Target Prelims 2021 Booklet Computer

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 30

TARGET PRELIMS 2021

CURRENT AFFAIRS PROGRAM


BOOKLET-2;
COMPUTER, IT AND ELECTRONICS
1. TABLE OF CONTENTS
2. Encryption/Decryption ........................................................................................................................... 1
1) Digital Signature ................................................................................................................................................ 2
2) End to End Encryption (E2EE): Whatsapp ......................................................................................................... 3
3) Quantum Cryptography / Quantum Key Distribution (QKD)........................................................................... 3
3. Blockchain Technology .......................................................................................................................... 5
1) Blockchain Bill of Rights .................................................................................................................................... 7
4. Cryptocurrencies ..................................................................................................................................... 8
1) Bitcoins .............................................................................................................................................................. 9
2) LIBRA (DIEM) ................................................................................................................................................... 11
3) Cryptocurrencies and India ............................................................................................................................. 13
5. Supercomputers .................................................................................................................................... 14
1) Supercomputing in India ................................................................................................................................. 15
2) National Supercomputing Mission ................................................................................................................. 16
6. Internet of Things ................................................................................................................................. 17
1) Narrow Band Internet of Things (NB-IOT) ...................................................................................................... 18
7. Cellular Wireless Communication Technologies: 1G – 5G ................................................................ 19
1) Voice over LTE (VoLTE) .................................................................................................................................... 21
2) 5G (5th Generation) ........................................................................................................................................ 22
8. Practice Questions ................................................................................................................................ 25
2. ENCRYPTION/DECRYPTION
- Introduction

▫ Encryption is conversion of electronic data into another form, called cipher text, which cannot
be easily understood by anyone except authorized parties.

▫ The primary purpose of encryption is to protect the confidentiality of digital data stored on
computer systems or transmitted via the internet or other computer networks. Modern
encryption algorithms play a vital role in the security assurance of IT systems and
communications as they can provide not only confidentiality, but also the following key
elements of security.

§ Authentication: The origin of message can be verified

§ Integrity: Proof that content of message has not changed since it was sent.

§ Non-repudiation: the sender of a message cannot deny sending of message.

- Development/History

ú Spartans using stick of fixed diameter

ú Symmetric Algorithms (Same key for encryption and decryption)

§ Ceaser Shift cipher

§ Polyalphabetic substitution -> which uses multiple substitute alphabets to limit the
use of frequency analysis to crack a cipher.

§ Most famous example: Enigma electro-mechanic rotor cipher machine used by


Germans during WW-2.

▫ All the above methods used the same key for encryption and decryption.

▫ This algorithm will require a secure channel for transmitting the key.

ú Asymmetric Cryptography or Public Key Cryptography

▫ It uses pairs of keys

§ Public key that may be disseminated widely

§ Private key which is known only to the owner.

▫ Public key algorithms, unlike symmetric key algorithms, do not require a secure
channel for initial exchange of one (or more) secret keys between the parties.

Praxis study hall, Villupuram, tamilnadu, praxistotransform@gmail.com, 8220066131 P a g e 1 | 30


▫ Famous examples: Digital Signature algorithm, RSA algorithm (based on the problem
of factoring the product of two large prime numbers - the factoring problem), AES etc.

ú Where is Encryption used today

▫ Before coming of the Diffie-Hellman key exchange (public key algorithm) and RSA
algorithm, governments and their armies were the only real users of encryption.

▫ Now, the broad use of encryption in the commercial and consumer realms to protect
data both while it is being sent across a network (data in transit) and stored, such as on
hard drive, smartphone, or flash drive.

▫ Other uses included uses in Modems, Set Top Boxes, Smart Cards, SIM Cards etc.

1) DIGITAL SIGNATURE

- Digital signature is a mathematical technique (cryptography mechanism) that is used to validate


the authenticity and integrity of a message, software and digital document.
- It offers security features like evidence of origin, identity, and Status of an electronic document,
transaction or message and can thus acknowledge informed consent by a signer (i.e.,
nonrepudiation).
- How Digital Signature Works?
▫ It uses public key cryptography such as RSA. The individual who is generating the digital
signature uses their own private key to encrypt signature-related data.
▫ The only way to decrypt this data is with signer’s public key. This is how signer’s
signatures are authenticated.
- How to create digital signature?
▫ To create a digital signature,
signing software – such as an
email program – creates a one
way hash of the electronic data
to be signed. The private key is
then used to encrypt the hash.
The encrypted hash – along
with other information, such as
hashing algorithm is the digital
signature.
▫ Note: Digital signature technology requires all the parties to trust that the individual
creating the signature has been able to keep their own private keys secret.

- Uses of Digital Signature

Praxis study hall, Villupuram, tamilnadu, praxistotransform@gmail.com, 8220066131 P a g e 2 | 30


▫ Government publishes electronic versions of various documents such as budget, laws,
bill etc. with digital signatures.
▫ Various legal works like processing tax returns, filing applications, verifying business to
government transactions etc. use digital signature.
▫ Industries use the digital signature to speed up the process, including product design,
quality assurance, manufacturing enhancements etc.

2) END TO END ENCRYPTION (E2EE): WHATSAPP


- Why in news?
▫ The recent leaking of WhatsApp chats of several Bollywood celebrities has brought back questions around
WhatsApp’s privacy and security [Sep 2020]

- Introduction

▫ End to End Encryption (E2EE) is a method of secure communication that prevents third parties from
accessing data while it's transferred from one end system or device to another.

▫ In E2EE, the data is encrypted on the senders' system or device and only recipient is able to decrypt it.
Nobody in between, be they an Internet Service Provider, Application Service Provider or hacker, can read
or tamper with it.

▫ The cryptographic keys used to encrypt and decrypt the message are stored exclusively on the endpoints;
a trick made possible through the use of public key encryption.

- Whatsapp Encryption (started from April 2016)

▫ Whatsapp messages and calls between a sender and receiver that use Whatsapp client software released
after March 31, 2016 are end-to-end encrypted.

▫ It uses open-source Signal Protocol developed by Open Whisper Systems.

▫ The end-to-end encryption protocol is designed to prevent third parties and Whatsapp from having plain
texts access to message or calls. What's more, even if encryption keys from a user's device are ever
physically compromised, they cannot be used to go back in time to decrypt previously transmitted
messages.

- How were the recent leaks possible?


▫ WhatsApp backup that happens on Google Drive on android phone and iCloud for iphones can be
vulnerable if someone hacks into your phone. This backup is not end-to-end encrypted.

3) QUANTUM CRYPTOGRAPHY / QUANTUM KEY DISTRIBUTION (QKD)


- Why in news?

Praxis study hall, Villupuram, tamilnadu, praxistotransform@gmail.com, 8220066131 P a g e 3 | 30


▫ China’s Micius Satellite successfully established an ultra-secure link (Quantum Cryptography)
between two ground stations separated by more than 1,000 kms (June 2020)
§ Details: Micius was launched in 2016 and is solely dedicated to quantum information science.
Scientists in China have now (June 2020) successfully been able to present a secure method of
quantum messaging using Micius. This achievement brings the world (specially China) one stop
closer to realizing truly unhackable global communications. This is the first time a technique
called entanglement-based quantum key distribution – has been demonstrated using a satellite.

- Basics of Quantum Cryptography

▫ It is a protocol to distribute secret keys using the principles of quantum mechanics. It is a new
technique that ensures the confidentiality of information transmitted between two parties, by
exploiting counter intuitive behavior of elementary particles called as photons.

▫ How Quantum Mechanics is used – Heisenberg’s Uncertainty Principle

• The security of the quantum key distribution is guaranteed by the laws of quantum physics.

§ Following uncertainty principle, an eavesdropper cannot know everything about a photon


that carries a bit and will destroy a part of the information. Hence eavesdropping causes
errors in transmission line, which can be detected by Alice (sender) and Bob (Receiver).

§ If an eavesdropper, conventionally called Eve, tries to determine the key, she will be detected.
The legitimate parties will then discard the key, while no confidential information has been
transmitted yet. If, on the other hand, no tapping is detected, the secrecy of the distributed
key is guaranteed.

• Other advantage of Quantum Cryptography/Quantum Key Distribution?

§ It can distribute long key as often as possible between Sender and Receiver

§ Long term secrecy of confidential data transmission

• Long-term secrets encrypted today using classical ciphers could be very well become
illegitimately decrypted in the next decade. There is nothing that prevents eavesdropper
from intercepting an encrypted classical transmission and keeping it until technology
makes it feasible to break the encryption.

• On the other hand, the key obtained using quantum key distribution cannot be copied.
Attacking the key means attacking the quantum transmission today, which can be done
using today's technology

Praxis study hall, Villupuram, tamilnadu, praxistotransform@gmail.com, 8220066131 P a g e 4 | 30


3. BLOCKCHAIN TECHNOLOGY
- Introduction
▫ Blockchain is an incorruptible, decentralized, digital ledger of transactions that can be
programmed to record not just financial transactions but virtually anything of value. Using this
technology, participants can confirm transactions without the need of central certifying
authority.
▫ In other words, blockchain is a distributed database that is used to maintain a continuously
growing list of records/transaction, called blocks.
▫ It offers all parties involved in a business network a secured and synchronized record of
transactions. It records every sequence of transaction from beginning to end, whether it is 100s
of transaction in supply chain or a single online payment.
▫ Block: As each transaction occurs it is put into a block.
▫ Chain: Each block is connected to one before and after. Groups of transactions are blocked
together, and a fingerprint of each block is added to the next thus creating an irreversible chain.

▫ The system was originally designed for the digital currency, Bitcoin, the tech community is now
finding other potential uses for the technology.

- How blockchain transaction functions

- Positives/Advantages
▫ Security -> Built in robustness -> no single point of failure i.e., no centralized points of
vulnerability that hackers can exploit.
▫ Trust -> Increased Transparency and incorruptibility

Praxis study hall, Villupuram, tamilnadu, praxistotransform@gmail.com, 8220066131 P a g e 5 | 30


▫ Data is embedded within network as a whole, by definition it is public.
▫ Altering any unit of information on the blockchain would mean using a huge amount of
computing power to override the entire network.
• In theory, this would be possible. In practice, it's unlikely to happen.
▫ Permanent Ledger
▫ Reduces the role of intermediary
▫ Speeds up the process
▫ Lowers transaction cost

- Applications (Current and Future Potential)


▫ Economy and Finance offers the strongest uses case for the technology.
§ Financial transactions are typically granted by third party and block chain could be used to
automate the process, reducing overall costs, by cutting out the middleman with
autonomous smart contract acting as trusted intermediaries between parties on the
network.
§ Faster, Cheaper settlements could save billions of dollars from transaction costs while
improving transparency.
§ Stocks, mutual funds, bonds and pensions may one day be stored on blockchains as many
financial organizations explore the technology.
▫ Automotive: Consumers could use the blockchain application to manage the fractional ownership
in autonomous cars.
▫ Public Ledger Information: Many governments are looking to adopt this technology to store
information about the citizens and census. A decentralized platform to safely store data regarding,
birth, death crime etc. can contribute to effectively curbing fraudulent activities. Even our judiciary
can benefit by using this platform to store court judgments, making our legal system more
transparent and accessible to litigants.
▫ Voting: Using a blockchain code, constituents could cast votes via smartphone, tablet etc. resulting
in immediately verifiable results. Voting by blockchain can eliminate election frauds by making
each vote stored as a block on the block chain, rendering it impossible to tamper with.
▫ Healthcare: Patients encrypted information could be shared with multiple providers without the
risk of privacy breaches.
▫ Smart Contracts: Every agreement, every process, every task, and every payment would have a
digital record and signature that could be identified, validated, stored, and shared. Intermediaries
like lawyers, brokers, bankers might not be necessary.
▫ Secure File storage
§ Distributing data throughout the network protects files from getting hacked or lost.
▫ Identity Management: Decentralized, used controlled digital identity holds the potential to
unblock economic opportunity for refugees and others who are disadvantaged, while concurrently
improving the lives of those simply trying to navigate cyberspace securely and privately.

Praxis study hall, Villupuram, tamilnadu, praxistotransform@gmail.com, 8220066131 P a g e 6 | 30


§ There is definite need for better identity management on the web.
▫ Supply chain auditing
§ Consumers increasingly want to know that the ethical claims companies make about their
products are real. Distributed ledgers provide an easy way to certify that the backstories of
the things we buy are genuine. Transparency comes with blockchain-based timestamping of
a date and location — on ethical diamonds, for instance — that corresponds to a product
number.
▫ Protection of intellectual property
§ Smart contracts can protect copyright and automate the sale of creative works online,
eliminating the risk of file copying and redistribution.
§ Further, a blockchain storage can provide a consolidated platform where trademark and
copyright filings can be stored. With entries that can’t be tampered with and accurate time
stamps, the number of disputes concerning IP may well decrease.
▫ Anti-Money laundering and Know Your Customer (KYC)
§ AML and KYC practices have a strong potential for being adapted to blockchain.
▫ Changing the nature of ownership of assets and managing titles: Blockchains will make all kinds
of record keeping more efficient. Property titles are a case in point. They tend to be susceptible to
fraud, as well as costly and labour intensive

1) BLOCKCHAIN BILL OF RIGHTS


» Why in news?
- A blockchain “bill of rights” was announced by World Economic Forum in May 2020 to establish
a global baseline for developers, corporates and governments building blockchain applications
(May 2020)

» Details
- WEF launched the Presidio Principles for blockchain, which aims to help in protecting user
rights in the development of blockchain applications.
- The hope is that this Bill of Rights will “create foundational value for decentralized futures”. It
is expected to unlock the potential technology that is poised to massively transform multiple
sectors.

» Rights in the document are grouped in four broad pillars:


▫ Transparency and Accessibility which covers the right to information about the system;
▫ Privacy and Security, which covers the rights to data protection;
▫ Agency & Interoperability which covers the right for individuals to own and manage their
data; and

Praxis study hall, Villupuram, tamilnadu, praxistotransform@gmail.com, 8220066131 P a g e 7 | 30



Accountability & Governance, which covers the right for system users to understand available
recourse.
» 16 principles have been identified under these four pillars

4. CRYPTOCURRENCIES
ú Why in new?

- Supreme Court sets aside RBI Ban on Cryptocurrency transactions (March 2020)

- Draft Bill bans all form of private cryptocurrencies (Feb 2021)

ú BASICS

- Cryptocurrency is a form of digital cash which uses encryption technology to make it secure.
Since, this is a completely digital system, it doesn’t exist in physical form.

- Records of cryptocurrency transactions have to be stored in a secure database. Blockchain


serves the role of an incorruptible ledger for most of the cryptocurrencies.

- People can store their cryptocurrency in virtual wallets that resemble online bank accounts. For
e.g., Facebook is developing a wallet app for Libra called Calibra, Bitcoin has Bit pay wallet etc.

Praxis study hall, Villupuram, tamilnadu, praxistotransform@gmail.com, 8220066131 P a g e 8 | 30


1) BITCOINS

- Why in news?

» Bitcoin has hit a record high (above $48,000) after Elon Musk’s car company Tesla said that it
had bought about $1.5bn of the cryptocurrency (Feb 2021)

▫ Why? -> Tesla said that it wanted to maximize returns on cash lying dormant in the
company’s accounts. It also expects to accept payment for its electric cars in Bitcoin in
future.

- Bitcoin is the first cryptocurrency created and held electronically. It is a decentralized system (No
one controls it). Bitcoins aren't printed, like Rupees or dollars - they are produced by people, and
increasingly businesses, running computers all around the world, using software that solve
mathematical problems.

- Who created bitcoins -> Satoshi Nakamoto?

- Limited number bitcoins


» The bitcoin protocol - the rules that make bitcoin work - say that only 21 million bitcoins can
ever be created by miners. However, these coins can be divided into smaller parts (the smallest
divisible amount is one hundred millionth of a bitcoin and is called a 'Satoshi', after the founder
of bitcoin.

ú What is bitcoin based on?

- Bitcoin is based on mathematics. Around the world, people are using software programs that follow
a mathematical formula to produce bitcoins. The mathematical formula is freely available, so that
anyone can check it.

ú Advantages/Positive Characteristics of Crypto Currencies

- Decentralized: No central control and hence flexibility to use.

- Easy, Fast Set up:

» Conventional banks -> complicated process to open bank account, merchant account for
payment more complicated

» Bitcoin address can be set up in seconds, no questions asked, and with no fees payable.

- Protects Privacy/Anonymous

» Users can hold multiple bitcoin addresses, and they are not linked to names, addresses, or
other personally identifying information.

Praxis study hall, Villupuram, tamilnadu, praxistotransform@gmail.com, 8220066131 P a g e 9 | 30


- Completely Transparent

» Bitcoin stores details of every single transaction that ever happened in the network in a huge
version of a general ledger, called the blockchain. The blockchain tells all.

» If you have a publicly used bitcoin address, anyone can tell how many bitcoins are stored at
that address. They just don't know that it's yours.

- Transaction fee is miniscule

- Fast

» You can send money anywhere and it will arrive minutes later, as soon as the bitcoin network
processes the payment

- It's non-repudiable

» When your bitcoins are sent, there's no getting them back, unless the recipient returns them
to you. They're gone forever.

ú Limitations/Disadvantages of Cryptocurrencies

- Acceptance is limited -> banned in countries like China and India

- Loss of wallet -> no recovery option

» If hard drive crashes, or wallet corrupts data. This can bankrupt a wealthy Bitcoin investor
within seconds with no form of recovery

- Volatile -> no valuation guarantee

- No grievance redressal/ No Buyer protection in case of online purchase

» If seller doesn't send the bought goods, nothing can be done -> there is no provision of
refund/reverse transaction

- Risk of unknown technical flaws

- Built in deflation (in bitcoin)

- No physical form -> Cannot be used in physical stores

- Extremely high processing power/energy requirement -> Environmentally unsustainable.


According to a study by University of Cambridge, Bitcoin currently uses more energy than Argentina
every year.

- Can be used for criminal activities

Praxis study hall, Villupuram, tamilnadu, praxistotransform@gmail.com, 8220066131 P a g e 10 | 30


» Lack of centralized control allows its use for criminal activities such as by ransomware
attackers.

» This may also be used by money launderers to launder black money

2) LIBRA (DIEM)

- Why in news?

» Facebook’s Libra currency to launch next year in limited format (Nov 2020)

▫ The 27-strong Libra Association earlier had planned to launch digital version of several
currencies, plus a “digital composite” of all its coins. But after concerns raised by regulators
over its plan to create one synthetic coin backed by a basket of assets, the association
would now initially just launch a single coin backed one-for-one by the dollar. The other
currencies and the composite would be rolled out at a later point.
▫ Diem is the new name of Facebook’s cryptocurrency. The Project will be a stripped-down
version of the original plan.

- Libra/Diem is another crypto currency being built on a blockchain network. It was first announced in
2019 and Facebook is preparing to launch it in 2021.

- It will be run by the Libra Association, a Geneva based entity that has over two-dozen founding
partners, including Facebook, Mastercard, Visa, Uber, and the Vodafone group. It’s 100 members are
to jointly manage accounts, govern Libra’s reserves, and take key decisions.

- It will make moving money around the world as easy as sending a text message. The LIBRA
system will be accessible to anyone with an entry level smartphone.

Praxis study hall, Villupuram, tamilnadu, praxistotransform@gmail.com, 8220066131 P a g e 11 | 30


- LIBRA will also be backed by a reserve to keep its value stable.

ú Significance of LIBRA

- Simple Global Currency: It will enable a simple global currency and financial transaction that
empowers billions of people.

- Financial Inclusion on global scale: Libra association claims that in a world with cheap data and
smartphones, about 1.7 billion adults are still outside the organized financial system in the
world. This is despite a billion of them have mobile phones and half of them have internet
connections. The reason is high fees, lack of access, and absence of documentation.

ú LIBRA vs Bitcoins/Other Cryptocurrencies

Feature Bitcoin Libra


Stability in Value of bitcoin is highly Facebook is hoping to keep the LIBRA’s value
Value fluctuating. Therefore, very stable by tying it closely to established
few merchants use bitcoin currencies.
presently
Backing Trust in the system Libra will be backed by a reserve of assets such
as real-world bank deposits and government
securities in a number of leading currencies.
This will give stability and more confidence to
LIBRA users.

Praxis study hall, Villupuram, tamilnadu, praxistotransform@gmail.com, 8220066131 P a g e 12 | 30


Users Very few Facebook is already tying with Lyft, Uber, Spotify
etc. They will likely accept Libra when the system
launches.
They will also fund build and govern the system
Centralized Complete decentralized. Verification will initially be managed by its
Control Anyone can be granted founding companies, such as Facebook and
computing power to verify PayPal.
transactions and to prevent Eventually Libra Association an independent
anyone spending the same nonprofit organization will govern Libra.
digital coin twice
Anonymity Very anonymous. Owners of Facebook has clarified that Libra will be
the account behind independent and won’t require a Facebook
transactions are not account to use.
necessarily known.
Therefore, its favorite among
cybercriminals

3) CRYPTOCURRENCIES AND INDIA

- Why in news?

» Individuals, Corporates, to be fined for using Cryptocurrencies: Draft Law (Feb 2021)

- The proposed bill plans to set the framework for the RBI to issue its own digital currency.

- In April 2018, RBI prohibited banks from providing services to firms and individuals who deal in bitcoin and
other such virtual currencies.

- But, in March 2020, the Supreme Court had set aside the RBI Ban on cryptocurrency transactions by
setting aside the April 2018 circular of the RBI prohibiting banks and entities regulated by it from providing
services in relation to virtual currencies (VCs). The Court found the RBI circular “disproportionate” with an
otherwise consistent stand taken by the Central Bank that VCs are not prohibited in the country. Further,
the court held that the RBI didn’t consider the availability of alternatives before issuing a circular.

- In 2019 Inter-Ministerial Committee (IMC) chaired by Subhash Chandra Garg that was setup to assess the
viability of virtual currencies in India had also recommended that India should ban private crypto
currencies such as Bitcoin. Through a draft bill they recommend a maximum of 10-year punishment for
those who mine, trade, buy or sell cryptocurrencies.

» What is IMC’s view on Distributed Ledger Technologies (DLT) and Cryptocurrencies?

i. IMC recognizes the potential of DLT and Blockchain.

Praxis study hall, Villupuram, tamilnadu, praxistotransform@gmail.com, 8220066131 P a g e 13 | 30


ii. Therefore, it recommends the Department of Economic Affairs to take necessary
measures to facilitate the use of DLT in the entire financial fields after identifying its uses.

iii. The IMC also recommends that regulators – RBI, SEBI, IRDA, PFRDA, and IBBI – explore
evolving appropriate regulations for development of DLT in their respective areas.

» However, IMC has recommended a ban on “private” cryptocurrencies. It recommended the


introduction of a single cryptocurrency for the whole country that is backed by Reserve Bank
of India.

» Why?

i. Non-official virtual currencies can be used to defraud consumers, particularly


unsophisticated consumers or investors.

ii. Further such currencies often experience tremendous volatility in their values.

iii. The scaling up of private blockchain based currencies require crippling level of energy
resources. According to a report by Bank of International Settlement, Bitcoin processing
already consumes as much energy as is used by Switzerland; it called this an
environmental disaster

iv. If the private cryptocurrencies are allowed to continue, RBI would lose control over the
monetary policy and financial stability, as it would not be able to keep a tab on the
money supply in economy.

v. Further, the anonymity of private digital currencies makes them vulnerable to money
laundering and use in terror financing activities while making law enforcement difficult.

vi. Finally, there is no grievance redressal mechanism in such system, as all transactions are
irreversible.

5. SUPERCOMPUTERS
- Why in news?

▫ Jointly developed by Riken and Fujitsu, Japan’s Fugaku is the new number one fastest
supercomputer in the world (2020)

§ Two Supercomputers in India are in the top 500 list. (Nov 2020)

- Intro

Praxis study hall, Villupuram, tamilnadu, praxistotransform@gmail.com, 8220066131 P a g e 14 | 30


▫ A supercomputer is a computer with a high-level computational capacity compared to a
general-purpose computer or Supercomputer is a computer with great speed and memory.
They are usually thousands of time faster than ordinary personal computers made at that time.

▫ As of Feb 2021, the fastest supercomputer in the world is Fugaku of Japan (jointly developed
by RIKEN and Fujitsu).

§ It has 7.3 million cores and a speed of 415.5 petaflops.

§ It is the first top ranked system powered by ARM processors.

▫ Other top Supercomputers of the world:

§ Summit of USA is at 2nd Rank with a speed of 148.6 petaflops.

§ Sierra of USA (94.6 petaflops), 3rd rank

§ Sunway TaihuLight (China 93.01 petaflops), 4th Rank

▫ Uses: Super computers are generally used for scientific and engineering applications that must
handle very large databases or do a great amount of computation (or both). Some of the key
areas where supercomputers contribute are:

§ Weather forecasting

§ Climate research

§ Code-breaking

§ Genetic analysis

§ Oil and gas exploration – Seismic processing in the oil industry

§ Molecular modelling

§ Other jobs that need many calculations including engineering, product design, complex
supply chain optimization (actually any kind of optimization), Bitcoin mining etc.

1) SUPERCOMPUTING IN INDIA
- In terms of supercomputing power India is way behind the world leaders. In the 56th List of
Supercomputer systems released by TOP500 Japan, USA, Germany, Italy, and France
dominated the first 100 systems. Only three Chinese supercomputers were in the top 100 list.
But in top 500, China has 212 systems followed by USA (113) and Japan (34).

Praxis study hall, Villupuram, tamilnadu, praxistotransform@gmail.com, 8220066131 P a g e 15 | 30


- Our fastest super computer PARAM SIDDHI – AI is ranked 63 in the world. It is India’s fastest
and largest supercomputer. It has a performance of 4.6 petaflops sustained and 210 AI
petaflops. It was developed under the National Supercomputing Mission.

▫ It will focus on researchers pertaining to academia, MSMEs, industry and start-ups


encompassing all the areas of artificial intelligence including natural language processing,
surveillance, and image processing, automotive industry, healthcare, robotics, computer
vision, recommender system, education, agriculture, space, defence and national security.
It has been built with NVIDIA DGX A100 Systems connected with NVIDIA Mellanox HDR
InfiniBand Network, C-DAC HPC-AI Engine, AI Software Stack and Cloud Platform.

- Mihir ranked 146th is India’s 2nd fastest computer. It is a 2.8 Petaflop supercomputer which has
been operational at the National Centre for Medium Range Weather Forecast (NCMRWF),
Noida. It is one of the powerful systems owned by Ministry of Earth Sciences and has helped
improve India’s weather forecasting skills.

2) NATIONAL SUPERCOMPUTING MISSION

- A visionary program, launched in 2015, to enable India to leapfrog to the league of world class
computing power nations.

- Joint Implementation of mission by DST, Ministry Of Electronics and Information Technology (MeitY)
has been started in full-fledged manner.

- Super Computing Grid: The mission envisages empowering our national academic and R&D
institutions spread over the country by installing a vast supercomputing grid comprising of more than
70 high performance computing facilities.

- Human Resource: The mission also includes development of highly professional High-Performance
Computing (HPC) aware human resource for meeting challenges of manpower scarcity in the sector.

- Recent Efforts

BullSEQUANA Super Computer: French Company Atos have signed an agreement with C-DAC
(Centre for Development of Advanced Computing) for designing, building and installing BullSequana
– the super computer in India

The supply of Bullsequana XH200 will be used for creating the network of 70 high performance
computing facilities under NSM.

The total computing power of the Bullsequena will be greater than 10 petaflops

Praxis study hall, Villupuram, tamilnadu, praxistotransform@gmail.com, 8220066131 P a g e 16 | 30


6. INTERNET OF THINGS
» Introduction

§ The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and
digital machines, objects, animal or people that are provided with unique identifiers and the
ability to transfer data over a network without human to human or human to computer
interaction.

§A thing in the internet of Things, can be a person with a heart monitor implant, a farm animal
with a biochip transponder, an automobile with a built-in-sensors to alert the driver when tire
pressure is low - or any other natural or manmade object that can be assigned an IP address
and provided with the ability to transfer data over a network.

§ This is achieved by finely fabricated micro-controllers, which are small computers themselves
and are used internally by various single board computers like Arduino and Raspberry Pi.
Sensors (to detect and collect information) and micro-controllers to transport information,
together, can make anything a thing in IoT.

§ IPv6's (16 bytes or 128bits) huge increase in address space is an important factor in the
development of the Internet of Things.

• Now we can assign IP address to every atom on the surface of the earth more than 100
times.

» Advantages

§ Reduce waste, loss and cost -> by early detection of problems and taking corrective steps

§ We would know what things needed replacing, repairing or recalling and whether they were
fresh or past their best. This helps in increasing the reliability of a device.

- Applications
i) Health Care Sector: IoT can be used to complement the life-critical systems thereby increasing
the reliability and performance of the latter. For e.g. IOT based devices can be used in
combination with cardiac monitor to raise an alarm to the doctors in case of an abnormality.
ii) Agriculture Sector: IoT can be used to gather live pedological data that can be used by
scientists to improve the yield of the land. It can also help in implementing precision
agriculture.
iii) Transportation Sector:
a. Early detection of wear and tear (preventing accidents)
b. Self-Driving Cars – will need IOT for real time decisions
c. Traffic Management – real time traffic data -> better traffic management.

Praxis study hall, Villupuram, tamilnadu, praxistotransform@gmail.com, 8220066131 P a g e 17 | 30


iv) Energy Management
a. Managing temperature in a Nuclear Power Plant (using sensors and IoT)
b. Real time efficiency analysis of Solar Power panels.
v) Research and Development:
a. E.g. – Recent development of wireless communication system for satellites by NASA
through which Satellites can communicate with each other.
vi) Safety and Security
a. Real time tracking of criminals – using tagging and IoT.
» Some Limitations of IoT
- High Initial cost of set up -> Since IoT is based on expensive sensors
- Increased cyber security concerns -> with increased number of devices connected to internet
- Compatibility issues -> due to lack of the international standardization on IoT devices.

» Industrial Internet of Things – Class Discussion

1) NARROW BAND INTERNET OF THINGS (NB-IOT)


- Why in news?
» BSNL has partnered with Skylotech India for satellite-based NB-IoT (Narrow Band – Internet of Things)
that will enable it to provide connectivity for millions of unconnected machines, sensors and industrial
IoT devices across the country (Dec 2020)
- This solution, developed by Skylo, will connect with BSNL’s satellite-ground infrastructure and
provide pan-India coverage, including Indian seas.
- This will be world’s first satellite-based NB-IoT network.

- Details
» Narrowband IoT (also known as NB-IoT or LTE-M2) is Low Powered Wide Area Network (LPWAN)
technology which doesn’t operate in the licensed LTE construct. It is a cellular network technology
primarily built to connect things.
» NB-IoT focuses specifically on indoor coverage, low cost, long battery, and high connection density. It
uses a subset of the LTE standards but limits the bandwidth to a single narrow-band of 200 kHz.

- Benefits of NB-IoT
» Power Efficiency: Technologies using low frequency wavelength consume less power.
- This allows improved battery life for devices.
» Cost Saving –. For e.g., the device complexity of analog to digital and digital to analog converter would
reduce. NB-IoT chips are simpler to create and thus come cheaper.
» Reliability – Using of licensed spectrum would mean reliability, guaranteed resource allocation etc.
» Wider Deployment – Compared to LTE-M1, NB-IOT has lower bit rates, and better link budgets.

Praxis study hall, Villupuram, tamilnadu, praxistotransform@gmail.com, 8220066131 P a g e 18 | 30


» Connecting Remote Areas where LTE networks are still not available. In these areas there may be wider
GSM deployments on which unused bands to leverage for NB-IoT could be found.

- Applications
» Smart Metering
» Intruder and Fire Alarms
» Connected personal appliances measuring health indicators.
» Tracking of persons, animals or objects
» Smart city infrastructure such as streetlamps or dustbins.
» Connected industrial appliances such as welding machines or air compressors.

- Potential Barriers
» Most carriers are moving to LTE or 5G. So, if NB-IoT is deployed in sideband, there could be increased
initial costs to deploy operating software.
» Further, modem frontends and antennas could become more complex in cases where there is little
existing GSM spectrum. Finally, there’s the risk that ISP giants could ratchet up licensing fees.

- Conclusion

Nevertheless, with so much underutilization 200 KHz GSM spectrum, a big opportunity is available in the
form of NB-IoT to create a low power wide area network

7. CELLULAR WIRELESS COMMUNICATION TECHNOLOGIES: 1G – 5G

- Introduction
- G in terms like 3G, 4G etc. refers to a generation of cellular wireless communication technology.
1G refers to 1st generation, 2G to 2nd generation and so on.
- Change in generation generally refers to changes in:
ú The fundamental nature of the Service

ú Non-backwards compatible transmission technology

ú New frequency bands

- Different Generations of wireless cellular communication technology

ú 1G

§ Cell phones began with 1G and signify first generation wireless analog technology
standards that originated in the 1980s.
ú 2G
§ Beginning: 2nd Generation wireless digital technology introduced in early 1990s

Praxis study hall, Villupuram, tamilnadu, praxistotransform@gmail.com, 8220066131 P a g e 19 | 30


§ Various Protocols: In addition to GSM protocol, 2G also utilizes various other digital
protocols, including CDMA (Code division multiple access), TDMA (Time division multiple
access), iDEN, and PDC. GSM is based on TDMA.

- GSM (Global System for Mobile Communication)

§ It is a standard developed by the European Telecommunication Standards Institute


(ETSI) to describe the protocol for second generation (2G) digital cellular networks
and used by mobile phones.

§ By 2014, it had become the default global standard for mobile communication.

□ CDMA (Code division multiple access) is a channel access method used by various radio
telecommunication technologies.

ú 4G

§ Benefits of 4G?

1. Improved download/upload speeds

2. Reduced latency

3. Crystal clear voice calls

4. More simultaneous users per call

§ 4G phones are supposed to be faster, but there are many technologies and speed varies

§ There are so many technologies called "4G", and so many ways to implement them,
that the term is almost meaningless. The International Telecommunication Union (ITU),
a standards body, tried to issue requirements to call a network 4G but they were
ignored by carriers, and eventually the ITU backed down.

§ 4G technologies include

1. HSPA+ 21/42

2. WiMAX (now obsolete)


3. LTE (Long Term Evolution)

• Some consider LTE as the only true 4G of that bunch, and some say that none
of them are fast enough to qualify

• There is a big difference between 4G LTE and other technologies called "4G"
though, and it's most visible in upload speeds. If you upload a lot of data -

Praxis study hall, Villupuram, tamilnadu, praxistotransform@gmail.com, 8220066131 P a g e 20 | 30


posting photos or videos, for instance - you'll find LTE's upload speeds are far
better than those of HSPA.

• There are many different ways to implement LTE as well, so we can't assume
all LTE speeds are same.

• 4G LTE has in a way emerged as new globally accepted 4G wireless standards.

• Other Details about LTE: LTE only allows transmission of data. Voice calls are
routed through telecom networks older 2G and 3G networks. Therefore, under
LTE, we can’t access 4G data and services while on a call.

1) VOICE OVER LTE (VOLTE)


▫ Voice over LTE is a digital packet technology that uses 4G LTE to route voice traffic and transmit data.
VoLTE provides higher quality calls, better service and the ability to simultaneously use voice and data.

▫ NEED: Why is VoLTE necessary?

§ The technology is necessary because LTE is a data-only networking technology.

§ Previous cellular networks such as 2G and 3G, were designed to carry voice calls – services added
cellular data support later through methods that basically “tunneled” data inside of voice-call
connections. LTE turns the network around and uses Internet Protocol Packets for all
communications. As such it doesn’t support traditional voice call technology, so a new protocol and
applications for voice over LTE are needed.

▫ How does VoLTE work?

§ It is based on the IP Multimedia Subsystem (IMS) framework. This allows the service to deliver
multimedia as data flows using a common IP interface.

▫ Advantages of VoLTE

§ VoLTE uses the spectrum more efficiently than traditional voice calls. It uses less bandwidth
because VOLTE’s packet headers are smaller than those of unoptimized VoIP/LTE.

§ It frees up network bandwidth due to a smaller packet.

§ It provides for increased battery life when compared to VoIP.

§ Provides superior audio quality and a clearer calling experience.

§ Ends dependency on the legacy circuit switched voice network to be maintained.

Praxis study hall, Villupuram, tamilnadu, praxistotransform@gmail.com, 8220066131 P a g e 21 | 30


§ Allows up to six-way conference calls.

§ Ability to simultaneously use voice and Data. Eliminates the need to have voice on one network
and data on another.

▫ Limitations

§ Only those smart phones which are VoLTE capable can use it.

§ Strong 4G coverage to make and receive calls over 4G network.

§ For VoLTE call, both devices involved in communication must be compatible with VoLTE.

▫ Services in India

§ Reliance Jio is the leading operator providing the VoLTE. The company doesn’t have spectrum in
2G or 3G and thus it places all its calls using 4G LTE only (unlike other operators which drop to 2G
or 3G for sending and receiving calls).

2) 5G (5TH GENERATION)
§ Why in news?

• Reliance announced that its telecom venture Jio has designed and developed from scratch a
complete 5G solution ready for deployment (June 2020)

§ 5G refers to the fifth generation of cellular wireless communication technologies. They are
proposed to be the next telecommunication standards for wireless network beyond the current
4G/IMT-Advanced Standards.

§ The Next Generation Mobile Network Alliance has defined requirements that a 5G standard should
fulfill. Some of the features are as follows

- Higher Speed (data rates) – With speeds of up to 100 Gigabits/sec 5G is set to be 10-100 times
faster than 4G. This will put mobile internet services on par with broadband internet services.

- Lower latency – real time response

- It will provide greater network stability to ensure that business critical mobile functions do not
go offline and the speed necessary to give employees a fully equipped virtual office almost
anywhere.

- Device Intelligence: Unlike 4G, 5G has the capability to differentiate between fixed and mobile
devices. It uses cognitive radio techniques to identify each device and offer the most

Praxis study hall, Villupuram, tamilnadu, praxistotransform@gmail.com, 8220066131 P a g e 22 | 30


appropriate delivery channel. This will allow a much more customized internet connection –
according to device capability and local reception environment.

- Other technical features of 5G

ú 5G will use higher frequencies of wireless spectrum (~ 30 GHz to 300 GHz) range when
compared to 4G which uses frequencies below 6 GHz. This high frequency will be able to
support huge quantity of data. Further, shorter wavelength would allow smaller antenna
size to be used.

ú These frequencies are highly directional and thus can be used right next to other wireless
signals without causing interference. This is very different from 4G towers that fire data in
all directions, potentially wasting both energy and power to beam radio waves at locations
that aren’t even requesting access to the internet.

§ This is made possible by a new technology called Massive MIMO (multiple input
multiple output), that uses multiple targeted beams to spotlight and follow users
around a cell site, improving coverage, speed and capacity. Current network
technologies operate like floodlights, illuminating an area but with lots of wastage of
the light/signal.

ú Several hundreds of thousands of simultaneous connections for wireless sensors

ú Spectral efficiency significantly enhanced compared to 4G

ú Improved Coverage

ú Enhanced signal efficiency

- How 5G will impact various sectors


▫ Economic Benefits: According to A.J. Paulraj Committee report, the overall impact of 5G on
Indian economy can be upto $1 trillion by 2035. It will help business especially those that
operate outside the reach of broadband networks or suffer from slow fixed line services.
▫ Fast Rural connectivity: Cost of putting up mobile data will be lower than fiber optics cable,
5G will help rural areas get faster connectivity.
§ It will have huge positive impact on health, education and other services in rural areas.
▫ Better Health services: Lower Latency -> Remote surgeries more effective.
▫ Better disaster management: -> Faster image transfers by drones – Faster Processing.
▫ Driverless cars – large number of sensors in these cars will generate massive amount of data
that will need to be communicated to other vehicles.
§ Internet of Things (IoT): 5G is considered backbone of IoT due to its high data rate,
reduced end-to-end latency and improved coverage.
▫ Better Energy management

Praxis study hall, Villupuram, tamilnadu, praxistotransform@gmail.com, 8220066131 P a g e 23 | 30


§ National energy infrastructure can be potentially transformed by ultra-fast internet
speeds. “A smart network identifies grid connectivity issues and takes appropriate action
in real time by analyzing the data that originates from the two-way communication
infrastructure.
▫ Other potential uses
§ Download time for a high-definition full-length movie will be seconds, not minutes
§ It will allow simultaneous language translation between people attending
teleconference.
▫ Making India 5G Ready - A.J. Paulraj Committee
§ Background: Central government had formed a panel to outline the roadmap for 5G adoption
in India under the chairmanship of Standford University professor A.J. Paulraj. The panel
submitted its report in Aug 2018
§ Key Recommendations
- Government should announce its 5G policy by Dec 2018.
- Most guidelines on regulatory matters by promulgated by March 2019 to facilitate early
5G deployment.
- Enhance spectrum allocation for public wireless services to realize digital infrastructure
as a core utility under Digital India.
- More favorable spectrum policy: Currently the cost of spectrum relative to per-capital
GDP is high. It is important that India builds a more favorable spectrum policy in the 5G
era.
- Financial Support to telecos related to deployment of 5G technology. Provide them with
free bandwidth for trials for a fixed time frame to allow setting up of the network.
- Partial Financial Support for capital expenditure for equipment makers may also be
considered based on equitable risk sharing.
- Creation of labs under different economic verticals which would allow application
testing.
- Other recommendations included recommendations on education and awareness
promotion, application and use case labs, participation in international standards,
development of application layer standards, and major 5G trials.

ú Some other Concepts


ú Cellular technology denotes that entire coverage area of the base station is divided into many cells
to implement frequency re-use.

Praxis study hall, Villupuram, tamilnadu, praxistotransform@gmail.com, 8220066131 P a g e 24 | 30


8. PRACTICE QUESTIONS
1 Consider the following statements:
1. End to End Encryption in WhatsApp doesn't leave any scope for leaking of data
2. End to End Encryption is more secure than Quantum Cryptography

Which of the above statements is/are correct?


A. 1 only
B. 2 only
C. Both 1 and 2
D. Neither 1 nor 2

2 In India, the term "Public Key Infrastructure is used in the context of [Prelims 2020]
A. Digital Security infrastructure
B. Food Security Infrastructure
C. Health care and education infrastructure
D. Telecommunication and Transportation infrastructure

3 "Encryption Technologies" have application in which of the following:


1. Satellite Navigation Systems
2. Hard drives
3. Internet Communication
4. Mobile Sim Cards
5. ATM Cards
Select the correct answer using the code given below:
a. 1 and 2 only
b. 3, 4 and 5 only
c. 1, 2, 3, 4 and 5
d. 2, 3, 4 and 5

4 Ceaser Shift Cipher is an example of:


a. Symmetric Key Cryptography
b. Asymmetric Key Cryptography
c. Quantum Cryptography
d. None of the above

5 Which of the following data security features are provided by modern encryption technologies?
1. Confidentiality
2. Authentication
3. Integrity
4. Non-Repudiation
Choose the correct answer from the codes provided below:
A. 1 and 2 only
B. 2 and 3 only
C. 3 and 4 only

Praxis study hall, Villupuram, tamilnadu, praxistotransform@gmail.com, 8220066131 P a g e 25 | 30


D. 1, 2, 3 and 4
6 Consider the following statements about a digital signature: (pre 2019)
1. An electronic record that identifies the certifying authority issuing it.
2. Used to serve as a proof of identity of an individual to access information of server on
Internet.
3. An electronic method of signing an electronic document and ensuring that the original
content is unchanged.
Which of the statements given above is/are correct?
A. 1 only
B. 2 and 3 only
C. 3 only
D. 1,2 and 3

7 Consider the following statements about Quantum Cryptography:


1. Quantum Cryptography uses the Heisenberg Uncertainty Principle to ensure security
2. It ensures long term secrecy which may not be ensured by traditional symmetric and
asymmetric cryptographic algorithms
Which of the above statement(s) is/are correct?
A. 1 only
B. 2 only
C. Both 1 and 2
D. Neither 1 nor 2
8 Consider the following statements about Blockchain:
1. Blockchain technology is only useful for crypto currencies
2. It is a centralized ledger which is highly secure
3. Block chain has the potential to play an important role in anti-money laundering efforts of
government of India
Which of the above statement(s) is/are incorrect?
A. 1 and 2 only
B. 3 only
C. 2 and 3 only
D. 1, 2 and 3
9 With reference to 'Bitcoins' sometimes seen in the news, which of the following statements is/are
correct?
i. Bitcoins are tracked by the central banks of the countries
ii. Anyone with bitcoin address can send and receive Bitcoins from anyone else with a bitcoin
address.
iii. Online payments can be sent without either side knowing the identity of the other
Select the correct answer using the code given below:
a. 1 and 2 only
b. 2 and 3 only
c. 3 only
d. 1,2 and 3

Praxis study hall, Villupuram, tamilnadu, praxistotransform@gmail.com, 8220066131 P a g e 26 | 30


10 With reference to crypto currencies, what is/are the difference/differences between BITCOIN and
LIBRA?
1. BITCOIN is not backed by any other currency, whereas LIBRA will be backed by reserve of
assets such as real-world bank deposits, government securities etc.
2. BITCOIN is based on the blockchain technology, LIBRA will not use block chain
3. LIBRA's value will be less fluctuating than BITCOIN's value as LIBRA's value will be tied to
established currencies.
Select the correct answer using the codes given below:
A. 1 and 2 only
B. 2 only
C. 3 only
D. 1 and 3
11 Consider the following statements about the recommendations of Subhash Chandra Garg Committee on
the Viability of Cryptocurrencies in India:
1. The committee has recommended complete ban on all types of cryptocurrencies
2. The committee has recommended the financial regulators to evolve regulations for
development of distributed ledger technologies in their respective areas
Select the correct answer using the codes given below:
a. 1 only
b. 2 only
c. Both 1 and 2
d. Neither 1 nor 2

12 When the alarm of your smartphone rings in the morning, you wake up and tap it to stop the alarm
which causes your geyser to be switched on automatically. The smart min-or in your bathroom shows
the day’s weather and also indicates the level of water in your overhead tank. After you take some
groceries from your refrigerator for making breakfast, it recognises the shortage of stock in it and places
an order for the supply of fresh grocery items. When you step out of your house and lock the door, all
lights, fans, geysers and AC machines get switched off automatically. On your way to office, your car
warns you about traffic congestion ahead and suggests an alternative route, and if you are late for a
meeting, it sends a- message to your office accordingly. In the context of emerging communication
technologies, which one of the following term” best applies to the above scenario? (Pre 2018)
a. Border Gateway Protocol
b. Internet of Things
c. Internet Protocol
d. Virtual Private Network
13 Which of the following technological advancements changes have made Internet of Things (IoT)
feasible?
1. Development of cheap microprocessors and sensors
2. Moving from IPv4 protocol to IPv6 protocol
3. Increasing popularity of Rooftop solar power panels
4. Increasing use of pacemakers to manage heart ailments
Select the most appropriate answer from the codes provided below:
A. 1 and 2 only

Praxis study hall, Villupuram, tamilnadu, praxistotransform@gmail.com, 8220066131 P a g e 27 | 30


B. 2 and 3 only
C. 3 and 4 only
D. 1, 2, 3 and 4
14 Internet of Things have the potential to positively impact which of the following sectors:
1. Renewable Energy Sector
2. Health Sector
3. Agricultural Sector
4. Transportation sector
Choose the correct answer from the codes provided below:
A. 1 only
B. 2, 3 and 4 only
C. 3 and 4 only
D. 1, 2, 3 and 4
15 With reference to wireless cellular communication technologies, what is/are the difference/differences
between 5G and 4G?
1. 5G is digital technology whereas 4G is analog in nature
2. India is the first country to start testing a 5G technology, whereas 4G had come very late to
India
3. 5G is backward compatible whereas 4G is non backward compatible
Select the correct answer using the codes given below:
A. 1 and 2 only
B. 2 only
C. 3 only
D. None of the above
16 Consider the following statements about VoLTE:
1. VoLTE provides for improved battery life when compared to VoIP
2. VoLTE allows the simultaneous use of both voice and data
Which of the above statement(s) is/are correct?
A. 1 only
B. 2 only
C. Both 1 and 2
D. Neither 1 nor 2
17 With reference to communication technologies, what is/are the difference/differences between LTE
(Long-Term Evolution) and VoLTE (Voice over Long-Term Evolution)? (Pre 2019)
1. LTE is commonly marketed as 3G and VoLTE is commonly marketed as advanced 3G.
2. LTE is data-only technology and VoLTE is voice-only technology.
Select the correct answer using the code given below
(a) 1 only
(b) 2 only
(c) Both 1 and 2
(d) Neither 1 nor 2
18 Which of the following is/are advantage(s) of 4G over older cellular wireless communication
technologies?

Praxis study hall, Villupuram, tamilnadu, praxistotransform@gmail.com, 8220066131 P a g e 28 | 30


1. Device intelligence
2. Higher data bandwidth
3. Lower latency
4. Better spectral efficiency
Select the correct answer using the code given below:
A. 1, 2 and 3
B. 2, 3 and 4
C. 1, 3 and 4
D. 1, 2 and 4

Praxis study hall, Villupuram, tamilnadu, praxistotransform@gmail.com, 8220066131 P a g e 29 | 30

You might also like