Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
AND
COMMUNICATION
TECHNOLOGIES
BY ARUN SHARMA
E GOVERNANCE INITIATIVES IN INDIA
The World Bank in its report on E-Governance has defined E-Governance as:
Use by government agencies of information technologies to improve and transform
relations with citizens, businesses, and other arms of government.
3. DATA CONTENT: - To share any kind of knowledge or information over the internet,
there should be its database. This database should have the data content which is
related to government services.
There has also been an increased efficiency in the functioning of the government
services because of computerization of services like ration cards, income certificates,
building licences, Passport/VISA, Pensions, Road Transport, Property Registration,
Railway services, land records, and income tax payments etc. which has made life
convenient, efficient and transparent for the citizens.
The growth of e-governance first began with National Informatics Centre (NIC)
being established in 1977. This was a first major step towards e-Governance in India.
Subsequently there were many initiatives that were launched to support the growth of
e-governance in India. The launch of NICNET in 1987 was one of the driving forces for
e-Governance.
E-Governance was started in India by AHSHAYA in Kerala. This project involves setting
up around 5000 multipurpose community technology centers called Akshaya e-
Kendras across Kerala. Run by private entrepreneurs, each e-Kendra set up within 2-3
1 | Page
BY ARUN SHARMA
E GOVERNANCE INITIATIVES IN INDIA
The other significant initiatives include the creation of A Union Ministry of Information
Technology in 1999, identification of a 12-point minimum agenda for e-Governance by
Government of India for implementation in all the Union Government Ministries and
Departments by 2000 and the National e-Governance Plan (NeGP) established in
2006, which set out an impressive agenda for developing e-Government services.
eKranti or NeGP 2.0 was also conceptualized with a focus on electronic delivery
of services. LATER DIGITAL INDIA WHICH WAS LAUNCHED ON 1 JULY 2015 IS AN
INITIATIVE TO ENSURE THAT GOVERNMENT SERVICES ARE MADE AVAILABLE TO
CITIZENS ELECTRONICALLY BY IMPROVING ONLINE INFRASTRUCTURE AND BY
INCREASING INTERNET CONNECTIVITY. (ESE 2017)
Its services include online payment of utility bills, issuing certificates, issuing licenses &
permits, e-forms etc started in 1999.It was designed to provide Government to Citizen
services. It delivers services online to consumers by connecting them to the respective
2 | Page
BY ARUN SHARMA
E GOVERNANCE INITIATIVES IN INDIA
The project has become very popular among the citizens especially for payment of
utility bills. Success of this project is largely based on payment of electricity bills. It
exemplifies the potential for integration of delivery of Union, State and Local
Government services at one point. However, it also shows that the model based on
payment of utility bills could not be rolled out in the rural hinterland.
Caste certificate
3 | Page
BY ARUN SHARMA
E GOVERNANCE INITIATIVES IN INDIA
Lokvani is a public-private partnership project at Sitapur District in Uttar Pradesh which was
initiated in November, 2004. Its objective is to provide a single window, self sustainable
e-Governance solution with regard to handling of grievances, land record maintenance and
providing a mixture of essential services. As 88 per cent of the District population resides in
villages and the literacy rate is only 38 per cent, the programme had to be designed in a way
which was user-friendly and within the reach of the people both geographically as well as
socially. To achieve this, the programme format uses the local language, Hindi, and is spread
throughout the district to a chain of 109 Lokvani Kiosk Centres. These Kiosks have been
established by licensing the already existing cyber cafes. The services offered by Lokvani are:
c. Information of various
Government schemes
d. Online availability of
prescribed Government
forms
4 | Page
BY ARUN SHARMA
E GOVERNANCE INITIATIVES IN INDIA
This e-Governance initiative builds upon the experiences gained through the LokMitra and
JanMitra pilot projects launched in 2002. While LokMitra was centred in the city of Jaipur,
JanMitra was piloted in Jhalawar district to provide information and services under one roof
to urban and rural populations. e-Mitra is an integration of these two projects in all the 32
districts using PPP model. There are two major components back office processing and
service counters. Back office processing includes computerization of participating
departments and establishing an IT enabled hub in form of a mini data centre at the district
level (e-Mitra data centre). All participating departments and the service centres hook up to
this data centre. It is managed by the Facility Management Service Provider on behalf of the
district e-Governance Society (under Chairmanship of the district collector). Private partners
(Local Service Providers) run the kiosks/centres. In case of collection on account of payment
of utility bills and government levies, the Local Service Provider does not charge the citizen,
but gets reimbursement from the concerned organization through the e-Mitra Society. In case
of other services, the transaction fees is prescribed by the Society.
FRIENDS (Fast, Reliable, Instant, Efficient Network for the Disbursement of Services)
which was launched in June 2000 is a Single Window Facility providing citizens the
means to pay taxes and other financial dues to the State Government. Its services are
provided through FRIENDS Janasevana Kendrams. This project is a classic case of
achieving front end computerized service delivery to citizens without waiting for
completion of back end computerization in various government departments.
This project thus tries to avoid the complex issues involved in business process
re-engineering in the participating departments. FRIENDS counters are not even
networked with the participating departments or entities. Print-outs of payments made
through the counters are physically distributed to participating entities for processing.
5 | Page
BY ARUN SHARMA
E GOVERNANCE INITIATIVES IN INDIA
The manual tender system suffered from various deficiencies, including discrimination,
cartel formation, delays, lack of transparency etc. The e-Procurement project was
introduced in 2003. The benefits of the new system are as follows were reduction in
tender cycle time, reduction in opportunities for corrupt practices,
Cost Savings, substantial reduction in the advertisement costs in the press media,
Transparency in the bidding process .Besides, it has made a visible social impact, as
citizens are assured that government procurement is conducted in a transparent
manner, saving taxpayers money.
9. MCA 21
The Ministry of Corporate Affairs has implemented the MCA 21 Mission Mode Project under
the NeGP in September 2006 and presently the project is in the post-implementation phase.
The project aims at providing easy and secure online access to all registry related services
provided by the Union Ministry of Corporate Affairs to corporates and other stakeholders at
any time and in a manner that best suits them. The goals of this project were formulated
keeping in mind different stakeholders. These were:
b. Public: to get easy access to relevant records and effective grievances redressal.
The solution automates the functioning of all levels of Government entities and provides
a well defined mechanism for transforming the hard copy environment to a digital
environment. It enhances productivity through use of IT as a tool.
SmartGov replaces the paper file with an e-file. SmartGov provides the features of
creation, movement, tracking and closure of e-files, automation of repetitive tasks,
decision support system through knowledge management, prioritization of work, easy
6 | Page
BY ARUN SHARMA
E GOVERNANCE INITIATIVES IN INDIA
Digital India:
Digital India is the latest initiative which is being coordinated and implemented by the
Department of Electronics and IT, it is a program that aims at transforming the country
through leveraging information and communication technologies in every sphere of
economy and society.
The approach and methodology being adopted for the programme according to
the Digital India portal are
Ministries, Departments and States would fully leverage the Common and
Support ICT Infrastructure established by Government of India. Department of
Electronics and Information Technology (DeitY) would also evolve or lay down
standards and policy guidelines, provide technical and handholding support,
undertake capacity building, R&D, etc.
The existing or ongoing e-Governance initiatives would be suitably revamped to
align them with the principles of Digital India. Scope enhancement, Process
Reengineering, use of integrated & interoperable systems and deployment of
emerging technologies like cloud & mobile would be undertaken to enhance the
delivery of Government services to citizens.
States would be given flexibility to identify for inclusion additional state-specific
projects, which are relevant for their socio-economic needs.
E-Governance would be promoted through a centralized initiative to the extent
necessary, to ensure citizen centric service orientation, interoperability of
various e-Governance applications and optimal utilization of ICT infrastructure/
resources, while adopting a decentralized implementation model.
Successes would be identified and their replication promoted proactively with
the required productization and customization wherever needed.
Public Private Partnerships would be preferred wherever feasible to implement
e-Governance projects with adequate management and strategic control.
7 | Page
BY ARUN SHARMA
E GOVERNANCE INITIATIVES IN INDIA
E-Governance is not only popular in India but also worldwide. To make working of
government more efficient, responsive and transparent many developed and
developing countries have taken some useful steps for the expansion of egovernance
8 | Page
BY ARUN SHARMA
E GOVERNANCE INITIATIVES IN INDIA
UK: In April 2000, the cabinet Office in the UK came out with the document E
Government: A Strategic Framework for Public Services in the Information Age .
Various projects:-
1. Cornwall Electronic Health Record Pilot: - this project was started in April 2000. It
aimed to:-
Pan-community EHR demonstrator
Connect all General Practitioners to NHSnet (national-level NHS Virtual Private
Network or intranet)
24 hour emergency care record
Common information architecture
Condition-specific care modules mental health, coronary heart disease, diabetic
care
2. Go-between Project: - this project is for Calne Community Area in Wiltshire. This
project is designed to assist a local rural community organize its transport services by
identifying unmet local demand and matching it with spare capacity
New Zealand
In May 2000,Realising the importance of opportunities offered by ICT, the New Zealand
Government came out with its e-government vision document and an E-Government
Unit was established by the State Services commission
Various projects:-
The Treaty of Wetangi: It is the founding document of New Zealand. This website,
launched in 2003, to provide information and resources for an informed understanding
and greater public knowledge of the treaty
10 | Page
BY ARUN SHARMA
E -LEARNING IN INDIA
Spoken Tutorial
ERP Mission
The Spoken Tutorial project is the
The ERP mission is to Implement,
initiative of the Talk to a Teacher
maintain, improve, and support the
activity of the National Mission on
County's integrated financial,
Education through Information and
procurement, human resource and
Communication Technology (ICT),
payroll information systems.
launched by the Ministry of Human
Resources and Development, ISLERS
Government of India.
This project is aimed to develop an
CEC automatic Indian Sign Language
education and recognition platform for
Annually CEC organises Video
hearing impaired students of India. The
Competition and Prakriti.Prakriti is an
system can substantially help in the
annual film festival on
primary/vocational/higher education of
environment,human rights &
hearing impaired students and people of
development.Video Competition is an
India. The framework is proposed to be
annual competition meant to nurture
extended to 14 different languages of
within media centres and other
India with extensive interactive features
educational institutes in the country.
in the audio-visual mode. .
E-Yantra
Oscar++
1 | Page
BY ARUN SHARMA
SOURCE :MHRD+ others
E -LEARNING IN INDIA
3 | Page
BY ARUN SHARMA
SOURCE :MHRD+ others
E -LEARNING IN INDIA
develop and maintain the database of technology and the internet, at selected
profile of human resources. remote centers across the country.
2. Google Talk (also known as Google Chat) is an instant messaging service that
provides both text and voice communication.
10.RSS (Rich Site Summary; originally RDF Site Summary; often called Really Simple
Syndication) uses a family of standard web feed formats to publish frequently
updated information: blog entries, news headlines, audio, video. ... RSS
feeds enable publishers to syndicate data automatically.
13. An Internet forum, or message board, is an online discussion site where people
can hold conversations in the form of posted messages. They differ from chat
rooms in that messages are often longer than one line of text, and are at least
temporarily archived.
Myspace was acquired by News Corporation in July 2005 for $580 million From
2005 to 2009, Myspace was the largest social networking site in the world, and in
June 2006 surpassed Google as the most visited website in the United States In
April 2008, Myspace was overtaken by Facebook in the number of unique
worldwide visitors, and was surpassed in the number of unique U.S. visitors in
May 2009, though Myspace generated $800 million in revenue during the 2008
fiscal year. Since then, the number of Myspace users has declined steadily in
spite of several redesigns. As of October 2016, Myspace was ranked 2,154 by
total Web traffic, and 1,522 In the United States.
16.Orkut was a social networking website owned and operated by Google. The
service was designed to help users meet new and old friends and maintain
existing relationships. The website was named after its creator, Google
employee Orkut Buyukkokten. On June 30, 2014, Google announced it would be
closing Orkut on September 30, 2014. No new accounts could be created starting
from July 2014. Users can download their profile archive by Google Takeout.
Orkut was one of the most visited websites in India and Brazil in 2008. In 2008
Google announced that Orkut would be fully managed and operated in Brazil, by
Google Brazil, in the city of Belo Horizonte. This was decided due to the large
Brazilian user base and growth of legal issues.
17.Twitter is an online news and social networking service where users post and
interact with messages, "tweets," restricted to 140 characters. Registered users
2 | Page
BY ARUN SHARMA
SOME FACTS TO KNOW ABOUT SOCIAL NETWORKING
can post tweets, but those who are unregistered can only read them. Users
access Twitter through its website interface, SMS or a mobile device app. Twitter
Inc. is based in San Francisco, California, United States, and has more than 25
offices around the world.Twitter was created in March 2006 by Jack
Dorsey, Noah Glass, Biz Stone, and Evan Williams and launched in July, whereby
the service rapidly gained worldwide popularity. In 2012, more than 100 million
users posted 340 million tweets a day, and the service handled an average of 1.6
billion search queries per day. In 2013, it was one of the ten most-visited
websites and has been described as "the SMS of the Internet". As of 2016, Twitter
had more than 319 million monthly active users. On the day of the 2016 U.S.
presidential election, Twitter proved to be the largest source of breaking news,
with 40 million tweets sent by 10 p.m. (Eastern Time) that day.
3 | Page
BY ARUN SHARMA
SOME FACTS TO KNOW ABOUT SOCIAL NETWORKING
is inspired from the term googol. The domain google.com was later registered on
September 15, 1997, and the company incorporated on September 4, 1998.
21. A blog is an internet entity (like a website) which acts as a journal, or a diary, or
a canvas to post your thoughts and opinions pertaining to a particular subject
matter.
Blog = Web( Internet, world wide web)+ Log (diary, journal entry, record)
4 | Page
BY ARUN SHARMA
MALWARE + FIREWALL
MALWARE
Malware, short for malicious software, is any software used to disrupt computer or
mobile operations, gather sensitive information, gain access to private computer
systems, or display unwanted advertising. Before the term malware was coined by
Yisrael Radai in 1990, malicious software was referred to as computer viruses. The first
category of malware propagation concerns parasitic software fragments that attach
themselves to some existing executable content. The fragment may be machine code
that infects some existing application, utility, or system program, or even the code used
to boot a computer system. Malware is defined by its malicious intent, acting against the
requirements of the computer user, and does not include software that causes
unintentional harm due to some deficiency.
Malware may be stealthy, intended to steal information or spy on computer users for an
extended period without their knowledge, as for example Regin, or it may be designed
to cause harm, often as sabotage (e.g., Stuxnet), or to extort payment (CryptoLocker).
'Malware' is an umbrella term used to refer to a variety of forms of hostile or intrusive
software, including computer viruses, worms, trojan
horses, ransomware, spyware, adware, scareware, and other malicious programs. It can
take the form of executable code, scripts, active content, and other software. Malware is
often disguised as, or embedded in, non-malicious files. As of 2011 the majority of active
malware threats were worms or trojans rather than viruses.
Software such as anti-virus and firewalls are used to protect against activity identified
as malicious, and to recover from attacks.
Viruses
A computer program usually hidden within another seemingly innocuous program that
produces copies of itself and inserts them into other programs or files, and that usually
performs a malicious action (such as destroying data).
Trojan horses
In computing, Trojan horse, or Trojan, is any malicious computer program which
misrepresents itself to appear useful, routine, or interesting in order to persuade a
victim to install it. The term is derived from the Ancient Greek story of the wooden
horse that was used to help Greek troops invade the city of Troy by stealth.
1 | Page
By ARUN SHARMA
MALWARE + FIREWALL
Trojans are generally spread by some form of social engineering, for example where a
user is duped into executing an e-mail attachment disguised to be unsuspicious, (e.g., a
routine form to be filled in), or by drive-by download. Although their payload can be
anything, many modern forms act as a backdoor, contacting a controller which can then
have unauthorized access to the affected computer. While Trojans and backdoors are
not easily detectable by themselves, computers may appear to run slower due to heavy
processor or network usage.
Unlike computer viruses and worms, Trojans generally do not attempt to inject
themselves into other files or otherwise propagate themselves.
Rootkits
Once a malicious program is installed on a system, it is essential that it stays concealed,
to avoid detection. Software packages known as rootkits allow this concealment, by
modifying the host's operating system so that the malware is hidden from the user.
Rootkits can prevent a malicious process from being visible in the system's list
of processes, or keep its files from being read.
Some malicious programs contain routines to defend against removal, not merely to
hide themselves. An early example of this behavior is recorded in the Jargon File tale of
a pair of programs infesting a Xerox CP-V time sharing system:
Each ghost-job would detect the fact that the other had been killed, and would start a
new copy of the recently stopped program within a few milliseconds. The only way to
kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash
the system.
Backdoors
A backdoor is a method of bypassing normal authentication procedures, usually over a
connection to a network such as the Internet. Once a system has been compromised,
one or more backdoors may be installed in order to allow access in the future, invisibly
to the user.
The idea has often been suggested that computer manufacturers preinstall backdoors
on their systems to provide technical support for customers, but this has never been
reliably verified. It was reported in 2014 that US government agencies had been
diverting computers purchased by those considered "targets" to secret workshops
where software or hardware permitting remote access by the agency was installed,
considered to be among the most productive operations to obtain access to networks
around the world. Backdoors may be installed by Trojan horses, worms, implants, or
other methods.
Evasion
Since the beginning of 2015, a sizable portion of malware utilizes a combination of
many techniques designed to avoid detection and analysis.
The most common evasion technique is when the malware evades analysis and
detection by fingerprinting the environment when executed.
The second most common evasion technique is confusing automated tools'
detection methods. This allows malware to avoid detection by technologies such
2 | Page
By ARUN SHARMA
MALWARE + FIREWALL
Grayware
Grayware is a term applied to unwanted applications or files that are not classified as
malware, but can worsen the performance of computers and may cause security risks.
It describes applications that behave in an annoying or undesirable manner, and yet are
less serious or troublesome than malware. Grayware
encompasses spyware, adware, fraudulent dialers, joke programs, remote access
tools and other unwanted programs that harm the performance of computers or cause
inconvenience. The term came into use around 2004.
Software maker Malwarebytes lists several criteria for classifying a program as a PUP.
Some adware (using stolen certificates) disables anti-malware and virus protection;
technical remedies are available.
software on one host that controls network traffic in and out of that single machine.
Firewall appliances may also offer other functionality to the internal network they
protect, such as acting as a DHCP or VPN server for that network.
The first type of firewall was the packet filter which looks at network addresses and
ports of the packet and determines if that packet should be allowed or blocked.
Packet filters act by inspecting the "packets" which are transferred between computers
on the Internet. If a packet does not match the packet filter's set of filtering rules, the
packet filter will drop (silently discard) the packet or reject it (discard it, and send
"error responses" to the source). Conversely, if the packet matches one or more of the
programmed filters, the packet is allowed to pass. This type of packet filtering pays no
attention to whether a packet is part of an existing stream of traffic (i.e. it stores no
information on connection "state"). Instead, it filters each packet based only on
information contained in the packet itself (most commonly using a combination of the
packet's source and destination address, its protocol, and, for TCP and UDP traffic,
the port number). TCP and UDP protocols constitute most communication over the
Internet, and because TCP and UDP traffic by convention uses well known ports for
particular types of traffic, a "stateless" packet filter can distinguish between, and thus
control, those types of traffic (such as web browsing, remote printing, email
transmission, file transfer), unless the machines on each side of the packet filter are
both using the same non-standard ports.
Packet filtering firewalls work mainly on the first three layers of the OSI reference
model, which means most of the work is done between the network and physical layers,
with a little bit of peeking into the transport layer to figure out source and destination
port numbers. When a packet originates from the sender and filters through a firewall,
the device checks for matches to any of the packet filtering rules that are configured in
the firewall and drops or rejects the packet accordingly. When the packet passes
through the firewall, it filters the packet on a protocol/port number basis (GSS). For
example, if a rule in the firewall exists to block telnet access, then the firewall will block
the TCP protocol for port number 23.
Second generation: "stateful" filters
Second-generation firewalls perform the work of their first-generation predecessors but
operate up to layer 4 (transport layer) of the OSI model. This is achieved by retaining
packets until enough information is available to make a judgement about its
state. Known as stateful packet inspection, it records all connections passing through it
and determines whether a packet is the start of a new connection, a part of an existing
connection, or not part of any connection. Though static rules are still used, these rules
can now contain connection state as one of their test criteria.
4 | Page
By ARUN SHARMA
MALWARE + FIREWALL
As of 2012, the so-called next-generation firewall (NGFW) is nothing more than the
"wider" or "deeper" inspection at application stack. For example, the existing deep
packet inspection functionality of modern firewalls can be extended to include
Intrusion prevention systems (IPS)
User identity management integration (by binding user IDs to IP or MAC addresses
for "reputation")
Web application firewall (WAF). WAF attacks may be implemented in the tool "WAF
Fingerprinting utilizing timing side channels" (WAFFle)
Network layer firewalls generally fall into two sub-categories, stateful and stateless.
Stateful firewalls maintain context about active sessions, and use that "state
information" to speed packet processing. Any existing network connection can be
described by several properties, including source and destination IP address, UDP or
TCP ports, and the current stage of the connection's lifetime (including session
initiation, handshaking, data transfer, or completion connection). If a packet does not
match an existing connection, it will be evaluated according to the ruleset for new
connections. If a packet matches an existing connection based on comparison with the
firewall's state table, it will be allowed to pass without further processing.
5 | Page
By ARUN SHARMA
MALWARE + FIREWALL
Stateless firewalls require less memory, and can be faster for simple filters that require
less time to filter than to look up a session. They may also be necessary for filtering
stateless network protocols that have no concept of a session. However, they cannot
make more complex decisions based on what stage communications between hosts
have reached.
Newer firewalls can filter traffic based on many packet attributes like source IP address,
source port, destination IP address or port, destination service like HTTP or FTP. They
can filter based on protocols, TTL values, network block of the originator, of the source,
and many other attributes.
Application-layer
Application-layer firewalls work on the application level of the TCP/IP stack (i.e., all
browser traffic, or all telnet or FTP traffic), and may intercept all packets traveling to or
from an application. They block other packets (usually dropping them without
acknowledgment to the sender).
On inspecting all packets for improper content, firewalls can restrict or prevent outright
the spread of networked computer worms and Trojans. The additional inspection
criteria can add extra latency to the forwarding of packets to their destination.
Also, application firewalls further filter connections by examining the process ID of data
packets against a rule set for the local process involved in the data transmission. The
extent of the filtering that occurs is defined by the provided rule set. Given the variety of
software that exists, application firewalls only have more complex rule sets for the
standard services, such as sharing services. These per-process rule sets have limited
efficacy in filtering every possible association that may occur with other processes. Also,
these per-process rule sets cannot defend against modification of the process via
exploitation, such as memory corruption exploits. Because of these limitations,
application firewalls are beginning to be supplanted by a new generation of application
firewalls that rely on mandatory access control (MAC), also referred to as sandboxing, to
protect vulnerable services.
Proxies
A proxy server (running either on dedicated hardware or as software on a
general-purpose machine) may act as a firewall by responding to input packets
(connection requests, for example) in the manner of an application, while blocking
other packets. A proxy server is a gateway from one network to another for a specific
6 | Page
By ARUN SHARMA
MALWARE + FIREWALL
network application, in the sense that it functions as a proxy on behalf of the network
user.
Proxies make tampering with an internal system from the external network more
difficult, so that misuse of one internal system would not necessarily cause a security
breach exploitable from outside the firewall (as long as the application proxy remains
intact and properly configured). Conversely, intruders may hijack a publicly reachable
system and use it as a proxy for their own purposes; the proxy then masquerades as
that system to other internal machines. While use of internal address spaces enhances
security, crackers may still employ methods such as IP spoofing to attempt to pass
packets to a target network.
7 | Page
By ARUN SHARMA
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP
You are probably using cloud computing right now, even if you dont realise it. If you use
an online service to send email, edit documents, watch movies or TV, listen to music,
play games or store pictures and other files, it is likely that cloud computing is making it
all possible behind the scenes. The first cloud computing services are barely a decade
old, but already a variety of organisationsfrom tiny startups to global corporations,
government agencies to non-profitsare embracing the technology for all sorts of
reasons. Here are a few of the things you can do with the cloud:
Create new apps and services Deliver software on demand
Store, back up and recover data Analyse data for patterns and
make predictions
Host websites and blogs
Stream audio and video
1 | Page
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP
Cloud computing is a big shift from the traditional way businesses think about IT
resources. What is it about cloud computing? Why is cloud computing so popular? Here
are 6 common reasons organisations are turning to cloud computing services:
1. Cost
Cloud computing eliminates the capital expense of buying hardware and software and
setting up and running on-site datacentersthe racks of servers, the round-the-clock
electricity for power and cooling, the IT experts for managing the infrastructure. It adds
up fast.
2. Speed
Most cloud computing services are provided self service and on demand, so even vast
amounts of computing resources can be provisioned in minutes, typically with just a few
mouse clicks, giving businesses a lot of flexibility and taking the pressure off capacity
planning.
3. Global scale
The benefits of cloud computing services include the ability to scale elastically. In cloud
speak, that means delivering the right amount of IT resourcesfor example, more or
less computing power, storage, bandwidthright when its needed and from the right
geographic location.
4. Productivity
On-site datacenters typically require a lot of racking and stackinghardware set up,
software patching and other time-consuming IT management chores. Cloud computing
removes the need for many of these tasks, so IT teams can spend time on achieving
more important business goals.
5. Performance
2 | Page
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP
6. Reliability
Cloud computing makes data backup, disaster recovery and business continuity easier
and less expensive, because data can be mirrored at multiple redundant sites on the
cloud providers network.
Most cloud computing services fall into three broad categories: infrastructure as a
service (IaaS), platform as a service (PaaS) and software as a service (Saas). These are
sometimes called the cloud computing stack, because they build on top of one another.
3 | Page
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP
Knowing what they are and how they are different makes it easier to accomplish your
business goals.
INFRASTRUCTURE-AS-A-SERVICE (IAAS)
The most basic category of cloud computing services. With IaaS, you rent IT
infrastructureservers and virtual machines (VMs), storage, networks, operating
systemsfrom a cloud provider on a pay-as-you-go basis.
Infrastructure as a service (IaaS) is an instant computing infrastructure, provisioned
and managed over the Internet. Quickly scale up and down with demand and pay only
for what you use.
IaaS helps you avoid the expense and complexity of buying and managing your own
physical servers and other datacenter infrastructure. Each resource is offered as a
separate service component and you only need to rent a particular one for as long as
you need it. The cloud computing service provider manages the infrastructure, while
you purchase, install, configure and manage your own softwareoperating systems,
middleware and applications.
Test and development. Teams can quickly set up and dismantle test and development
environments, bringing new applications to market faster. IaaS makes it quick and
economical to scale up dev-test environments up and down.
Website hosting. Running websites using IaaS can be less expensive than traditional
web hosting.
Storage, backup and recovery. Organisations avoid the capital outlay for storage and
complexity of storage management, which typically requires a skilled staff to manage
4 | Page
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP
data and meet legal and compliance requirements. IaaS is useful for handling
unpredictable demand and steadily growing storage needs. It can also simplify planning
and management of backup and recovery systems.
Web apps. IaaS provides all the infrastructure to support web apps, including storage,
web and application servers and networking resources. Organisations can quickly
deploy web apps on IaaS and easily scale infrastructure up and down when demand for
the apps is unpredictable.
Big data analysis. Big data is a popular term for massive data sets that contain
potentially valuable patterns, trends and associations. Mining data sets to locate or
tease out these hidden patterns requires a huge amount of processing power, which
IaaS economically provides.
Advantages of IaaS
Eliminates capital expense and reduces ongoing cost. IaaS sidesteps the upfront
expense of setting up and managing an on-site datacenter, making it an economical
option for start-ups and businesses testing new ideas.
Innovate rapidly. As soon as you have decided to launch a new product or initiative,
the necessary computing infrastructure can be ready in minutes or hours, rather than
the days or weeksand sometimes monthsit could take to set up internally.
Respond quicker to shifting business conditions. IaaS enables you to quickly scale
up resources to accommodate spikes in demand for your application during the
holidays, for examplethen scale resources back down again when activity decreases
to save money.
Focus on your core business. IaaS frees up your team to focus on your organisations
core business rather than on IT infrastructure.
5 | Page
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP
With the appropriate agreement in place, the service provider assures that your
infrastructure is reliable and meets SLAs.
Better security. With the appropriate service agreement, a cloud service provider can
provide security for your applications and data that may be better than what you can
attain in-house.
Gets new apps to users faster. Because you dont need to first set up the infrastructure
before you can develop and deliver apps, you can get them to users faster with IaaS.
PLATFORM AS A SERVICE (PAAS)
Platform-as-a-service (PaaS) refers to cloud computing services that supply an
on-demand environment for developing, testing, delivering and managing software
applications. PaaS is designed to make it easier for developers to quickly create web or
mobile apps, without worrying about setting up or managing the underlying
infrastructure of servers, storage, network and databases needed for development.
Platform as a service (PaaS) is a complete development and deployment environment in
the cloud, with resources that enable you to deliver everything from simple cloud-based
apps to sophisticated, cloud-enabled enterprise applications. You purchase the
resources you need from a cloud service provider on a pay-as-you-go basis and access
them over a secure Internet connection.
PaaS allows you to avoid the expense and complexity of buying and managing software
licenses, the underlying application infrastructure and middleware or the development
tools and other resources. You manage the applications and services you develop and
the cloud service provider typically manages everything else.
Common PaaS scenarios
Development framework. PaaS provides a framework that developers can build upon
to develop or customise cloud-based applications. Similar to the way you create an
Excel macro, PaaS lets developers create applications using built-in software
components. Cloud features such as scalability, high-availability and multi-tenant
capability are included, reducing the amount of coding that developers must do.
6 | Page
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP
Additional services. PaaS providers may offer other services that enhance
applications, such as workflow, directory, security and scheduling.
Advantages of PaaS
By delivering infrastructure as a service, PaaS offers the same advantages as IaaS. But
its additional featuresmiddleware, development tools and other business toolsgive
you more advantages:
Cut coding time. PaaS development tools can cut the time it takes to code new apps
with pre-coded application components built into the platform, such as workflow,
directory services, security features, search and so on.
Efficiently manage the application lifecycle. PaaS provides all of the capabilities that
you need to support the complete web application lifecycle: building, testing, deploying,
managing and updating within the same integrated environment.
7 | Page
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP
oftware as a service (SaaS) allows users to connect to and use cloud-based apps over the
Internet. Common examples are email, calendaring and office tools (such as Microsoft
Office 365).
If you have used a web-based email service such as Outlook, Hotmail or Yahoo! Mail,
then you have already used a form of SaaS. With these services, you log into your
account over the Internet, often from a web browser. The email software is located on
the service providers network and your messages are stored there as well. You can
access your email and stored messages from a web browser on any computer or
Internet-connected device.
The previous examples are free services for personal use. For organisational use, you
can rent productivity apps, such as email, collaboration and calendaring; and
sophisticated business applications such as customer relationship management (CRM),
enterprise resource planning (ERP) and document management. You pay for the use of
these apps by subscription or according to the level of use.
Advantages of SaaS
Gain access to sophisticated applications. To provide SaaS apps to users, you dont
need to purchase, install, update or maintain any hardware, middleware or software.
SaaS makes even sophisticated enterprise applications, such as ERP and CRM,
affordable for organisations that lack the resources to buy, deploy and manage the
required infrastructure and software themselves.
Pay only for what you use. You also save money because the SaaS service
automatically scales up and down according to the level of usage.
Use free client software. Users can run most SaaS apps directly from their web
browser without needing to download and install any software, although some apps
require plugins. This means that you dont need to purchase and install special software
for your users.
Mobilise your workforce easily. SaaS makes it easy to mobilise your workforce
because users can access SaaS apps and data from any Internet-connected computer or
mobile device. You dont need to worry about developing apps to run on different types
of computers and devices because the service provider has already done so. In addition,
8 | Page
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP
you dont need to bring special expertise onboard to manage the security issues
inherent in mobile computing. A carefully chosen service provider will ensure the
security of your data, regardless of the type of device consuming it.
Access app data from anywhere. With data stored in the cloud, users can access their
information from any Internet-connected computer or mobile device. And when app
data is stored in the cloud, no data is lost if a users computer or device fails.
Not all clouds are the same. There are three different ways to deploy cloud computing
resources: public cloud, private cloud and hybrid cloud.
Public cloud
Public clouds are owned and operated by a third-party cloud service provider, which
deliver their computing resources like servers and storage over the Internet. Microsoft
Azure is an example of a public cloud. With a public cloud, all hardware, software and
other supporting infrastructure is owned and managed by the cloud provider. You
access these services and manage your account using a web browser.
Private cloud
Hybrid cloud
9 | Page
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP
Hybrid clouds combine public and private clouds, bound together by technology that
allows data and applications to be shared between them. By allowing data and
applications to move between private and public clouds, hybrid cloud gives businesses
greater flexibility and more deployment options.
Cloud computing services all work a little differently, depending on the provider. But
many provide a friendly, browser-based dashboard that makes it easier for IT
professionals and developers to order resources and manage their accounts. Some cloud
computing services are also designed to work with REST APIs and a command-line
interface (CLI), giving developers multiple options.
Open source software projects are built and maintained by a network of volunteer
programmers and are widely used in free as well as commercial products. Prime
examples of open-source products are the Apache HTTP Server, the e-commerce
platform osCommerce, internet browsers Mozilla Firefox and Chromium (the project
where the vast majority of development of the freeware Google Chrome is done) and the
full office suite LibreOffice. One of the most successful open-source products is
the GNU/Linux operating system, an open-source Unix-like operating system, and its
derivative Android, an operating system for mobile devices. In some industries, open
source software is the norm
10 | Page
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP
"Things," in the IoT sense, can refer to a wide variety of devices such as heart
monitoring implants, biochip transponders on farm animals, electric clams in coastal
waters, automobiles with built-in sensors, DNA analysis devices for
environmental/food/pathogen monitoringor field operation devices that assist
firefighters in search and rescue operations. Legal scholars suggest to look at "Things"
as an "inextricable mixture of hardware, software, data and service". These devices
collect useful data with the help of various existing technologies and then autonomously
flow the data between other devices. Current market examples include home
automation (also known as smart home devices) such as the control and automation of
lighting, heating (like smart thermostat), ventilation, air conditioning (HVAC) systems,
and appliances such as washer/dryers, robotic vacuums, air purifiers, ovens or
refrigerators/freezers that use Wi-Fi for remote monitoring.
The concept of the Internet of things was invented by and term coined by Peter T. Lewis
in September 1985 in a speech he delivered at a U.S. Federal Communications
Commission (FCC) supported session at the Congressional Black Caucus 15th
Legislative Weekend Conference.
11 | Page
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP
The Domain Name System (DNS) is a hierarchical decentralized naming system for
computers, services, or other resources connected to the Internet or a private network.
It associates various information with domain names assigned to each of the
participating entities. Most prominently, it translates more readily memorized domain
names to the numerical IP addresses needed for locating and identifying computer
services and devices with the underlying network protocols. By providing a worldwide,
distributed directory service, the Domain Name System is an essential component of the
functionality of the Internet.
The Domain Name System delegates the responsibility of assigning domain names and
mapping those names to Internet resources by designating authoritative name
servers for each domain. Network administrators may delegate authority
over sub-domains of their allocated name space to other name servers. This mechanism
provides distributed and fault tolerant service and was designed to avoid a single large
central database.
The Internet maintains two principal namespaces, the domain name hierarchy and
the Internet Protocol (IP) address spaces. The Domain Name System maintains the
domain name hierarchy and provides translation services between it and the address
spaces. Internet name servers and a communication protocol implement the Domain
Name System. A DNS name server is a server that stores the DNS records for a domain; a
DNS name server responds with answers to queries against its database.
The most common types of records stored in the DNS database are for Start of Authority
(SOA), IP addresses (A and AAAA), SMTP mail exchangers (MX), name servers (NS),
pointers for reverse DNS lookups (PTR), and domain name aliases (CNAME). Although
not intended to be a general purpose database, DNS can store records for other types of
data for either automatic lookups, such as DNSSEC records, or for human queries such
as responsible person (RP) records. As a general purpose database, the DNS has also
been used in combating unsolicited email (spam) by storing a real-time blackhole list.
The DNS database is traditionally stored in a structured zone file.
What is a Gateway?
A gateway is a node (router) in a computer network, a key stopping point for data on its
way to or from other networks. Thanks to gateways, we are able to communicate and
send data back and forth. The Internet wouldn't be any use to us without gateways (as
well as a lot of other hardware and software).
12 | Page
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP
In a workplace, the gateway is the computer that routes traffic from a workstation to the
outside network that is serving up the Web pages. For basic Internet connections at
home, the gateway is the Internet Service Provider that gives you access to the entire
Internet.
A node is simply a physical place where the data stops for either transporting or
reading/using. (A computer or modem is a node; a computer cable isn't.) Here are a few
node notes:
On the Internet, the node that's a stopping point can be a gateway or a host
node.
A computer that controls the traffic your Internet Service Provider (ISP)
receives is a node.
If you have a wireless network at home that gives your entire family access to the
Internet, your gateway is the modem (or modem-router combo) your ISP provides so
you can connect to their network. On the other end, the computer that controls all of the
data traffic your Internet Service Provider (ISP) takes and sends out is itself a node.
Router at work.
When you do a Google search or compose an email and hit "Send," your computer sends
the data to your router. Your router then, which is hardwired to do its job right, figures
out the next destination of the data based on its "comprehension" of the condition of the
networks.
Routers can be gateways because a router can control the path through which
information is sent in and out. It does so by using built-in headers and forwarding tables
13 | Page
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP
to figure out where packets of data need to be sent. Those packets of data carry your
emails, transactions, online activity and so on.
A gateway is one of the many ways our data is moved over the Web for us. The gateway
gives us entry into different networks so we can send email, look at Web pages, buy
things online, and more. You can easily say that gateways deliver the freedom,
information and convenience we enjoy online.
Your ISP makes the Internet a possibility. In other words, you can have shiny computer
with a built-in modem and could have a router for networking, but without a
subscription with an ISP, you won't have a connection to the Internet.
For the typical homeowner or apartment dweller, the ISP is usually a "cable company"
that, in addition or offering a TV subscription, also offers an Internet subscription. You
don't get both for the price of one, however. You can get just cable TV or just high-speed
Internet, or both.
An ISP is your gateway to the Internet and everything else you can do online. The
second your connection is activated and set up, you'll be able to send emails, go
shopping, do research and more. The ISP is the link or conduit between your computer
and all the other "servers" on the Internet. You may feel like you're talking to your mom
directly through email, but in reality it's more "indirectly." Your email goes from your
computer, to the ISP computers/servers, where it's sent along to its destination through
other servers on the network.
Of course, that's its "electronic" path: the transmission is still virtually instantaneous.
Every home or organization with Internet access has an ISP. The good news is, we don't
all have to have the same provider to communicate with each other and we don't have
to pay anything extra to communicate with someone who has a different ISP.
Whereas just about anyone can have a website, not everyone can be an ISP. It takes
money, infrastructure and a lot of very smart technicians. Your ISP maintains miles of
cabling, employs hundreds of technicians and maintains network services for its
14 | Page
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP
hundreds of thousands of subscribers. Depending on where you live, you typically have
a choice of ISPs.
Types of ISPs
In the 1990s, there were three types of ISPs: dial-up services, high-speed Internet (also
referred to as "broadband") offered by cable companies, and DSL (Digital Line
Subscribers) offered by phone companies. By 2013, dial-up services were rare (even
though they were cheap), because they were very slow...and the other ISP options were
typically readily available and much, much faster.
Two of the leading DSL ISPs have been Verizon and AT&T. But in the last few years
(from 2013), DSL has been on the decline, while cable-based ISPs, like Comcast and
Time Warner, have been growing. Why the change? It's because the phone companies
have been getting more into the lucrative smartphone business, and selling annual
contracts for cellular service along with...smartphone Internet capabilities.
That's left a lot of the broadband business for the cable companies.
With DSL dropping out of the picture, there's room for a new technology and it's already
here in some areas: it's called fiber, or fiber optical, broadband. Supposedly, fiber is
hundreds times FASTER than cable or DSL. That's especially exciting news (if it's true
and available) to companies, and gamers and households with a lot of simultaneous
wireless usage going on.
Verizon (yes, they are downplaying DSL) now offers FiOS in select areas (put an "f"
before "eye" and the "os"-sound in "most"). FiOS stands for fiber optic services, and it
claims to have superfast Internet connection speeds.
And for all of us not in the Kansas area, Google launched Google Fiber in 2013, which
offers incredibly ultra-fast Internet speed. Other companies (and communities) are
teaming up to bring the next generation of broadband to you.
15 | Page
CLOUD COMPUTING + INTERNET OF THINGS + OPEN SOURCE
SOFTWARE +DNS+ GATEWAY+ ISP
URL: Uniform Resource Locater is nothing but a web pages address, or in other words
URL specifies the address of every file on the internet.
The protocol to be used to access the file = {http://}
Web Crawler: is a program that visits web sites and reads their pages and other
information in order to create entries for a search engine index.
16 | Page