisation. A private cloud can be physically located on the companys
on-site datacenter. Some companies also pay third-party service providers to host their
private cloud. A private cloud is one in which the services and infrastructure are
maintained on a private network.

Hybrid cloud

9 | Page
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP

Hybrid clouds combine public and private clouds, bound together by technology that
allows data and applications to be shared between them. By allowing data and
applications to move between private and public clouds, hybrid cloud gives businesses
greater flexibility and more deployment options.

How cloud computing works

Cloud computing services all work a little differently, depending on the provider. But
many provide a friendly, browser-based dashboard that makes it easier for IT
professionals and developers to order resources and manage their accounts. Some cloud
computing services are also designed to work with REST APIs and a command-line
interface (CLI), giving developers multiple options.

OPEN-SOURCE SOFTWARE (OSS) is computer software with its source


code made available with a license in which the copyright holder provides the rights to
study, change, and distribute the software to anyone and for any purpose. Open-source
software may be developed in a collaborative public manner. According to scientists
who studied it, open-source software is a prominent example of open collaboration.

The open-source software development, or collaborative development from multiple


independent sources, generates an increasingly more diverse scope of design
perspective than any one company is capable of developing and sustaining long term

Open source software projects are built and maintained by a network of volunteer
programmers and are widely used in free as well as commercial products. Prime
examples of open-source products are the Apache HTTP Server, the e-commerce
platform osCommerce, internet browsers Mozilla Firefox and Chromium (the project
where the vast majority of development of the freeware Google Chrome is done) and the
full office suite LibreOffice. One of the most successful open-source products is
the GNU/Linux operating system, an open-source Unix-like operating system, and its
derivative Android, an operating system for mobile devices. In some industries, open
source software is the norm

INTERNET OF THINGS (IoT)


The Internet of things (IoT) is the inter-networking of physical devices, vehicles (also
referred to as "connected devices" and "smart devices"), buildings, and other
itemsembedded with electronics, software, sensors, actuators, and network
connectivity that enable these objects to collect and exchange data. In 2013 the Global

10 | Page
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP

Standards Initiative on Internet of Things (IoT-GSI) defined the IoT as "the


infrastructure of the information society." The IoT allows objects to be sensed or
controlled remotely across existing network infrastructure, creating opportunities for
more direct integration of the physical world into computer-based systems, and
resulting in improved efficiency, accuracy and economic benefit in addition to reduced
human intervention. When IoT is augmented with sensors and actuators, the technology
becomes an instance of the more general class of cyber-physical systems, which also
encompasses technologies such as smart grids, virtual power plants, smart
homes, intelligent transportation and smart cities. Each thing is uniquely identifiable
through its embedded computing system but is able to interoperate within the
existing Internet infrastructure. Experts estimate that the IoT will consist of almost 50
billion objects by 2020.

Typically, IoT is expected to offer advanced connectivity of devices, systems, and


services that goes beyond machine-to-machine (M2M) communications and covers a
variety of protocols, domains, and applications.[12] The interconnection of these
embedded devices (including smart objects), is expected to usher in automation in
nearly all fields, while also enabling advanced applications like a smart grid,[13] and
expanding to areas such as smart cities.

"Things," in the IoT sense, can refer to a wide variety of devices such as heart
monitoring implants, biochip transponders on farm animals, electric clams in coastal
waters, automobiles with built-in sensors, DNA analysis devices for
environmental/food/pathogen monitoringor field operation devices that assist
firefighters in search and rescue operations. Legal scholars suggest to look at "Things"
as an "inextricable mixture of hardware, software, data and service". These devices
collect useful data with the help of various existing technologies and then autonomously
flow the data between other devices. Current market examples include home
automation (also known as smart home devices) such as the control and automation of
lighting, heating (like smart thermostat), ventilation, air conditioning (HVAC) systems,
and appliances such as washer/dryers, robotic vacuums, air purifiers, ovens or
refrigerators/freezers that use Wi-Fi for remote monitoring.

As well as the expansion of Internet-connected automation into a plethora of new


application areas, IoT is also expected to generate large amounts of data from diverse
locations, with the consequent necessity for quick aggregation of the data, and an
increase in the need to index, store, and process such data more effectively. IoT is one of
the platforms of today's Smart City, and Smart Energy Management Systems.

The concept of the Internet of things was invented by and term coined by Peter T. Lewis
in September 1985 in a speech he delivered at a U.S. Federal Communications
Commission (FCC) supported session at the Congressional Black Caucus 15th
Legislative Weekend Conference.

11 | Page
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP

The Domain Name System (DNS) is a hierarchical decentralized naming system for
computers, services, or other resources connected to the Internet or a private network.
It associates various information with domain names assigned to each of the
participating entities. Most prominently, it translates more readily memorized domain
names to the numerical IP addresses needed for locating and identifying computer
services and devices with the underlying network protocols. By providing a worldwide,
distributed directory service, the Domain Name System is an essential component of the
functionality of the Internet.

The Domain Name System delegates the responsibility of assigning domain names and
mapping those names to Internet resources by designating authoritative name
servers for each domain. Network administrators may delegate authority
over sub-domains of their allocated name space to other name servers. This mechanism
provides distributed and fault tolerant service and was designed to avoid a single large
central database.

The Domain Name System also specifies the technical functionality of


the database service that is at its core. It defines the DNS protocol, a detailed
specification of the data structures and data communication exchanges used in the DNS,
as part of the Internet Protocol Suite. Historically, other directory services preceding
DNS were not scalable to large or global directories as they were originally based on
text files, prominently the HOSTS.TXT resolver.

The Internet maintains two principal namespaces, the domain name hierarchy and
the Internet Protocol (IP) address spaces. The Domain Name System maintains the
domain name hierarchy and provides translation services between it and the address
spaces. Internet name servers and a communication protocol implement the Domain
Name System. A DNS name server is a server that stores the DNS records for a domain; a
DNS name server responds with answers to queries against its database.

The most common types of records stored in the DNS database are for Start of Authority
(SOA), IP addresses (A and AAAA), SMTP mail exchangers (MX), name servers (NS),
pointers for reverse DNS lookups (PTR), and domain name aliases (CNAME). Although
not intended to be a general purpose database, DNS can store records for other types of
data for either automatic lookups, such as DNSSEC records, or for human queries such
as responsible person (RP) records. As a general purpose database, the DNS has also
been used in combating unsolicited email (spam) by storing a real-time blackhole list.
The DNS database is traditionally stored in a structured zone file.

What is a Gateway?

A gateway is a node (router) in a computer network, a key stopping point for data on its
way to or from other networks. Thanks to gateways, we are able to communicate and
send data back and forth. The Internet wouldn't be any use to us without gateways (as
well as a lot of other hardware and software).

12 | Page
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP

In a workplace, the gateway is the computer that routes traffic from a workstation to the
outside network that is serving up the Web pages. For basic Internet connections at
home, the gateway is the Internet Service Provider that gives you access to the entire
Internet.

A node is simply a physical place where the data stops for either transporting or
reading/using. (A computer or modem is a node; a computer cable isn't.) Here are a few
node notes:

On the Internet, the node that's a stopping point can be a gateway or a host
node.
A computer that controls the traffic your Internet Service Provider (ISP)
receives is a node.

If you have a wireless network at home that gives your entire family access to the
Internet, your gateway is the modem (or modem-router combo) your ISP provides so
you can connect to their network. On the other end, the computer that controls all of the
data traffic your Internet Service Provider (ISP) takes and sends out is itself a node.

When a computer-server acts as a gateway, it also operates as a firewall and a proxy


server. A firewall keeps out unwanted traffic and outsiders off a private network. A
proxy server is software that "sits" between programs on your computer that you use
(such as a Web browser) and a computer serverthe computer that serves your
network. The proxy server's task is to make sure the real server can handle your online
data requests.

Router at work.

A gateway is often associated with a router. A router is hardwarea small piece of


computer/network-related equipment that connects you to the Internet. In home
networks, the router comes with special software that you install on one computer.
You're then able to use the software to set up your home network so everyone allowed
on your network can connect to the ISP and the Internet. A router can be connected to
two or more networks at a time, but for home networks that's generally not the case.

When you do a Google search or compose an email and hit "Send," your computer sends
the data to your router. Your router then, which is hardwired to do its job right, figures
out the next destination of the data based on its "comprehension" of the condition of the
networks.

Routers can be gateways because a router can control the path through which
information is sent in and out. It does so by using built-in headers and forwarding tables

13 | Page
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP

to figure out where packets of data need to be sent. Those packets of data carry your
emails, transactions, online activity and so on.

A gateway is one of the many ways our data is moved over the Web for us. The gateway
gives us entry into different networks so we can send email, look at Web pages, buy
things online, and more. You can easily say that gateways deliver the freedom,
information and convenience we enjoy online.

WHAT IS AN INTERNET SERVICE PROVIDER?An Internet Service Provider


(ISP) is the industry term for the company that is able to provide you with access to the
Internet, typically from a computer. If you hear someone talking about the Internet and
they mention their "provider," they're usually talking about their ISP.

Your ISP makes the Internet a possibility. In other words, you can have shiny computer
with a built-in modem and could have a router for networking, but without a
subscription with an ISP, you won't have a connection to the Internet.

For the typical homeowner or apartment dweller, the ISP is usually a "cable company"
that, in addition or offering a TV subscription, also offers an Internet subscription. You
don't get both for the price of one, however. You can get just cable TV or just high-speed
Internet, or both.

An ISP is your gateway to the Internet and everything else you can do online. The
second your connection is activated and set up, you'll be able to send emails, go
shopping, do research and more. The ISP is the link or conduit between your computer
and all the other "servers" on the Internet. You may feel like you're talking to your mom
directly through email, but in reality it's more "indirectly." Your email goes from your
computer, to the ISP computers/servers, where it's sent along to its destination through
other servers on the network.

Of course, that's its "electronic" path: the transmission is still virtually instantaneous.

Every home or organization with Internet access has an ISP. The good news is, we don't
all have to have the same provider to communicate with each other and we don't have
to pay anything extra to communicate with someone who has a different ISP.

Whereas just about anyone can have a website, not everyone can be an ISP. It takes
money, infrastructure and a lot of very smart technicians. Your ISP maintains miles of
cabling, employs hundreds of technicians and maintains network services for its

14 | Page
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP

hundreds of thousands of subscribers. Depending on where you live, you typically have
a choice of ISPs.

Types of ISPs

In the 1990s, there were three types of ISPs: dial-up services, high-speed Internet (also
referred to as "broadband") offered by cable companies, and DSL (Digital Line
Subscribers) offered by phone companies. By 2013, dial-up services were rare (even
though they were cheap), because they were very slow...and the other ISP options were
typically readily available and much, much faster.

DSL and Cable.

Two of the leading DSL ISPs have been Verizon and AT&T. But in the last few years
(from 2013), DSL has been on the decline, while cable-based ISPs, like Comcast and
Time Warner, have been growing. Why the change? It's because the phone companies
have been getting more into the lucrative smartphone business, and selling annual
contracts for cellular service along with...smartphone Internet capabilities.

That's left a lot of the broadband business for the cable companies.

Fiber Internet: On its way to you?

With DSL dropping out of the picture, there's room for a new technology and it's already
here in some areas: it's called fiber, or fiber optical, broadband. Supposedly, fiber is
hundreds times FASTER than cable or DSL. That's especially exciting news (if it's true
and available) to companies, and gamers and households with a lot of simultaneous
wireless usage going on.

Verizon (yes, they are downplaying DSL) now offers FiOS in select areas (put an "f"
before "eye" and the "os"-sound in "most"). FiOS stands for fiber optic services, and it
claims to have superfast Internet connection speeds.

And for all of us not in the Kansas area, Google launched Google Fiber in 2013, which
offers incredibly ultra-fast Internet speed. Other companies (and communities) are
teaming up to bring the next generation of broadband to you.

Flash: Flash is an embedded animation software/program that displays small


animations on web pages; like the how many ducks can you shoot!

15 | Page
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP

URL: Uniform Resource Locater is nothing but a web pages address, or in other words
URL specifies the address of every file on the internet.
The protocol to be used to access the file = {http://}

The IP address = {www.gmail}

The domain name = {.com} Intranet

Web Crawler: is a program that visits web sites and reads their pages and other
information in order to create entries for a search engine index.

16 | Page

Potrebbero piacerti anche