Professional Documents
Culture Documents
IT Module Paper-2
IT Module Paper-2
9 Ethernet 92-104
This module focuses on Information Security which is part of Cyber Security. Issues on freedom
of expression online, human rights online, violence against women and girls (VAWG) online,
digital abuse and online sexual harassment, hate speech online, cyberbullying, and child online
protection (COP) initiatives have been excluded in this module, and they can form part of a
separate module on Internet/Online safety awareness.
Basic Concepts in ICT Security:
What is information?
Generally, information is defined as the result of mental activity; it is an intangible product that
is transmitted through media. In the field of ICT, information is the result of processing,
manipulating and organizing data, which is simply a collection of facts.
In the field of Information Security, information is defined as an “asset”; it is something that has
value and should therefore be protected. The definition of information and information security
in ISO/IEC 27001:2005 is used throughout this module.
The value assigned to information today reflects the shift from an agricultural society to an
industrial society and finally to an information-oriented society. In agricultural societies, land
was the most important asset and the country with the largest production of grain had a
competitive edge. In industrial societies, capital strength, such as having oil reserves, was a key
factor in competitiveness. In a knowledge and information-oriented society, information is the
most important asset and the ability to collect, analyze and use information is a competitive
advantage for any country.
As the perspective has shifted from net asset value to information asset value, there is a
growing consensus that information needs to be protected. Information itself is valued more
than the media holding information. Table 1 contrasts information assets with tangible assets.
As shown in Below, information assets are radically different from tangible assets. Thus,
information assets are vulnerable to different kinds of risks.
Conflicts over ownership and control of information – Complications caused by ownership and
control of information have increased with the expansion of informatization. For example, as
governments seek to build a personal information database under the umbrella of e-
government, some sectors have expressed concern over the possibility of invasion of privacy
from the disclosure of personal information to other parties.
Information and wealth gaps between classes and countries – The size of information asset
holdings can be the barometer of wealth in knowledge/information-oriented societies.
Developed countries have the capacity to produce more information and to profit from selling
information as products. Information-poor countries, by contrast, need huge investments just
to be able to access information.
Information security's primary focus is the balanced protection of the confidentiality, integrity
and availability of data (also known as the CIA triad) while maintaining a focus on efficient
policy implementation, all without hampering organization productivity.
Cyber Security, in contrast, includes not only information security, but also digital infrastructure
security, such as Supervisory Control and Data Acquisition (SCADA) systems and Internet-of-
Things (IoT) systems, which goes beyond the protection of valuable information.
Information security also requires a clear understanding of the value of information assets, as
well as their vulnerabilities and corresponding threats. This is known as risk management.
Above Figure above shows the correlation between information assets and risk.
Risk is determined by the asset value, threats and vulnerabilities. The formula is as follows:
Risk = ∫(Asset Value, Threats, Vulnerabilities)
Risk is directly proportional to asset value, threats and vulnerabilities. Thus, the risk can be
increased or decreased by manipulating the size of the asset value, threats and vulnerabilities.
This can be done through risk management.
Risk reduction (risk mitigation) – This is done when the likelihood of threats/vulnerabilities is
high, but their effect is low. It involves understanding what the threats and vulnerabilities are,
altering or reducing them, and implementing a countermeasure. However, risk reduction does
not reduce the value of risk to “0”.
Risk acceptance – This is done when the likelihood of threats/vulnerabilities is low and their
likely impact is minor or acceptable.
Risk transference – If the risk is excessively high or the organization is not able to prepare the
necessary controls, the risk can be transferred outside of the organization. An example is taking
out an insurance policy.
Risk avoidance – If the threats and vulnerabilities are highly likely to occur and the impact is
also extremely high, it is best to avoid the risk by outsourcing data processing equipment and
staff, for example.
TIP
All these items should be disposed of properly. You should formulate a policy on destruction of
data. The safest policy is to physically destroy the media and the information stored on it.
Destruction is the only safe method of completely removing all traces of information stored on
a removable media device. All paper-generated information should be shredded and/or taken
away by a bonded destruction office.
Web pages
The Web pages of an office are a great place to find out information and organizational
structure. Many companies also include the biographies of top executives. This information can
be used to impersonate that person or someone who is an associate of the executive.
For example, you could call an office and ask the receptionist for Manohar. She tells you that
Manohar is out of the office until Monday. You ask who is in charge until he returns. You are
told Mary. You leave a message for Mary, requesting information that she would have access
to, saying you're working with Manohar and he said she could fax or e-mail the information you
need while he's out of the office.
WARNING
E-mail social engineering is a much more direct means of gaining access to a system because
attachments can launch worms, viruses, and back doors.
Ex-employees are a great source of information on the inner workings of a office, especially if
they left the office under unhappy conditions. Vendors, contractors, and strategic partners are
another fantastic source of information. It's easier to impersonate someone from another office
than it is to impersonate an employee.
These attacks are very successful because our business needs change daily and we live in a fast-
paced world. This type of attack plays on the empathy and sympathy of the victim, and an
attacker can shop around until he finds someone who will help.
Here are some social-engineering approaches an intruder can use to get information:
Pretends to be a fellow employee or a new hire, contractor, or a vendor.
Insists there's some urgency to complete some task or obtain some information.
Needs assistance or he will be in trouble or lose his job.
WARNING
Employees can exploit social engineering just as well as outsiders. Keep in mind that more
damage is done to a network by disgruntled employees than by outsiders.
You'll learn how to recognize a social engineering situation shortly. Here's a scenario that
actually happened:
A user came to a network administrator with his laptop and requested that it be joined to the
domain. The administrator logged the user off the laptop, logged in as himself, and joined the
laptop to the domain. So, what's wrong with that? The user had keystroke logging software
installed on the laptop. He proceeded to go back to his work area, read the log file, log in as the
administrator, browse to the main server, and copy the SAM (Security Accounts Manager) to a
file. (For those of you unfamiliar with the SAM, it holds user account information that includes
usernames and passwords.) He took the file home and that evening ran L0phtCrack, which is
password-cracking software, on the file. The next day, he had the logins and passwords for
every user in the office. He periodically logged in as other users and accessed information he
should not have. As time went by, he got bolder, logging in as the administrator and shutting
down services, causing problems on the network. Eventually, his bragging got him into a bind
and he was dismissed for his actions. The best way to avoid this type of situation is to never join
a machine to the domain from a user's machine. The account should be created at the server
console instead.
The most common form of this type of authentication is a smart card. The security in this
authentication is that both are need for validation. If the card is stolen, or the PIN is discovered,
neither one of these alone can enable someone else to log on as the user.
Smart card readers are attached to a computer port and a digital certificate is downloaded to
activate the card. Smart card logon requires the user to insert the card and enter a PIN in order
to log on.
Understand tunneling
The purpose of a VPN is to secure your network communications. There are two broad
categories of tunneling:
Voluntary
Compulsory
In voluntary tunneling, the situation is as described earlier and shown in Figure 2-1. The cable
modem dials the ISP, and the user is then connected to the VPN server via the Internet.
In compulsory tunneling, the tunnel is set up between two VPN servers that act as routers for
network traffic. This type of tunnel is most useful for connecting a remote office with its own
network to a central office. Sometimes as an office is growing, it allows employees to run
offices out of their homes with those employees hiring several people to work for them, or it
may be in the situation where a contractor works out of an office that is shared by other
contractors. Figure 3 shows an example of this type of tunneling.
WARNING
Tunneling should not be used as a substitute for encryption. The strongest level of encryption
possible needs to be used within the VPN.
Let's take a look at personal firewalls that can be installed to help detect intrusions in home
computers.
Software firewalls
Software firewalls are more flexible in that they enable the user to move from network to
network. Typically, the first time a program tries to access the Internet; a software firewall asks
whether it should permit the communication. You can opt to have the firewall ask the user each
time the program tries to get online. The prompts usually get so annoying that most users end
up making hasty decisions with little more information than they originally had. Another danger
is that firewall filtering can get too complicated for the average user to fix easily, which makes
users reluctant to deny permission to anything. There should be help available to
telecommuters to aid in configuring these types of firewalls. Its one thing to say that
telecommuters have firewalls, but quite another to ensure that those firewalls are correctly
configured.
Here's a list of the most commonly used software firewalls:
McAfee.com Personal Firewall
Norton Internet Security
Sygate Personal Firewall
Hardware firewalls
Hardware firewalls provide an additional outer layer of defense that can more effectively hide
one or more connected PCs. There are inexpensive router appliances that move traffic between
the Internet and one or more machines on home networks, which simply hide the IP addresses
of PCs so that all outgoing traffic seems to come from the same address. Recently, router
manufacturers have been including actual firewalls that block inappropriate inbound and
outbound traffic making these a much better choice.
In general, the average user will like the nature of hardware solutions because they operate in
the background without generating as many queries and alerts as software firewalls. In
addition, the physical installation is easy, but the normal home user won't know how to
configure the firewall should the default settings not be strong enough.
Remember that even a good firewall cannot protect the user if he does not think before he
downloads or does not exercise a proper level of caution. No system is foolproof, but the right
combination of hardware, software, and good habits can make your telecommuters' computing
environment safer.
INTRUSION DETECTION
We will see what actually happens when your network is invaded or damaged. We develop and
deploy hardware and software in such an extremely quick fashion to meet the demand of
business and home consumers that we don't always take the time to be sure that these
technologies are properly tested and secured. This puts our networks at risk not only from the
professional cracker but also from curious or disgruntled employees.
Let's first look at intrusion detection and intrusion prevention systems that can help spot a
potential intrusion.
WARNING
Sometimes the data that is collected by these systems is overwhelming. When you start trying
to do something with the intrusion detection data, you realize the magnitude of deciphering or
reading the data is well beyond the resources and time you want to put in to make it effective.
Often, incidents happen even though you have firewalls and intrusion detection. So, you've got
ten thousand alarms going off, five of them are probably valid, two of them you really need to
do something about, but you don't have the time or the resources to find what those five are
and what the two really are. You end up doing nothing because you don't know how to
respond. Please do not let this happen. Make the time and resource to use these tools
effectively.
Preventing actual damage to your company's business functionality is critical to protecting
today's open networks. Intrusion prevention technology serves as a strategy for those who
desire proactive and preventive security measures in the face of attacks.
FIREWALL
In its most basic terms, a firewall is a system designed to control access between two networks.
There are many different kinds of firewalls—packet filters, application gateways, or proxy
servers. These firewalls can be delivered in the form of software that runs on an operating
system, like Windows or Linux. Or, these firewalls could be dedicated hardware devices that
were designed solely as firewalls.
Financial Activities
Material Management and its procurement
Sales and Marketing
Quality Management and assurance
Human Resource Development
Payroll
Training Management
Business Intelligent Warehousing
Project Planning and Monitoring
System Maintenance
DotSOFT Package.
In house developed packages for computation and preparation of
financial Statements.
Other locally developed software.
DOTSOFT Package
Other Local packages System Maintenance Present Status
DOTSOFT FRS
● TVARIT
HR Package
HR Pay Roll
HR Leave Module
CTMS
ADVANTAGES OF ERP
Integrate financial information
Integrate customer order information
Standardize and speed up manufacturing processes
Reduce inventory
Standardize HR information
Some security features are included within an ERP system to protect against
both outsider crime and internal control
ERP Systems centralize the data in one place. Benefits of this include:
Eliminates the problem of synchronizing changes between multiple systems
Permits control of business processes that cross functional boundaries
Provides top-down view of the enterprise (no "islands of information")
CONCLUSION
The software packages reduce the workload and automation of activities. It also
assists in elimination of human errors, as a result, improves effectiveness and consistency.
These are various types of business software commonly used in BSNL. These Software‘s
are responsible for accomplishing different tasks in no time, enhancing customer
satisfaction and improving efficiency.
What is a database?
The RDBMS system manages the relational data. Oracle Database is the most famous relational
database system (RDBMS) because it shares the largest part of a market among other relational
databases. Some other popular relational databases are MySQL, DB2, SQL Server, PostgreSQL,
etc.
Oracle database was the first DB that designed for enterprise grid computing and data
warehousing. Enterprise grid computing provides the most flexible and cost-effective way to
manage information and applications. It uses SQL queries as a language for interacting with the
database.
Oracle database is compatible with a wide range of platforms such as Windows, UNIX, Linux,
and macOS. It supports several operating systems like IBM AIX, HP-UX, Linux, Microsoft
Windows Server, Solaris, SunOS, macOS, etc. In the late 1990s, Oracle began supporting open
platforms like GNU/Linux.
o Enterprise Edition: It is the most robust and secure edition. It offers all features,
including superior performance and security.
o Standard Edition: It provides the base functionality for users that do not require
Enterprise Edition's robust package.
o Express Edition (XE): It is the lightweight, free and limited Windows, and Linux edition.
o Oracle Lite: It is designed for mobile devices.
o Personal Edition: It's comparable to the Enterprise Edition but without the Oracle Real
Application Clusters feature.
Oracle Corporation is the largest software company to develop and markets computer software
applications for business. The company is best known for its Oracle database products and,
more recently, cloud products and services. Its relational database was the first to support SQL,
which has since become the industry standard.
Oracle database is one of the most trusted and widely used relational database engines. The
biggest rival of Oracle database is Microsoft's SQL Server.
History of Oracle
Oracle Corporation was founded by Lawrence Ellison (Larry Ellison), Bob Miner, Ed Oates, and
Bruce Scott in August 1977. They have a lot of experience in building database programs for
several companies and builds their first project (a special database program) for the CIA
(Central Intelligence Agency). Oracle was named after "Project Oracle," a project for one of
their clients named Central Intelligence Agency, and the company that created Oracle was
called Systems Development Labs (SDL). Systems Development Labs was renamed Relational
Software Inc. (RSI) in 1978 to expand their market for the new database. They had again
changed the name of the company from RSI to Oracle Systems Corporation in 1982.
The first commercially available RDBMS named Oracle V2 (Version 2) was built using PDP-11
assembler language (SQL-based RDBMS). Although they already developed a commercial
RDBMS in 1977, it wasn't available for purchase until 1979, when Oracle version 2 was released.
In 1983, Oracle database portable version named "Oracle version 3" was released. This version
was written in the C programming language. It was the first relational database that can run in
mainframes, minicomputers, PCs, or any hardware with a C compiler. It also supports SQL
queries and transactions execution.
It is one of the oldest database management companies in the world. It has always focused on
enterprise needs and kept up with the newest technological developments. As a result, its
products are constantly updated with new features. For example, the most recent Oracle
database, 19C, is also available on Oracle Cloud. Oracle allows users to select from various
database editions to meet their specific demands with a cost-effective solution.
Oracle database manages data with the help of an open, complete, and integrated approach.
The following are features that complete the demand for powerful database management:
Availability: It is never offline or out of service that means supported 24*7 availability of the
database. It provides high availability of databases because of the Oracle Data Guard
functionality. This functionality allows using of the secondary database as a copy of the primary
database during any failure. As a result, all normal processes such as backups and partial
failures do not interrupt the database from being used.
Security: Oracle has a mechanism for controlling and accessing the database to prevent
unauthorized access. It provides high security because of the Oracle Advanced Security
features. It offers two solutions to protect databases that are TDE (Transparent Data
Encryption) and Data Redaction. TDE supports data encryption both at the source and after
export. Redaction is performed at the application level. Oracle has some other security features
like Oracle Database Vault that regulates user privileges and Oracle Label Security.
Performance: Oracle has procedures and principles that help us to get high levels of database
performance. We can increase query execution time and operations with the use of
performance optimization techniques in its database. This technique helps to retrieve and alter
data faster.
Portability: The Oracle database can be ported on all different platforms than any of its
competitors. We can use this database on around 20 networking protocols as well as over 100
hardware platforms. This database makes it simple to write an Oracle application by making
changes to the OS and hardware in a secure manner.
Backup and Recovery: It is always better to take a proper backup of your entire oracle online
backup and recovery. The Oracle database makes it easy to accomplish recovery quickly by
using the. RMAN (Recovery Manager) functionality. It can recover or restore database files
during downtime or outages. It can be used for online backups, archived backups, and
continuous archiving. We can also use SQL* PLUS for recovery, which is known as user-managed
recovery.
Multiple Database: Oracle database allows several database instances management on a single
server. It provides an instance caging approach for managing CPU allocations on a server
hosting database instances. The database resource management and instance caging can work
together to manage services across multiple instances.
Flashback Technology: This advantage comes with the recent Oracle version. It allows us to
recover those data that are incorrectly deleted or lost by human errors like accidental deletion
of valuable data, deleting the wrong data, or dropping the table.
Complexity: Oracle is not recommended to use when the users are not technically savvy and
have limited technical skills required to deal with the Oracle Database. It is also not advised to
use if the company is looking for a database with limited functionality and easy to use.
Cost: The price of Oracle products is very high in comparison to other databases. Therefore
users are more likely to choose other less expensive options such as MS SQL Server, MySQL, etc.
Difficult to manage: Oracle databases are often much more complex and difficult in terms of
the management of certain activities.
A primary key is a single field or combination of fields that contains a unique record. It must be
filled. None of the field of primary key can contain a null value. A table can have only one
primary key.
1. At 1, the User issues a SELECT statement which is carried over to the database
(only after connection established using listeners) by the user process.
2. At 2, as there will be a server process created for this user in DEDICATED server
architecture, SQL is passed into this PGA and in turn, creates a CURSOR in it. So,
every SQL statement will have the cursor in the memory until query execution is
completed.
3. At 3, after the cursor is created, the syntax check will let the query move to SGA.
4. At 4,5,6,7, now the system will verify if the query is already cached. If yes, picks
up the execution plan and if no, parsing happens and a new execution plan is
created by the optimizer.
5. At 8,9, now data is pulled into buffer cache with the help of a large pool to
perform I/O operations smoothly.
6. At 10,11, in the case of the ORDER BY clause, sorting takes place in the server
process that is PGA and data is sent back to the user process. Now that query
executed successfully, the cursor area is released on the database server.
Background Process in Oracle Database Architecture:
The background process is a mechanism in an operating system that can run a series of steps.
When we are talking about the individual PGA there under the PGA different components are
there one is session memory one is a persistent area a runtime area that is called a private SQL
area that is the small area size, hash area, bitmap merge area that all called as a SQL work area.
When the multiple PGAs are allocated that is called one instance PGA.
The content of the PGA includes the following:
Private SQL Area: Stores information for a parsed SQL statement – stores behind variable
values runtime memory allocations.
1. Dedicated Server Environment – It is the private SQL area is located in the
Program Global Area.
2. Shared Server Environment – It is the private SQL area is located in the System
Global Area.
It is also known as stand-alone architecture, it has all the layers such as presentation layer,
application layer, and database layer in a single software package application which handles all
the 3 tires such as Mp3 player, MS Office comes under one-tier application, the data is stored in
a local system or in a drive.
It is also known as client-server architecture which is divided into two parts client application
and database application. The client system handles both the presentation and application layer
and the server system handle the database layer, the communication takes place between the
client and the serve. The client system sends the request to the server system, then the server
system process the request and sends back the data to the client system.
3 tier Architecture:
It is also known as a web-based application that is divided into 3 parts presentation layer,
application layer, and database layer. Client system handles presentation layer application
server handles application layer and server system handles database layer.
N tier Architecture:
It is also known as the distributed application it is similar to three tiers architecture but the
number of applications is increasingly represented in individual tiers in order to distribute the
business logic so that the logic will be distributed.
TYPES OF CLOUD
Cloud can be of three types .
Private Cloud This type of cloud is maintained within an organization and
used solely for their internal purpose. So the utility model is not a big term in
this scenario. Many companies are moving towards this setting and experts
consider this is the 1st step for an organization to move into cloud. Security,
network bandwidth are not critical issues for private cloud.
Public Cloud In this type an organization rents cloud services from cloud
providers on-demand basis. Services provided to the users using utility com-
puting model.
Hybrid Cloud This type of cloud is composed of multiple internal or external
cloud. This is the scenario when an organization moves to public cloud
computing domain from its internal private cloud.
The advantages for using cloud services can be of technical, architectural, business etc .
Cloud Providers' point of view
Most of the data centers today are under utilized. They are mostly 15% utilized.
These data centers need spare capacity just to cope with the huge spikes that sometimes get
in the server usage. Large companies having those data centers can easily rent those
computing power to other organizations and get pro t out of it and also make the resources
needed for running data center (like power) utilized properly.
Companies having large data centers have already deployed the resources and to
provide cloud services they would need very little investment and the cost would be
incremental.
CLOUD ARCHITECTURE
The cloud providers actually have the physical data centers to provide virtualized
services to their users through Internet. The cloud providers often provide separa-tion
between application and data. This scenario is shown in the Figure 2. The underlying physical
machines are generally organized in grids and they are usu-ally geographically distributed.
Virtualization plays an important role in the cloud scenario. The data center hosts provide
the physical hardware on which virtual ma-chines resides. User potentially can use any OS
supported by the virtual machines used.
Most of the cloud architectures are built on Grid architecture and utilizes its ser-
vice. Grid is also a form of distributed computing architecture where organizations owning
data centers collaborate with each other to have mutual bene t. Although if apparently
seen it seems that cloud computing is no di erent from its originator in the rst look but
there are substantial di erence between them in spite of so many similarities. The relation
between Grid and cloud computing is discussed in Table .
GOOGLE APP-ENGINE
Google App-Engine is a platform for developing and deploying web applications in
Google's architecture. This provides Platform as a Service to the cloud users. In 2008 Google
App-Engine was rst released as beta version. Languages supported by Google App- Engine
are python, java and any extension of JVM languages. App-Engine requires developers to use
only languages which are supported by it and this is also applied with APIs and frameworks.
Now Google App-Engine allows storing and retrieving data from a BigTable non-relational
database.
AppEngine applications are expected to be request-reply based. Google App-engine
provides automatic scalability, persistent data storage service. Data store features a query
engine and transaction capabilities. These applications are easy to scale as tra c and data
storage need to grow so the cloud user doesn't have to worry about the spikes in the tra c or
data. These applications are generally suitable for social networking start-ups, event-based
websites catering to seasonal events or institutions (schools, colleges, universities,
government agencies) etc [
WINDOWS AZURE
Windows Azure is an intermediate in the spectrum of exibility vs programmer
convenience. These systems use .NET libraries to facilitate language independent managed
environment. This service falls under the category of Platform as a Ser-vice. Though it is
actually in between complete application framework like Google App-Engine and hardware
virtual machines like EC2. Azure applications run on machines in Microsoft data centers. By
using this service customers can use it to run applications and store data on internet
accessible machines owned by Microsoft. windows Azure platform provides three
fundamental components - compute com-ponent, storage component and fabric
component. Basic components of Windows Azure are shown in Figure.
The Compute Service: The primary goal of this platform is to support a large number
of simultaneous users. (Microsoft also said that they would use Azure to build their SaaS
E-Governance
E-Governance is an interface between Government and public or this can be an
interface between two governments or between government and business organiza-tions.
Objectives are generally to improve e ciency and e ectiveness to serve public demand and to
save costs for online services. This requires Government to have the will to decentralize the
responsibilities and processes and start to have faith on electronic and internet systems. E-
government is a form of e-business in gover-nance and refers to the processes and
structures needed to deliver electronic services to the public (citizens and businesses),
collaborate with business partners and to conduct electronic transactions within an
organizational entity. This E-Governance can be greatly improved by utility computing .
Impact of Technology In E-governance -
24/7 Service Model Systems and services require high availability. Get the citizens
feel that Government is always at their service.
Need for Content Web contents should be regularly updated and the infor-mation
provided to the public should be su cient. Respective departments should be responsible for
providing the information.
Human Resource Building these IT skilled resources would need properly trained
personals. This would make government to compete with other private organizations.
RURAL DEVELOPMENT
In the context of rural development cloud computing can also be used to success for
its centralized storage and computing facility and utility based pay model. As per 72.2% of
total Indian population resides in rural areas. According to the survey conducted by \Hole in
the Wall project" computer literacy among boys and girls of age group 8-14 in rural area
varies across the regions of India. It is 40-50% in most of the regions. So the computer
literacy is not a concern in rural India and also in it shown that learning rate is pretty high for
computer literacy. Agriculture is India's biggest employment source, accounting for 52%
employment in India. And agricultural sector contributes to 20% of country's total GDP. So it
is very important to make a serious attempt to develop rural India.
Rural development can be in the form of education, agriculture, health, cul-ture or in
any other elds. Now a days most of the villages have some access to electricity and cellular
phone. So there is technical feasibility of establishing com-puter systems. But the mentality
of the people haven't been changed that much and that's why the spread of personal
computer is not that much signi cant in the villages. We think this growth rate can be
enhanced if the computing system is really cheap, easy to operate with minimum level of
knowledge, without upfront commitment and more essentially if the system is helpful to
enhance their life style. The main aim of the system is to make the people in rural areas to
have access to recent technology and with the help of the computing system enhance their
standard of living and also this would lead to a grater good of developing the nation.
Why not traditional web services?
Availability Many of the services should be available always like health etc. These
availability issues are not that well handled by the traditional web services as they are
The villagers have to own a PC To use traditional web services through in-ternet the
villagers need to own a PC which would increase their investment. Then the issues of need
for technical experts for software/hardware installa-tion and maintenance are needed. But
naturally the number of such experts is very less in number in the remote village.
Upgradation of software or hardware would be a problem both economically and
technically.
With the help of cloud computing this can be made possible. We'll now discuss the
technological and economic advantages for using cloud.
No upfront commitment The villagers need not to invest too much to buy computing
system and commit. But instead they can have very low cost terminals with basic
functionality of I/O and have a network access.
No maintenance issues The users need not to be an expert for maintenance. This
solves the unavailability of technical experts in the remote villages as the maintenance issues
are handled by the cloud provider explicitly.
Upgraded version of hardware and software The users always use the up-graded
version of software and hardware as maintained by the cloud provider. This reduces the cost
of up gradation.
On-demand resource allocation The virtual resources can be extended as needed. If
the user needs more resource then it is provided on demand basis.
Utility computing model the economic model used by the cloud is pay-as-you-use.
This enables the users handle the cost they have to pay.
By using cloud computing model some improvement of the current system is possible
to bring about social and as well as economic prospect in rural India.
Share knowledge and build knowledge base Most of the agriculture related issues are
generally local and they can't be solved by general expertise. So it happens many times that
the so called experts are not the right person to answer the problems but instead the local
farmers are better in understanding.
So in these situations better solution can be given by the local experts. If these local
experts access a common space to share their knowledge then others eventually come to
know about the solution. Thus a knowledge base can be build which would represent the
issues in that local scenario. It is like building Wikipedia.
Health and medical services In the developing countries like India one of the concern
of Rural health care is in spite of best intention from both the medical professionals and
patients a practical challenge is faced for difficulties of communications among interested
parties. This issue can be solved using cloud computing in an appropriate way. Consultation
among doctors around the world make sharing of knowledge possible and takes
telemedicine to the next level, creating a network that goes beyond the one-to- one,
Education in remote areas Education in rural areas can be enhanced with the help of
distance education. Education can be provided in different languages and with respect to
different curriculum with the aid of e-learning components. Students can be encouraged to
build their own multimedia pre-sensations. These can be hosted in the cloud. This type of
approach encourage the students to concentrate more on learning and representing the
material and also that would build the knowledge in the cloud for other students to refer.
This is possible with the aid of cloud computing with greater reliability and availability.
All these things are possible with right initiative. These may need customizing the
original cloud services. Some generally unpopular services like Desktop as a Service may
make sense in these scenario which essentially tells about providing the users a virtual
desktop environment. But deployment of cloud services in rural areas has some issues
associated with it.
The first and foremost issue for the deployment of internet based services in rural
India is the availability of electricity and networks. Currently there are a number of initiatives
underway to explore alternative to wired Internet, in-cluding WiFi, WiMax, satellite-based
Internet connectivity. Such an e ort is made by Midas Communication technologies and
Indian Institute of Madras in the name of corDECT which is a wireless access system. It
provides simultaneously voice and 35-70kbps Internet access to wireless subscriber. Another
effort is where the authors modified traditional WiFi to make it efficiently work in long
distance suitable in the context of rural area.
Optimization due to data locality Store the data where it is mostly used is known as
the data locality. This is very helpful for optimization purpose. This can be done by
establishing data centers in rural India. But the cost of power and bandwidth may not be
cheap in many places. So for those places some e ciency and economic trade o should be
obeyed.
India is now world's 2nd fastest growing economy. As per World Bank survey, by this
year the growth rate of India's economy would be faster than currently fastest economy
China. In India there is very large scope of applying IT in domestic level and that encouraged
the cloud providers to establish cloud services in India. Today companies like Reliance, TATA,
Zenith Computers, Wipro Technologies, Netmagic Solutions, and Reliance are providing
CONCLUSION
Cloud computing is a newly developing paradigm of distributed computing.
Virtualization in combination with utility computing model can make a difference in the IT
industry and as well as in social perspective. Though cloud computing is still in its infancy but
its clearly gaining momentum. Organizations like Google, Yahoo, Amazon are already
providing cloud services. The products like Google App-Engine, Amazon EC2, Windows Azure
are capturing the market with their ease of use, availability aspects and utility computing
model. Users don't have to be worried about the hinges of distributed programming as they
are taken care of by the cloud providers. They can devote more on their own domain work
rather than these administrative works. Business organizations are also showing increasing
interest to indulge themselves into using cloud services. There are many open research
issues in this domain like security aspect in the cloud, virtual machine migration, dealing
with large data for analysis purposes etc. In developing counties like India cloud computing
can be applied in the e-governance and rural development with great success. Although as
we have seen there are some crucial issues to be solved to successfully deploy cloud
computing for these social purposes. But they can be addressed by detailed study in the
subject.
A group of two or more similar things or people interconnected with each other is called network).
Some of the examples of network in our everyday life includes:
• Social network
• Mobile network
• Network of computers
• Airlines, railway, banks, hospitals networks
A computer network is an interconnection among two or more computers or computing devices. Such
interconnection allows computers to share data and resources among each other. A basic network may
connect a few computers placed in a room. The network size may vary from small to large depending on
the number of computers it connects. A computer network can include different types of hosts (also
called nodes) like server, desktop, laptop, cellular phones Apart from computers, networks include
networking devices like switch, router, modem, etc. Networking devices are used to connect multiple
computers in different settings. For communication, data in a network is divided into smaller chunks
called packets. These packets are then carried over a network. Devices in a network can be connected
either through wired media like cables or wireless media like air. In a communication network, each
device that is a part of a network and that can receive, create, store or send data to different network
routes is called a node. In the context of data communication, a node can be a device such as a modem,
hub, bridge, switch, router, digital telephone handset, a printer, a computer or a server.
Evolution of Networking
In the 1960s a research project was commissioned by Advanced Research Projects Agency Network
(ARPANET) in the U.S. Department of Defence to connect the academic and research institutions located
at different places for scientific collaborations. The first message was communicated between the
University of California, Los Angeles (UCLA) and Stanford Research Institute (SRI). Slowly but gradually,
more and more organisations joined the ARPANET, and many independent smaller networks were
formed. Few of the milestones in the magnificent journey of evolution of computer networks is depicted
in the timeline shown in Figure
Types of Networks There are various types of computer networks ranging from network of handheld
devices (like mobile phones or tablets) connected through Wi-Fi or Bluetooth within a single room to the
millions of computers spread across the globe. Some are connected wireless while others are connected
through wires. Based on the geographical area covered and data transfer rate, computer networks are
broadly categorised as:
Personal Area Network (PAN) It is a network formed by connecting a few personal devices like
computers, laptops, mobile phones, smart phones, printers etc., as shown in Figure 10.4. All these
devices lie within an approximate range of 10 metres. A personal area network may be wired or
wireless. For example, a mobile phone connected to the laptop through USB forms a wired PAN while
two smartphones communicating with each other through Bluetooth technology form a wireless PAN or
WPAN.
Local Area Network (LAN) It is a network that connects computers, mobile phones, tablet, mouse,
printer, etc., placed at a limited distance. The geographical area covered by a LAN can range from a
single room, a floor, an office having one or more buildings in the same premise, laboratory, a school,
college, or university campus. The connectivity is done by means of wires, Ethernet cables, fibre optics,
or Wi-Fi. A Local Area Network (LAN) is shown in Figure
LAN is comparatively secure as only authentic users in the network can access other computers or
shared resources. Users can print documents using a connected printer, upload/download documents
and software to and from the local server. Such LANs provide the short range communication with the
high speed data transfer rates. These types of networks can be extended up to 1 km. Data transfer in
LAN is quite high, and usually varies from 10 Mbps (called Ethernet) to 1000 Mbps (called Gigabit
Ethernet), where Mbps stands for Megabits per second. Ethernet is a set of rules that decides how
computers and other devices connect with each other through cables in a local area network or LAN.
WAN
Wide Area Network connects computers and other LANs and MANs, which are spread across
different geographical locations of a country or in different countries or continents. A WAN could
be formed by connecting a LAN to other LANs via wired/wireless media. Large business, educational
and goveernmeen t organisations connect their different branches in different locations across the
world through WAN. The Internet is the largest WAN that connects billions of computers, smartphones
and millions of LANs from different continents.
Modem
Modem stands for ‘MOdulator DEModulator’. It refers to a device used for conversion between analog
signals and digital bits. We know computers store and process data in terms of 0s and 1s. However, to
transmit data from a sender to a receiver, or while browsing the internet, digital data are converted to
an analog signal and the medium (be it free-space or a physical media) carries the signal to the receiver.
There are modems connected to both the source and destination nodes. The modem at the sender’s
end acts as a modulator that converts the digital data into analog signals. The modem at the receiver’s
end acts as a demodulator that converts the analog signals into digital data for the destination node to
understand. Figure 10.8 shows connectivity using a modem.
Wide Area Network (WAN) Wide Area Network connects computers and other LANs and MANs, which
are spread across different geographical locations of a country or in different countries or continents. A
WAN could be formed by connecting a LAN to other LANs (Figure 10.7) via wired/wireless media. Large
JTO to SDE IT Module Internal Circulation Only Page 71
business, educational and government organisations connect their different branches in different
locations across the world through WAN. The Internet is the largest WAN that connects billions of
computers, smartphones and millions of LANs from different continents.
Ethernet Card
Ethernet card, also known as Network Interface Card (NIC card in short) is a network adapter used to
set up a wired network. It acts as an interface between computer and the network. It is a circuit board
mounted on the motherboard of a computer as shown in Figure 10.9. The Ethernet cable connects the
computer to the network through NIC. Ethernet cards can support data transfer between 10 Mbps and 1
Gbps (1000 Mbps). Each NIC has a MAC address, which helps in uniquely identifying the computer on
the network.
RJ45
RJ 45 or Registered Jack-45 is an eight-pin connector (Figure 10.10) that is used exclusively with Ethernet
cables for networking. It is a standard networking interface that can be seen at the end of all network
cables. Basically, it is a small plastic plug that fits into RJ-45 jacks of the Ethernet cards present in various
computing devices
Repeater
Data are carried in the form of signals over the cable. These signals can travel a specified distance
(usually about 100 m). Signals lose their strength beyond this limit and become weak. In such conditions,
original signals need to be regenerated. A repeater is an analog device that works with signals on the
cables to which it is connected. The weakened signal appearing on the cable is regenerated and put back
JTO to SDE IT Module Internal Circulation Only Page 72
on the cable by a repeaterRJ 45 or Registered Jack-45 is an eight-pin connector (Figure 10.10) that is
used exclusively with Ethernet cables for networking. It is a standard networking interface that can be
seen at the end of all network cables. Basically, it is a small plastic plug that fits into RJ-45 jacks of the
Ethernet cards present in various computing devices.
Hub
An Ethernet hub is a network device used to connect different devices through wires. Data arriving on
any of the lines are sent out on all the others. The limitation of Hub is that if data from two devices
come at the same time, they will collide.
Switch
A switch is a networking device (Figure 10.12) that plays a central role in a Local Area Network (LAN).
Like a hub, a network switch is used to connect multiple computers or communicating devices. When
data arrives, the switch extracts the destination address from the data packet and looks it up in a table
to see where to send the packet. Thus, it sends signals to only selected devices instead of sending to all.
It can forward multiple packets at the same time. A switch does not forward the signals which are noisy
or corrupted. It drops such signals and asks the sender to resend it. Ethernet switches are common in
homes/offices to connect multiple devices thus creating LANs or to access the Internet.
A router can be wired or wireless. A wireless router can provide Wi-Fi access to smartphones and other
devices. Usually, such routers also contain some ports to provide wired Internet access. These days,
home Wi-Fi routers perform the dual task of a router and a modem/ switch. These routers connect to
incoming broadband lines, from ISP (Internet Service Provider), and convert them to digital data for
computing devices to process.
Gateway
As the term “Gateway” suggests, it is a key access point that acts as a “gate” between an organisation's
network and the outside world of the Internet (Figure 10.14). Gateway serves as the entry and exit point
of a network, as all data coming in or going out of a network must first pass through the gateway in
order to use routing paths. Besides routing data packets, gateways also maintain information about the
host network's internal connection paths and the identified paths of other remote networks. If a node
from one network wants to communicate with a node of a foreign network, it will pass the data packet
to the gateway, which then routes it to the destination using the best possible route.
For simple Internet connectivity at homes, the gateway is usually the Internet Service Provider that
provides access to the entire Internet. Generally, a router is configured to work as a gateway device in
computer networks. But a gateway can be implemented completely in software, hardware, or a
combination of both. Because a network gateway is placed at the edge of a network, the firewall is
usually integrated with it.
Mesh Topology
In this networking topology, each communicating device is connected with every other device in the
network as shown in Figure 10.15. Such a network can handle large amounts of traffic since multiple
nodes can transmit data simultaneously. Also, such networks are more reliable in the sense that even if
a node gets down, it does not cause any break in the transmission of data between other nodes. This
topology is also more secure as compared to other topologies because each cable between two nodes
carries different data. However, wiring is complex and cabling cost is high in creating such networks and
there are many redundant or unutilised connections.
Bus Topology
In bus topology (Figure 10.17), each communicating device connects to a transmission medium, known
as bus. Data sent from a node are passed on to the bus and hence are transmitted to the length of the
bus in both directions. That means, data can be received by any of the nodes connected to the bus.
Star Topology
In star topology (Figure 10.18), each communicating device is connected to a central node, which is a
networking device like a hub or a switch, as shown in Figure 10.18. Star topology is considered very
effective, efficient and fast as each device is directly connected with the central device. Although
disturbance in one device will not affect the rest of the network, any failure in a central networking
device may lead to the failure of complete network.
The central node can be either a broadcasting device means data will be transmitted to all the nodes in
the network, or a unicast device means the node can identify the destination and forward data to that
node only.
JTO to SDE IT Module Internal Circulation Only Page 76
MAC Address
MAC stands for Media Access Control. The MAC address, also known as the physical or hardware
address, is a unique value associated with a network adapter called a NIC. The MAC address is engraved
on NIC at the time of manufacturing and thus it is a permanent address and cannot be changed under
any circumstances. The machine on which the NIC is attached, can be physically identified on the
network using its MAC address. Each MAC address is a 12-digit hexadecimal numbers (48 bits in length),
of which the first six digits (24 bits) contain the manufacturer’s ID called Organisational Unique Identifier
(OUI) and the later six digits (24 bits) represents the serial number assigned to the card by the
manufacturer. A sample MAC address looks like:
IP Address
IP address, also known as Internet Protocol address, is also a unique address that can be used to
uniquely identify each node in a network. The IP addresses are assigned to each node in a network that
uses the Internet Protocol for communication. Thus, if we know a computer’s IP address, we can
communicate with that computer from anywhere in the world. However, unlike MAC address, IP
address can change if a node is removed from one network and connected to another network. The
initial IP Address called version 4 (IPV4 in short), is a 32 bit numeric address, written as four numbers
separated by periods, where each number is the decimal (base-10) representation for an 8-bit binary
(base-2) number and each can take any value from 0 - 255. A sample IPV4 address looks like:
192:168:0:178
With more and more devices getting connected to the Internet, it was realised that the 32-bit IP address
will not be sufficient as it offers just under 4.3 billion unique addresses. Thus, a 128 bits IP address,
called IP version 6 (IPV6 in short) was proposed. An IPv6 address is represented by eight groups of
hexadecimal (base-16) numbers separated by colons. A sample IPV6 address looks like:
2001:CDBA:0000:0000:0000:0000:3257:9652
The Internet is the global network of computing devices including desktop, laptop, servers, tablets,
mobile phones, other handheld devices, printers, scanners, routers, switches, gateways, etc. Moreover,
smart electronic appliances like TV, AC, refrigerator, fan, light, etc. can also communicate through a
network. The list of such smart devices is always increasing e.g., drones, vehicles, door lock, security
camera.
JTO to SDE IT Module Internal Circulation Only Page 77
The Internet is evolving every day and it is difficult to visualise or describe each and every aspect of the
architecture of the Internet. Computers are either connected to a modem through a cable or wirelessly
(WiFi). That modem, be it wired or wireless, is connected to a local Internet Service Provider (ISP) who
then connects to a national network. Many such ISPs connect together forming a regional network and
regional networks connect together forming a national network, and such country-wise networks form
the Internet backbone.
The Internet today is a widespread network, and its influence is no longer limited to the technical fields
of computer communications. It is being used by everyone in the society as is evident from the
increasing use of online tools for education, creativity, entertainment, socialisation, and e-commerce.
HTTP – The HyperText Transfer Protocol is a set of rules which is used to retrieve linked web pages
across the web. The more secure and advanced version is HTTPS.
The Internet is a vast ocean where information is available in the form of millions of websites. Each
website is stored on a server which is connected to the Internet, which means each server has an IP
address. Every device connected to the Internet has an IP address. To access a website, we need to
enter its IP address on our web browser. But it is very difficult to remember the IP addresses of different
websites as they are in terms of numbers or strings. However, it is easier to remember names, and
JTO to SDE IT Module Internal Circulation Only Page 78
therefore, each computer server hosting a website or web resource is given a name against its IP
address. These names are called the Domain names or hostnames corresponding to unique IP addresses
assigned to each server. For easy understanding, it can be considered as the phonebook where instead
of remembering each person’s phone number, we assign names to their numbers. For example, IP
addresses and domain names of some websites are as follows :
DNS Server Instead of remembering IP addresses, we assign a domain name to each IP. But, to access a
web resource, a browser needs to find out the IP address corresponding to the domain name entered.
Conversion of the domain
DNS Server Instead of remembering IP addresses, we assign a domain name to each IP. But, to access a
web resource, a browser needs to find out the IP address corresponding to the domain name entered.
Conversion of the domain name of each web server to its corresponding IP address is called domain
name resolution. It is done through a server called DNS server. Thus, when we enter a URL on a web
browser, the HTTP protocol approaches a computer server called DNS server to obtain the IP address
corresponding to that domain name. After getting the IP address, the HTTP protocol retrieves the
information and loads it in our browser. In Figure an example is shown in which the HTTP requests a
DNS server for corresponding IP address, and the server sends back an IP address.
A DNS server maintains a database of domain names and their corresponding IP addresses. To
understand how the domain name resolution works, we have to understand how and where the DNS
servers are kept. The DNS servers are placed in hierarchical order. At the top level, there are 13 servers
called root servers. Then below the root servers there are other DNS servers at different levels. A DNS
server may contain the IP address corresponding to a domain or it will contain the IP address of other
DNS servers, where this domain entry can be searched.
Internet Protocol (IP): The internet’s primary component and communications backbone.
Because the internet is comprised of hardware and software layers, the IP communication
standard is used to address schemes and identify unique connected devices. Prominent IP
versions used for communications include Internet Protocol version 4 (IPv4) and Internet
Protocol version 6 (IPv6).
Communications: The internet is the most cost-effective communications method in the
world, in which the following services are instantly available:
Email
Web-enabled audio/video conferencing services
Online movies and gaming
Data transfer/file-sharing
Instant messaging
Social networking
Online shopping
Financial services
History of Internet
The first workable prototype of the Internet came in the late 1960s with the creation of
ARPANET, or the Advanced Research Projects Agency Network. Originally funded by the U.S.
Department of Defense, ARPANET used packet switching to allow multiple computers to
communicate on a single network. The technology continued to grow in the 1970s after
scientists Robert Kahn and Vinton Cerf developed Transmission Control Protocol and Internet
Protocol, or TCP/IP, a communications model that set standards for how data could be
HTML
Hypertext Markup Language (HTML) is the standard markup language for documents
designed to be displayed in a web browser. It can be assisted by technologies such
as Cascading Style Sheets (CSS) and scripting languages such as JavaScript. Web
IP address
An Internet Protocol address (IP address) is a numerical label assigned to each device
connected to a computer network that uses the Internet Protocol for communication. [1][2] An
IP address serves two main functions: host or network interface identification and
location addressing. Internet Protocol version 4 (IPv4) defines an IP address as a 32-
bit number.[2] However, because of the growth of the Internet and the depletion of available
IPv4 addresses, a new version of IP (IPv6), using 128 bits for the IP address, was developed in
1995,[3] and standardized in December 1998.[4] In July 2017, a final definition of the protocol
was published. IP addresses are usually written and displayed in human-readable notations,
such as 172.16.254.1 in IPv4, and 2001:db8:0:1234:0:567:8:1 in IPv6.
URL
• Uniform Resource Locator (URL) is a Uniform Resource Identifier (URI) that specifies
where an identified resource is available and the mechanism for retrieving it.
• An example of the use of URLs is the addresses of web pages on the World Wide Web,
such as http://www.example.com/.
• The format is based on Unix file path syntax, where forward slashes are used to
• Conventions already existed where server names could be prepended to complete file
paths, preceded by a double-
• Every URL consists of some of the following:
o The scheme name (commonly called protocol), followed by a colon. The scheme name
defines the namespace, purpose, and the syntax of the remaining part of the URL.
o Domain Name depending upon scheme(alternatively, IP address). The domain name or IP
address gives the destination location for the URL.
o An optional port number; if omitted, the default for the scheme is used
• Relative URLs are dependent on the original URL containing a hierarchical structure
against which the relative link is based.
• the ftp, http, and file URL schemes are examples of some that can be considered
• A URL is a URI that, "in addition to identifying a resource, provides a means of locating
BROWSERS
• A web browser or Internet browser is a software application for retrieving, presenting,
and traversing information resources on t
• Web browsers can also be used to access information provided by Web servers in
private networks or files in file systems. Some browsers can also be used to save
• Primary function of a browser is to identify the URI and brings the information
• This process begins when user inputs the URI in the browser. Prefix of the URI
describes how to interpret the URI. Most URIs have resource retrieved over Hypertext
Transfer Protocol.
• Once this is done, the HTML script is passed to the browser‘s layout engine. To make
the script interactive java script support is needed. With this, browser can interpret text,
images, video and intera
• All major browsers allow users to access multiple information resources at the same
time in different windows or in tabs. Major browsers include pop up blockers to prevent
windows to open without users consent.
INTERNET EXPLORER
• Windows Internet Explorer (formerly Microsoft Internet Explorer, commonly
abbreviated IE or MSIE) is a series of graphical web browsers developed by Microsoft and
included as part of the Microsoft Windows line of operating systems starting in 1995.
• It was first released as part of the add-on package Plus! for Windows 95 that year.
Later versions were available as free downloads, or in service packs. It was part of later
version
• The latest stable release is Internet Explorer 9, which is available as a free update for
JTO to SDE IT Module Internal Circulation Only Page 84
• Internet Explorer uses a componentized architecture built on the Component Object
Model (COM) technology. It consists of several major components, each of which is
contained in a separate Dynamic-link library (DLL) and exposes a set of COM programming
interfaces hosted by the Internet Explorer main executable, ‗iexplore.exe‘
• Internet Explorer uses a zone-based security framework that groups sites based on
certain conditions, including whether it is an Internet- or intranet-based site as well as a user-
editable whitelist. Security restrictions are applied per zone; all the sites in a zone are subject
NETSCAPE NAVIGATOR
• Netscape Navigator is a proprietary web browser that was popular in the 1990s. It was
the most popular web browser till 2002, after which competitor browsers have taken over
the market of netscape.
• Netscape Navigator was based on the Mosaic web browser
• Netscape announced in its first press release (October 13, 1994) that it would make
Navigator available without charge to all non-commercial users, and Beta versions of version
1.0 and 1.1 were indeed freely downloadable in November 1994 and March 1995, with the
• The first few releases of the product were made available in "commercial" and
• During development, the Netscape browser was known by the code name Mozilla.
Mozilla is now a generic name for matters related to the open source successor to Netscape
Communicator.
OPERA
• Opera is a web browser and Internet suite developed by Opera Software. The browser
handles common Internet-related tasks such as displaying web sites, sending and receiving e-
mail messages, managing contacts, chatting on IRC, downloading files via BitTorrent, and
• Opera is offered free of charge for personal computers and mobile phones. This is the
most popular mobile phone browser and is
• Opera has several security features visible to the end user. One is the option to delete
private data, such as HTTP cookies, the browsing history, and the cache, with the click of a
• Opera Mobile is an edition of Opera designed for smartphones and personal digital
MOZILLA FIREFOX
• Mozilla Firefox is a free and open source web browser descended from the Mozilla
Application Suite and managed by Mozilla Corporation. As of February 2011[update], Firefox
is the second most widely used browser with approximately 30% of worldwide usage share of
web browsers.
• To display web pages, Firefox uses the Gecko layout engine, which implements most
current web standards.
• The latest Firefox features[15] include tabbed browsing, spell checking, incremental
find, live bookmarking, a download manager, private browsing, location-aware
browsing (also known as "geolocation") based exclusively on a Google service.
• Firefox runs on various operating systems including Microsoft Windows, Linux, Mac OS
X, FreeBSD, and many other platforms.
CHROME
• Chrome, the web browser by Google, is rapidly becoming popular due to following
JTO to SDE IT Module Internal Circulation Only Page 86
features-
SPEED: Chrome is designed to be fast in every possible way: It's quick in staring up
from the desktop, loading web pages and running complex web applications.
SIMPLICITY: Chrome's browser window is streamlined, clean and simple. Chrome also
includes features that are designed for efficiency and ease of use. For example, you
can search and navigate from the same box, and arrange tabs however you wish.
SECURITY: Chrome is designed to keep you safer and more secure on the web with
built-in malware and phishing protection, autoupdates to make sure the browser is
up-to-date with the latest security updates, and more. Learn more about Chrome's
security features.
• Chrome is the first browser to incorporate machine translation in the browser itself,
without requiring additional plugins or extensions.
SEARCH ENGINE
• A web search engine is designed to search for information on the World Wide Web and
FTP servers. The search results are generally presented in a list of results and are often called
hits. The information may consist of web pages, images, information and other types of files.
Some search engines
•
• The first web robot, the Perl-based World Wide Web Wanderer was built and used by
it to generate an index called 'Wandex'. The purpose of the Wanderer was to measure the
• Around 2000, Google's search engine rose to prominence. The company achieved
better results for many searches with an innovation called PageRank. This iterative algorithm
ranks web pages based on the number and PageRank of other web sites and pages that link
• Web search engines work by storing information about many web pages, which they
retrieve from the html itself. These pages are retrieved by a Web crawler (sometimes also
known as a spider) —
• This information is then analyzed and indexed The contents of each page are then
analyzed to determine how it should be indexed. The purpose of an index is to allow
information to be found as quickly as possible.
The OSI model consists of seven functional layers. Every layer contains a number of defined functions. A
limited enumeration of the different layers is given below:
TRANSPORT LAYER(layer 4)
The transport layer is responsible for a reliable transmission of data. The transport layer ensures a
logical connection between both end systems of the network (a logical point to point connection). This
means that a faultless data transport can be realised whereby the data is received in correct order by
the receiver.
The connected stations in a LAN are autonomous, meaning that primary and secondary stations do not
exist. Every station can set up, maintain and break off a connection with another station. With regard to
public networks, the four bottom layers of the OSI model require a slightly different approach for a LAN.
The 802 committee of the Institute for Electrical and Electronic Engineers has established a number of
standards for LANs.
Figure shows the filling in of layers 1 and 2 in the OSI model by the IEEE802 standard. Standard
IEEE802.1 can be consulted for general concept on LANs. Currently, the following work groups
are active within the IEEE802 committee:
Important cabling detail that is required for most bus technologies: the terminating resistance
(terminator) - a small, cheap device that has to be mounted on all endings of the coax cables
that form an Ethernet. A terminating resistance consists of a resistance that connects the
central core of the cable with the shielding: when an electrical signal reaches the terminating
resistance, this is discarded. For the correct functioning of a network, the terminating
resistance is indispensable as the end of the non-terminated cable reflects electrical signals just
as a mirror reflects light. When a station tries to send a signal over a non-terminated cable,
then this signal will be reflected by the cable end. When the reflection reaches the sending
station, interference will occur.
The variants on the basis of twisted pair have evolved from 10Base-T (10Mbps) to 100Base-T
(100Mbps) to 1000Base-T (1000Mbps).
The MAU, developed for twisted pair, is equipped with 4 data pins: 2 for sending, 2 for
receiving. This is the basis for full duplex Ethernet.
In principle, any point to point communication is possible. Therefore, every host has to be
connected directly with a structure element: a hub or a switch.
Above Table shows the pin configuration for 10/100Base-T. TD stands for Transmitted Data, RD
stands for Received Data. The plus- and the minus signs indicate that the signal is sent mirrored
via two data lines, also see figure
The straight-through cable, also called patch cable, is the cable that we get when we connect
both sides of the cable pair 2 with pin 1 and pin 2, while pair 3 is connected with pin 3 and pin
6. This cable can be used for connections between the patch panel and the hub/switch, the PC
Current Ethernet ports support auto crossing. This means that it can be detected automatically
which cable is used and the crossing will be corrected internally if necessary. The IEEE Fast
Ethernet has defined 100Base-T as extension on the 10Base-T. Fast Ethernet is characterized
by:
• Data transmission at a speed of 100Mbps
• Full Duplex communication
• Wireless Ethernet
In Fast Ethernet, a mechanism is provided for auto negotiation: this makes it possible to built
Ethernet interfaces that switch automatically between 10Mbps and 100Mbps. For the 10Base-T
standard, every data bit is coded in one physical bit. In other words, for a group of eight data
bits, eight signals are generated in the cable. The 10Mbps data rate means a clock rate of
10MHz. For every clock pulse, one single bit is sent.
100Base-T uses the so-called 4B/5B scheme whereby each group of four bits is coded in a 5 bit
signal. So, one single bit is not exactly converted into one single signal in the cable.
The applied clock rate is 125MHz (5/4 x 100). Cat5 cables are certified for a transmission speed
up to 125 MHz.
Gigabit Ethernet
Gigabit Ethernet targets a data rate of 1000Mbps. If the CAT5 Ethernet cables have to be used
for this, for example, then this causes a problem as they only support a clock rate up to
125MHz. In order to realise this, the technology has to be adapted.
First, 1000Base-T codes two bits per clock signal (00, 01, 10 and 11) and uses four voltage levels
for this. Furthermore, 1000Base-T uses all four data pairs of an Ethernet cable. The four data
Wireless LAN
IEEE802.11
The IEEE defines different standards for wireless LAN in their IEEE802.11 description. The radio
connections for a Wireless LAN take place in the 2.4 GHz frequency band, the so-called ISM
band (Industrial, Scientific and Medical) or in the 5 GHz band. No licences are required for this.
A Wireless LAN uses the so-called spread spectrum technology. This technology is specifically
meant for fault-prone transmission channels. This is important as these frequency bands
(especially the 2.4 Ghz) are also used by many other devices, e.g. Bluetooth.
A wireless network is in general much less fast than a fixed wired network. A major advantage
is the flexibility.
WLAN standards
IEEE802.11b/g
IEEE802.11b/g uses the 72 MHz band part of the 2.4 GHz band. 11 channels of 22MHz band are
defined here, in accordance with the FCC rules. Theoretically this would mean that the
bandwidth for these 11 channels is 242 Mbps (11x22 Mbps). In reality, this has to be reviewed
as these channels overlap for a large part. Figure 2.5 shows that there are only three non-
overlapping channels: channel 1, channel 6 and channel 11.
The ETSI defines a slightly wider frequency band for Europe, including 13 channels of 22 MHz
band. This means, in principle, that we can use 4 barely overlapping channels in Europe. These
are channel 1,5,9 and 13.
The IEEE802.11b supports a maximum speed up to 11 Mbps. The IEEE802.11g supports a
maximum speed up to 54 Mbps. The speed is decreased dynamically in case of a bad
connection or great distance to the access point.
IEEE802.11a/h
IEEE802.11a uses the complete 5GHz band. With the application of OFDM (Orthogonal
Frequency Division Multiplexing), the maximum (theoretical) speeds of up to 54Mbps are
reached with IEEE802.11a. Figure 2.6 shows the different channels within the 5GHz band.
Within Europe, this means that 8 non-overlapping channels of 20MHz wide can be used over
the two lowest bands of the 5GHZ UNII band.
IEEE802.11n
This recent standard uses MIMO (multiple input - multiple output), a technique to transmit data
wirelessly by means of several reception- and send antennas whereby a transmission speed of
maximum 600Mbps is obtained if 4 channels of 40MHz each are used.
Bluetooth
The basic technology (two bottom layers of the OSI model) is standardised in the IEEE802.15.1.
Moreover, the Bluetooth SIG (Special Interest Group) defines different application profiles, e.g.
serial communication and transmission of Ethernet data frames.
Bluetooth uses the 2.4 GHz licence-free ISM band. As opposed to WLAN, the data to be sent are
not spread out over a wider frequency band but FHSS (Frequency Hopping Spread Spectrum) is
applied. The 2.4 GHz band is divided over 79 channels of 1 MHz. Figure shows the functioning of
FHSS. 1600 hops per second can be carried out. Each time, every data frame is sent on another
frequency. This means that different logic channels can be active in parallel.
Both segments can have a different medium. A 10Base-T based segment, for example, can be
connected to a fibre glass segment by means of a repeater. Another important feature of a link
on the basis of a repeater is that not only the data bits are transmitted but also any collisions
and signal errors. Network segments that are connected mutually via a repeater are therefore
prone to fault situations; a problem on one segment multiplies over all other segments. In
modern local networks, based on Ethernet, repeaters are mainly used to connect segments of
different media with each other. The backbone segments from fibre Both segments can have a
different medium. A 10Base-T based segment, for example, can be connected to a fibre glass
segment by means of a repeater. Another important feature of a link on the basis of a repeater
is that not only the data bits are transmitted but also any collisions and signal errors. Network
segments that are connected mutually via a repeater are therefore prone to fault situations; a
problem on one segment multiplies over all other segments. In modern local networks, based
on Ethernet, repeaters are mainly used to connect segments of different media with each
other. The backbone segments from fibre A hub is actually a multiport repeater: it regenerates
incoming signals to all other ports as can be seen from figure. All segments that are connected
with each other via a hub are a collision domain.
A hub is actually a multiport repeater: it regenerates incoming signals to all other ports as can
be seen from figure 2.16. All segments that are connected with each other via a hub are a
collision domain.
A hub is available in several different versions. These versions differ in the number of ports, the
media types that are supported and the extensibility.
The switch
One of the options to interlink LAN segments with more intelligence is to use a bridge. A bridge
is more than just a medium that transmits data like a repeater. Before a package is transmitted
from one segment to the other segment via a bridge, a bridge checks the MAC address and on
this basis the transport to the other segment takes place or not.
A bridge can be equipped with more than two network ports. In that case, the term switch is
used. A MAC address table is updated from a software point of view for every port. This table is
filled by listening on the relevant segment of the network and by copying all MAC addresses
that occur on that segment to the table. Every address is retained for a limited time and is
deleted again as soon as a certain time (the hold time) has lapsed. This technique avoids that
inactive stations are addressed or that stations are not recognised anymore.
Definition
Multimedia is the media that uses multiple forms of information content and information
processing (e.g. text, audio, graphics, animation, video, interactivity) to inform or entertain the
user. Multimedia also refers to the use of electronic media to store and experience multimedia
content. Multimedia is similar to traditional mixed media in fine art, but with a broader scope.
The term "rich media" is synonymous for interactive multimedia.
Categories of Multimedia
Multimedia may be broadly divided into linear and non-linear categories. Linear active content
progresses without any navigation control for the viewer such as a cinema presentation. Non-
linear content offers user interactivity to control progress as used with a computer game or
used in self-paced computer based training. Non-linear content is also known as hypermedia
content.
Features of Multimedia
Multimedia presentations may be viewed in person on stage, projected, transmitted, or played
locally with a media player. A broadcast may be a live or recorded multimedia presentation.
Broadcasts and recordings can be either analog or digital electronic media technology. Digital
Multimedia games and simulations may be used in a physical environment with special effects,
with multiple users in an online network, or locally with an offline computer, game system, or
simulator.
Enhanced levels of interactivity are made possible by combining multiple forms of media
content But depending on what multimedia content you have it may vary Online multimedia is
increasingly becoming object-oriented and data-driven, enabling applications with collaborative
end-user innovation and personalization on multiple forms of content over time. Examples of
these range from multiple forms of content on web sites like photo galleries with both images
(pictures) and title (text) user-updated, to simulations whose co-efficient, events, illustrations,
animations or videos are modifiable, allowing the multimedia "experience" to be altered
without reprogramming.
Applications of Multimedia
Multimedia finds its application in various areas including, but not limited to, advertisements,
art, education, entertainment, engineering, medicine, mathematics, business, scientific
research and spatial, temporal applications.
A few application areas of multimedia are listed below:
Creative industries
Creative industries use multimedia for a variety of purposes ranging from fine arts, to
entertainment, to commercial art, to journalism, to media and software services provided for
any of the industries listed below. An individual multimedia designer may cover the spectrum
throughout their career. Request for their skills range from technical, to analytical and to
creative.
Commercial
Much of the electronic old and new media utilized by commercial artists is multimedia. Exciting
presentations are used to grab and keep attention in advertising. Industrial, business to
business, and interoffice communications are often developed by creative services firms for
advanced multimedia presentations beyond simple slide shows to sell ideas or liven-up training.
Commercial multimedia developers may be hired to design for governmental services and
nonprofit services applications as well.
Education
In Education, multimedia is used to produce computer-based training courses (popularly called
CBTs) and reference books like encyclopaedia and almanacs. A CBT lets the user go through a
series of presentations, text about a particular topic, and associated illustrations in various
information formats. Edutainment is an informal term used to describe combining education
with entertainment, especially multimedia entertainment.
Engineering
Software engineers may use multimedia in Computer Simulations for anything from
entertainment to training such as military or industrial training. Multimedia for software
interfaces are often done as collaboration between creative professionals and software
engineers.
Industry
In the Industrial sector, multimedia is used as a way to help present information to
shareholders, superiors and coworkers. Multimedia is also helpful for providing employee
training, advertising and selling products all over the world via virtually unlimited web-based
technologies.
The technology and methods for working with three-dimensional images and for animating
them are discussed. VR is an extension of multimedia-it uses the basic multimedia elements of
imagery, sound, and animation. Because it requires instrumented feedback from a wired-up
person, VR is perhaps interactive multimedia at its fullest extension.
A Multimedia application is developed in stages as all other software are being developed. In
multimedia application development a few stages have to complete before other stages being,
and some stages may be skipped or combined with other stages.
Planning and Costing : This stage of multimedia application is the first stage which begins with
an idea or need. This idea can be further refined by outlining its messages and objectives.
Before starting to develop the multimedia project, it is necessary to plan what writing skills,
graphic art, music, video and other multimedia expertise will be required.
It is also necessary to estimate the time needed to prepare all elements of multimedia and
prepare a
budget accordingly. After preparing a budget, a prototype or proof of concept can be
developed.
Testing : Testing a project ensure the product to be free from bugs. Apart from bug elimination
another aspect of testing is to ensure that the multimedia application meets the objectives of
the project. It is also necessary to test whether the multimedia project works properly on the
intended deliver platforms and they meet the needs of the clients.
Delivering : The final stage of the multimedia application development is to pack the project
and deliver the completed project to the end user. This stage has several steps such as
implementation, maintenance, shipping and marketing the product.
Let us sum up
In this lesson we have discussed the following points
i) Multimedia is a woven combination of text, audio, video, images and animation.
ii) Multimedia systems finds a wide variety of applications in different areas such as
education, entertainment etc.
iii) The categories of multimedia are linear and non-linear.
iv) The stages for multimedia application development are Planning and costing, designing
and producing, testing and delivery.
Text
All multimedia content consists of texts in some form. Even a menu text is accompanied by a
single action such as mouse click, keystroke or finger pressed in the monitor (in case of a touch
screen). The text in the multimedia is used to communicate information to the user. Proper use
of text and words in multimedia presentation will help the content developer to communicate
the idea and message to the user.
Text in Multimedia
Words and symbols in any form, spoken or written, are the most common system of
communication. They deliver the most widely understood meaning to the greatest number of
people.Most academic related text such as journals, e-magazines are available in the Web
Browser readable form.
The size of a text is usually measured in points. One point is approximately 1/72 of an inch
i.e. 0.0138. The size of a font does not exactly describe the height or width of its characters.
This is because the x-height (the height of lower case character x) of two fonts may differ.
Typefaces of fonts can be described in many ways, but the most common characterization of a
typeface is serif and sans serif. The serif is the little decoration at the end of a letter stroke.
F F
(Serif Font) (Sans serif font)
As many number of type faces can be used in a single presentation, this concept of using many
fonts in a single page is called ransom-note topography.
For small type, it is advisable to use the most legible font.
In large size headlines, the kerning (spacing between the letters) can be adjusted In text blocks,
the leading for the most pleasing line can be adjusted.
Drop caps and initial caps can be used to accent the words.
The different effects and colors of a font can be chosen in order to make the text look in a
distinct manner.
Anti-aliased can be used to make a text look gentle and blended.
For special attention to the text the words can be wrapped onto a sphere or bent like a wave.
Meaningful words and phrases can be used for links and menu items. In case of text links
(anchors) on web pages the messages can be accented.
The most important text in a web page such as menu can be put in the top 320 pixels.
Computers and text:
Fonts :
Postscript fonts are a method of describing an image in terms of mathematical constructs
(Bezier curves), so it is used not only to describe the individual characters of a font but also to
describe illustrations and whole pages of text. Since postscript makes use of mathematical
formula, it can be easily scaled bigger or smaller.
Unicode
Unicode makes use of 16-bit architecture for multilingual text and character encoding.
Unicode uses about 65,000 characters from all known languages and alphabets in the world.
Several languages share a set of symbols that have a historically related derivation, the shared
symbols of each language are unified into collections of symbols (Called scripts). A single script
can work for tens or even hundreds of languages. Microsoft, Apple, Sun, Netscape, IBM, Xerox
and Novell are participating in the development of this standard and Microsoft and Apple have
incorporated Unicode into their operating system.
Special font editing tools can be used to make your own type so you can communicate an idea
or graphic feeling exactly. With these tools professional typographers create distinct text and
display faces.
1. Fontographer:
It is macromedia product, it is a specialized graphics editor for both Macintosh and Windows
platforms. You can use it to create postscript, truetype and bitmapped fonts for Macintosh and
Windows.
When a hypermedia project includes large amounts of text or symbolic content, this content
can be indexed and its element then linked together to afford rapid electronic retrieval of the
associated information.
When text is stored in a computer instead of on printed pages the computer’s powerful
processing capabilities can be applied to make the text more accessible and meaningful. This
text can be called as hypertext.
4. Hypermedia Structures:
Sound is perhaps the most important element of multimedia. It is meaningful “speech” in any
language, from a whisper to a scream. It can provide the listening pleasure of music, the
startling accent of special effects or the ambience of a mood- setting background. Sound is the
terminology used in the analog form, and the digitized form of sound is called as audio.
Power of Sound
When something vibrates in the air is moving back and forth it creates wave of pressure. These
waves spread like ripples from pebble tossed into a still pool and when it reaches the eardrums,
the change of pressure or vibration is experienced as sound.
Acoustics is the branch of physics that studies sound. Sound pressure levels are measured in
decibels (db); a decibel measurement is actually the ratio between a chosen reference point on
a logarithmic scale and the level that is actually experienced.
There are still more choices of audio if Microsoft Office is installed. Windows makes use of WAV
files as the default file format for audio and Macintosh systems use SND as default file format
for audio.
Digital Audio
Digital audio is created when a sound wave is converted into numbers – a process referred to as
digitizing. It is possible to digitize sound from a microphone, a synthesizer, existing tape
recordings, live radio and television broadcasts, and popular CDs. You can digitize sounds from
a natural source or prerecorded.
Digitized sound is sampled sound. Ever nth fraction of a second, a sample of sound is taken and
stored as digital information in bits and bytes. The quality of this digital recording depends
upon how often the samples are taken.
The first step is to digitize the analog material and recording it onto a computer readable digital
media. It is necessary to focus on two crucial aspects of preparing digital audio files:
o Balancing the need for sound quality against your available RAM and Hard disk
resources.
o Setting proper recording levels to get a good, clean recording.
Remember that the sampling rate determines the frequency at which samples will be drawn
for the recording. Sampling at higher rates more accurately captures the high frequency
content of your sound. Audio resolution determines the accuracy with which a sound can be
digitized.
1. Multiple Tasks: Able to edit and combine multiple tracks and then merge the tracks and
export them in a final mix to a single audio file.
2. Trimming: Removing dead air or blank space from the front of a recording and an
unnecessary extra time off the end is your first sound editing task.
3. Splicing and Assembly: Using the same tools mentioned for trimming, you will probably
want to remove the extraneous noises that inevitably creep into recording.
4. Volume Adjustments: If you are trying to assemble ten different recordings into a single
track there is a little chance that all the segments have the same volume.
5. Format Conversion: In some cases your digital audio editing software might read a
format different from that read by your presentation or authoring program.
6. Resampling or downsampling: If you have recorded and edited your sounds at 16 bit
sampling rates but are using lower rates you must resample or downsample the file.
7. Equalization: Some programs offer digital equalization capabilities that allow you to
modify a recording frequency content so that it sounds brighter or darker.
8. Digital Signal Processing: Some programs allow you to process the signal with
reverberation, multitap delay, and other special effects using DSP routines.
Creating your own original score can be one of the most creative and rewarding aspects of
building a multimedia project, and MIDI (Musical Instrument Digital Interface) is the quickest,
easiest and most flexible tool for this task.
The process of creating MIDI music is quite different from digitizing existing audio. To make
MIDI scores, however you will need sequencer software and a sound synthesizer.
The MIDI keyboard is also useful to simply the creation of musical scores. An advantage of
structured data such as MIDI is the ease with which the music director can edit the data.
Digital audio will not work due to memory constraints and more processing power
requirements When there is high quality of MIDI source
When there is no requirement for dialogue.
A digital audio file format is preferred in the following circumstances: When there is no control
over the playback hardware. When the computing resources and the bandwidth requirements
are high. When dialogue is required.
A file format determines the application that is to be used for opening a file. Following is the list
of different file formats and the software that can be used for opening a specific file.
The developers of this standard claim that the digital audio sample size and sample rate of red
book audio allow accurate reproduction of all sounds that humans can hear. The red book
standard recommends audio recorded at a sample size of 16 bits and sampling rate of 44.1 KHz.
Soundrecorder from Microsoft Apple’s QuickTime Player pro Sonic Foundry’s Sound Forge for
Windows Soundedit16
Let us sum up
Following points have been discussed in this lesson:
Images
Still images are the important element of a multimedia project or a web site. In order to make a
multimedia presentation look elegant and complete, it is necessary to spend ample amount of
time to design the graphics and the layouts. Competent, computer literate skills in
graphic art and design are vital to the success of a multimedia project.
Digital Image
A digital image is represented by a matrix of numeric values each representing a quantized
intensity value. When I is a two-dimensional matrix, then I(r,c) is the intensity value at the
position corresponding to row r and column c of the matrix.
The points at which an image is sampled are known as picture elements, commonly
abbreviated as pixels. The pixel values of intensity images are called gray scale levels (we
encode here the “color” of the image). The intensity at each pixel is represented by an integer
and is determined from the continuous image by averaging over a small neighborhood around
the pixel location. If there are just two intensity values, for example, black, and white, they are
represented by the numbers 0 and 1; such images are called binary-valued images. If 8-bit
integers are used to store each pixel value, the gray levels range from 0 (black) to 255 (white).
The image format is specified by two main parameters: spatial resolution, which is specified as
pixelsxpixels (eg. 640x480 ) and color encoding, which is specified by bits per pixel. Both
parameter values depend on hardware and software for input/output of images.
Bitmaps
A bitmap is a simple information matrix describing the individual dots that are the smallest
elements of resolution on a computer screen or other display or printing device. A one-
dimensional matrix is required for monochrome (black and white); greater depth (more bits of
information) is required to describe more than 16 million colors the picture elements may have,
as illustrated in following figure. The state of all the pixels on a computer screen make up the
image seen by the viewer, whether in combinations of black and white or colored pixels in a
line of text, a photograph-like picture, or a simple background pattern.
Clip Art
A clip art collection may contain a random assortment of images, or it may contain a series of
graphics, photographs, sound, and video related to a single topic. For example, Corel,
Micrografx, and Fractal Design bundle extensive clip art collection with their image-editing
software.
Multiple Monitors
When developing multimedia, it is helpful to have more than one monitor, or a single high-
resolution monitor with lots of screen real estate, hooked up to your computer. In this way, you
can display the full-screen working area of your project or presentation and still have space to
put your tools and other menus. This is particularly important in an authoring system such
as Macromedia Director, where the edits and changes you make in one window are
immediately visible in the presentation window-provided the presentation window is not
obscured by your editing tools.
Bitmaps are used for photo-realistic images and for complex drawing requiring fine detail.
Vector-drawn objects are used for lines, boxes, circles, polygons, and other graphic shapes that
can be mathematically expressed in angles, coordinates, and distances. A drawn object can
be filled with color and patterns, and you can select it as a single object. Typically, image files
are compressed to save memory and disk space; many image formats already use compression
within the file itself – for example, GIF, JPEG, and PNG. Still images may be the most important
element of your multimedia project. If you are designing multimedia by yourself, put yourself in
the role of graphic artist and layout designer.
Bitmap Software
The abilities and feature of image-editing programs for both the Macintosh and Windows range
from simple to complex. The Macintosh does not ship with a painting tool, and Windows
provides only the rudimentary Paint (see following figure), so you will need to acquire this very
important software separately – often bitmap editing or painting programs come as part of a
bundle when you purchase your computer, monitor, or scanner.
Scanning Images
After scanning through countless clip art collections, if it is not possible to find the unusual
background you want for a screen about gardening. Sometimes when you search for something
too hard, you don’t realize that it’s right in front of your face. Open the scan in an image-editing
program and experiment with different filters, the contrast, and various special effects. Be
creative, and don’t be afraid to try strange combinations – sometimes mistakes yield the most
intriguing results.
Vector Drawing
Most multimedia authoring systems provide for use of vector-drawn objects such as lines,
rectangles, ovals, polygons, and text. Computer-aided design (CAD) programs have traditionally
used vector-drawn object systems for creating the highly complex and geometric rendering
needed by architects and engineers.
Graphic artists designing for print media use vector-drawn objects because the same
mathematics that put a rectangle on your screen can also place that rectangle on paper without
jaggies. This requires the higher resolution of the printer, using a page description language
such as PostScript.
Programs for 3-D animation also use vector-drawn graphics. For example, the various changes
of position, rotation, and shading of light required to spin the extruded.
The letters of the mnemonic ROY G. BIV, learned by many of us to remember the colors of the
rainbow, are the ascending frequencies of the visible light spectrum: red, orange, yellow, green,
blue, indigo, and violet. Ultraviolet light, on the other hand, is beyond the higher end of the
visible spectrum and can be damaging to humans.
The color white is a noisy mixture of all the color frequencies in the visible spectrum. The
cornea of the eye acts as a lens to focus light rays onto the retina. The light rays stimulate many
thousands of specialized nerves called rods and cones that cover the surface of the retina. The
eye can differentiate among millions of colors, or hues, consisting of combination of red, green,
and blue.
Additive Color
In additive color model, a color is created by combining colored light sources in three primary
colors: red, green and blue (RGB). This is the process used for a TV or computer monitor
Subtractive Color
In subtractive color method, a new color is created by combining colored media such as paints
or ink that absorb (or subtract) some parts of the color spectrum of light and reflect the others
back to the eye. Subtractive color is the process used to create color in printing. The printed
page is made up of tiny halftone dots of three primary colors, cyan, magenta and yellow (CMY).
There are many file formats used to store bitmaps and vectored drawing. Following is a list of
few image file formats.
Format Extension
Microsoft Windows DIB .bmp .dib .rle
Microsoft Palette .pal
Autocad format 2D .dxf
Principles of Animation
Animation is the rapid display of a sequence of images of 2-D artwork or model positions in
order to create an illusion of movement. It is an optical illusion of motion due to the
phenomenon of persistence of vision, and can be created and demonstrated in a number of
ways. The most common method of presenting animation is as a motion picture or video
program, although several other forms of presenting animation also exist
Television video builds entire frames or pictures every second; the speed with which each
frame is replaced by the next one makes the images appear to blend smoothly into movement.
Animation Techniques
When you create an animation, organize its execution into a series of logical steps. First, gather
up in your mind all the activities you wish to provide in the animation; if it is complicated, you
may wish to create a written script with a list of activities and required objects. Choose the
animation tool best suited for the job. Then build and tweak your sequences; experiment with
lighting effects. Allow plenty of time for this phase when you are experimenting and testing.
Finally, post-process your animation, doing any special rendering and adding sound effects.
Cel Animation
The term cel derives from the clear celluloid sheets that were used for drawing each frame,
which have been replaced today by acetate or plastic. Cels of famous animated cartoons have
become sought-after, suitable-for-framing collector’s items.
Cel animation artwork begins with keyframes (the first and last frame of an action). For
example, when an animated figure of a man walks across the screen, he balances the weight of
his entire body on one foot and then the other in a series of falls and recoveries, with the
opposite foot and leg catching up to support the body.
The animation techniques made famous by Disney use a series of progressively different
on each frame of movie film which plays at 24 frames per second.
A minute of animation may thus require as many as 1,440 separate frames. The term cel
derives from the clear celluloid sheets that were used for drawing each frame, which is been
replaced today by acetate or plastic. Cel animation artwork begins with keyframes.
Computer Animation
Computer animation programs typically employ the same logic and procedural concepts as cel
animation, using layer, keyframe, and tweening techniques, and even borrowing from the
vocabulary of classic animators. On the computer, paint is most often filled or drawn with
tools using features such as gradients and anti- aliasing. The word links, in computer animation
terminology, usually means special methods for computing RGB pixel values, providing edge
detection, and layering so that images can blend or otherwise mix their colors to produce
special transparencies, inversions, and effects.
Kinematics
It is the study of the movement and motion of structures that have joints, such as a walking
man.
Inverse Kinematics is in high-end 3D programs, it is the process by which you link objects such
as hands to arms and define their relationships and limits. Once those relationships are set you
can drag these parts around and let the computer calculate the result.
Morphing
Morphing is popular effect in which one image transforms into another.Morphing application
and other modeling tools that offer this effect can perform transition not only between still
images but often between moving images as well.
The morphed images were built at a rate of 8 frames per second, with each transition taking a
total of 4 seconds. Some product that uses the morphing features are as follows
o Black Belt’s Easy Morph and WinImages,
o Human Software’s Squizz
o Valis Group’s Flo , MetaFlo, and MovieFlo.
Animation File Formats
Some file formats are designed specifically to contain animations and the can be ported among
application and platforms with the proper translators.
NTSC
The United States, Japan, and many other countries use a system for broadcasting and
displaying video that is based upon the specifications set forth by the 1952
National Television Standards Committee. These standards define a method for
encoding information into the electronic signal that ultimately creates a television picture. As
specified by the NTSC standard, a single frame of video is made up of 525 horizontal scan lines
drawn onto the inside face of a phosphor-coated picture tube every 1/30th of a second by a
fast-moving electron beam.
PAL
The Phase Alternate Line (PAL) system is used in the United Kingdom, Europe, Australia, and
South Africa. PAL is an integrated method of adding color to a black-and-white television signal
that paints 625 lines at a frame rate 25 frames per second.
SECAM
The Sequential Color and Memory (SECAM) system is used in France, Russia, and few other
countries. Although SECAM is a 625-line, 50 Hz system, it differs greatly from both the NTSC and
the PAL color systems in its basic technology and broadcast method.
Video Tips
A useful tool easily implemented in most digital video editing applications is “blue screen,”
“Ultimate,” or “chromo key” editing. Blue screen is a popular technique for making
multimedia titles because expensive sets are not required. Incredible backgrounds can
be generated using 3-D modeling and graphic software, and one or more actors, vehicles, or
other objects can be neatly layered onto that background. Applications such as VideoShop,
Premiere, Final Cut Pro, and iMovie provide this capability.
Component (YUV)
In the early 1980s, Sony began to experiment with a new portable professional video format
based on Betamax. Panasonic has developed their own standard based on a similar technology,
called “MII,” Betacam SP has become the industry standard for professional video field
recording. This format may soon be eclipsed by a new digital version called “Digital Betacam.”
Digital Video
Analog to digital conversion of video can be accomplished using the video overlay hardware
described above, or it can be delivered direct to disk using FireWire cables. To repetitively
digitize a full-screen color video image every 1/30 second and store it to disk or RAM severely
taxes both Macintosh and PC processing capabilities–special hardware, compression firmware,
and massive amounts of digital storage space are required.
Video Compression
To digitize and store a 10-second clip of full-motion video in your computer requires transfer of
an enormous amount of data in a very short amount of time. Reproducing just one frame of
digital video component video at 24 bits requires almost 1MB of computer data; 30 seconds of
video will fill a gigabyte hard disk. Full-size, full-motion video requires that the computer deliver
data at about 30MB per second. This overwhelming technological bottleneck is overcome using
digital video compression schemes or codecs (coders/decoders). A codec is the algorithm used
to compress a video for delivery and then decode it in real-time for fast playback.
Real-time video compression algorithms such as MPEG, P*64, DVI/Indeo, JPEG, Cinepak,
Sorenson, ClearVideo, RealVideo, and VDOwave are available to compress digital video
information. Compression schemes use Discrete Cosine Transform (DCT), an encoding algorithm
that quantifies the human eye’s ability to detect color and image distortion. All of these codecs
employ lossy compression algorithms.
MPEG
The MPEG standard has been developed by the Moving Picture Experts Group, a working
group convened by the International Standards Organization (ISO) and the International
Electro-technical Commission (IEC) to create standards for digital representation of moving
pictures and associated audio and other data. MPEG1 and MPEG2 are the current standards.
Using MPEG1, you can deliver 1.2 Mbps of video and
250 Kbps of two-channel stereo audio using CD-ROM technology. MPEG2, a completely
different system from MPEG1, requires higher data rates (3 to 15 Mbps) but delivers higher
image resolution, picture quality, interlaced video formats, multiresolution scalability, and
multichannel audio features.
DVI/Indeo
DVI is a property, programmable compression/decompression technology based on the Intel
i750 chip set. This hardware consists of two VLSI (Very Large Scale Integrated) chips to separate
the image processing and display functions.
Two levels of compression and decompression are provided by DVI: Production Level Video
(PLV) and Real Time Video (RTV). PLV and RTV both use variable compression rates. DVI’s
algorithms can compress video images at ratios between 80:1 and 160:1. DVI will play back
video in full-frame size and in full color at 30 frames per second.
Limit the amount of synchronization required between the video and audio. With Microsoft’s
AVI files, the audio and video data are already interleaved, so this is not a necessity, but with
QuickTime files, you should “flatten” your movie. Flattening means you interleave the audio
and video segments together.
Let us sum up
In this lesson we have learnt the use of animation and video in multimedia presentation.
Following points have been discussed in this lesson :
Animation is created from drawn pictures and video is created using real time visuals.
Animation is possible because of a biological phenomenon known as persistence of vision
The different techniques used in animation are cel animation, computer animation, kinematics
and morphing.
Four broadcast and video standards and recording formats are commonly in use around the
world: NTSC, PAL, SECAM, and HDTV.
Real-time video compression algorithms such as MPEG, P*64, DVI/Indeo, JPEG,Cinepak,
Sorenson, ClearVideo, RealVideo, and VDOwave are available to compress digital video
information.
Pillars of e-Governance
E-Governance is a holistic initiative with four key pillars: people, technology, process and
resources.
Objectives of e-Governance
G2C i.e. Government to Citizen: This type of interaction includes exchange of information
electronically between the government bodies and the citizens. This type of interface helps
JTO to SDE IT Module Internal Circulation Only Page 134
general public to access government services, information and provide feedback electronically.
The aim is to make government services citizen-friendly. Examples of G2C services include
passport/visa, property registration, birth and death certificate, marriage certificate,
municipality services, death certificate etc.
G2B i.e. Government to Business: This type of interaction includes exchange of information
electronically between the government bodies and business entities, Non-governmental
Organisations (NGOs) and civil societies. This type of interface helps cut down red-tapism and
establishing business environment which is transparent, cost-effective and saves time.
Examples of G2B services include e-Tender Box (ETB) system, e-Procurement Programme etc.
G2E i.e. Government to Employees: This type of interaction includes exchange of information
electronically between the government bodies and employees. This type of interface aims to
make interaction between employees and government fast, efficient and employee-
satisfactory. Examples of G2E services include E-payroll, E-training etc.
Benefits of e-Governance
The benefits of e-Governance are manifold. Some of them are enlisted below:
The origin of e-Governance in India dates back in 1970’s with the initiation of in-house e-
applications in the government areas like elections, census, defence and monitoring of
economic situation of the country (Drishti The Vision Foundation 2019). One of the early steps
towards e-Governance in India was the establishment of the Department of Electronics in the
year 1970(Drishti The Vision Foundation 2019). Following this, the National Informatics Centre
was established in the year 1977(Drishti the Vision Foundation 2019). By 1980 most of the
Indian government offices were equipped with computers (Kumar, Kumar, and Kumar 2014). In
the year 1987, Government of India took the first remarkable step towards e-Governance by
launching the National Satellite-based computer network NICNET(Drishti The Vision Foundation
2019). Following this, District Information System program was launched by the National
Informatics Centre. Railways office automation also began prior to 1990(International
Telecommunication Union (ITU) 2018). By 1990, the extent of NICNET expanded from state
headquarters to district headquarters (Kumar, Kumar, and Kumar 2014). Between 1990-2006,
various state and individual department level e-initiatives were taken (International
Telecommunication Union (ITU) 2018). In 1998, National task Force on IT was constituted(Suri
and Sushil 2017). In the year 2000, Ministry of Information Technology was established under
the GoI(Kumar, Kumar, and Kumar 2014). In Feb 2002, subsequent to the consitution of High
Power committee related to promotion of IT, the Department of Administrative Reforms and
Public Grievances (DARPG) put forward 12 point ‘Minimum Agenda for e-Governance’ to be
implemented by all government departments(Suri and Sushil 2017).
Finally in the year 2006, Government of India (GoI) approved National e-Governance Plan
(NeGP)(Ministry of Electronics & Information Technology, Government of India 2018). The
vision of NeGP is to “make all Government services accessible to the common man in his
locality, through Common Service Delivery Outlets and ensure efficiency, transparency &
reliability of such services at affordable costs to realise the basic needs of the common
man”(Ministry of Electronics & Information Technology, Government of India 2018). National e-
In July 2011, Government of India started using mobile platform for the delivery of public
services (Ministry of Communications, Government of India 2015). National Policy on
Information Technology (IT) was approved by the GoI in the year 2012(Ministry of
Communications, Government of India 2012). In the year 2015, Prime Minister Shri Narendra
Modi launched Digital India Programme (Ministry of Electronics & Information Technology,
Government of India 2020a). “Digital India is a flagship programme of the Government of India
with a vision to transform India into a digitally empowered society and knowledge
economy”(Ministry of Electronics & Information Technology, Government of India 2020a)“e-
Governance: Reforming Government through Technology” is one of the nine pillars of Digital
India Programme(Ministry of Electronics & Information Technology, Government of India
2020a). e-Kranti is another pillar under Digital India initiative with a vision of “Transforming e-
Governance for Transforming Governance”(Ministry of Electronics & Information Technology,
Government of India 2020a). Annexure 2 outlines the 9 pillars of the Digital India Porgramme.
Following Table shown some of the e-Governance initiatives taken under Digital India
programme. Annexure 3 outlines some of the policies related to e-Governance in India.
Table:
Initiative Description
Office Automation
Video Conference facility MoHFW,GoI has started video conferencing facility in the offices(Ministry
Digital Payments Under Digital India Programme, digitization of payments has been
Online Services
National Health Portal Web based portal that acts as a single point of access to authentic health
e-Hospital Hospital Management System for delivery of services like patient care,
Online registration Aadhaar based online registeration system for booking an OPD
Central Government Web application implemented in all the wellness centres across the
Health Services (CGHS) nation since 2007 for the delivery of Central Government Health Services
2015c)
Food Safety and GoI website for providing services like issuance of licence, product
Standards Authority of approval etc. to food business operators(Ministry of Health and Family
National Organ & Tissue GoI web portal for registration and retrieval for organ/ tissue
India 2019b)
Central Drugs Standards Single window access to various stakeholders like Pharmaceutical
Control Organisation, Industry, Citizens, Regulators etc. for applications and approvals of drugs,
2019b)
Mera Aspataal GoI initiative to capture patient feedback for the services received at the
2020b)
‘Hum Do’ Website GoI website providing information related to family planning and
PMSMA portal Web and android based system with help desk to facilitate Pradhan
Online Medical Online Counselling service by GoI for admission into Under Graduate and
Counseling & Admission Post Graduate Medical colleges(Ministry of Health and Family Welfare,
Ayushman Bharat- GoI portal providing information and services related to Pradhan Mantri
Pradhan Mantri Jan Jan Arogya Yojna(National Health Authority, Government of India 2018)
Swasth Bharat (Disease, Android based mobile application that provide reliable information
Lifestyle, First Aid) related to disease conditions, symtptoms, available treatment options,
public health alerts, healthy lifestyle, first aid etc. (Ministry of Health and
NHP Indradhanush : GoI android based mobile application to help parents register and track
National Health Portal Mobile application providing information related to hospitals and blood
Directory Services banks across India(Ministry of Health and Family Welfare, Government of
Challenges to e-Governance
_______________________________________End____________________________________