IT Notes2003

download IT Notes2003

of 28

Transcript of IT Notes2003

  • 8/12/2019 IT Notes2003

    1/28

    MODULE -1

    Generations Of Computer

    The first generation of computers(1950-1959) used vacuum tubesas their logic elements and ring-

    shaped ferrite cores as memories. During this period computers were bulky unreliable and e!pensi"e.

    #hese computers include $%&' $D' *%&' & *%&' && &+, 0 and /50. #he introduction ofsemiconductor digital. elements marked the beginning of the second computer generation in 1959.

    The second generationwas marked by reduced sie and cost with increased speed and reliability.

    Magnetic tapebecame the principal e!ternal storage medium. &+, produced the 09# system in 1959

    and later produced 092 which dominated the scientific computer market during the period of 19/0-19/2.

    3ome of the popular second-generation computers were &+, 000 1200 series *%&' &&& 4' 01

    and 501 6oneywell 200 and 700 and %4 15. #he second-generation computers (1959-19/9) were

    succeeded by thethird computer generation (19/9-19) which used integrated circuits. #he era of

    microelectronics started with the in"ention of the integrated circuit(&) in 1957. 8ith the introduction of

    integrated circuits it was possible to ha"e hundreds of circuit elements on a tiny silicon chip. &mportant

    members of the third generation include the &+, /0 and 0 *%&' 1107 4' 01 $ /25

    6oneywell 00 series and the D$ :D:-7.The fourth-generation computersbecame a"ailable in the1970s when "ery large-scale integration !L"#$%in which thousands of transistors and other circuit

    elements are placed on a single chip became increasingly common. #he ;3& technology greatly

    increased the circuit density.

    8hile the first- second- third-generation computers used ferrite core as memory units the fourth-

    generation computers used semiconductor de"ices fabricated by ;3& technology as ultrahigh-access

    memory units. #he drop in cost associated with the sie-reduction trend led to the introduction of

    personal computers for use in office schools and homes. 3e"eral companies such as &+, 'pple

    omputer and 4adio 3hack began to produce and market personal computers with enormous success.

    #he race is now on building the ne!t or

  • 8/12/2019 IT Notes2003

    2/28

    Econom' improvement('utomation may impro"e in economy of enterprises society or most of

    humanity. Aor e!ample when an enterprise in"ests in automation technology reco"ers its in"estmentB or

    when a state or country increases its income due to automation like ermany or Capan in the 0th

    entury

    #he main disad"antages of automation are@

    *nemployment rate increases due to machines replacing humans and putting those humans

    out of their ?obs.

    #echnical ;imitation@ urrent technology is unable to automate all the desired tasks.

    3ecurity #hreatsEulnerability@ 'n automated system may ha"e limited le"el of intelligenceB

    hence it is most likely susceptible to commit error.

    *npredictable de"elopment costs@ #heresearch and de"elopmentcost of automating a

    process may e!ceed the cost sa"ed by the automation itself.

    6igh initial cost@ #he automation of a newproductorplantre>uires a huge initial in"estment

    in comparison with the unit cost of the product although the cost of automation is spread in

    many product batches.

    Computer Controlled )iometric*+,#D based &ccess Control

    +iometrics @-&t is the study of identifying indi"iduals based on measurable biological

    characteristics.

    +iometric readers are used to input biometric data about a person into a computer system so that

    the indi"iduals can be identified based on a particular uni>ue physiological characteristic(such as

    a fingerprint hand geometry face or iris of the eye) or personal trait(such as a "oice or

    signature)

    ' biometric reader can be stand-alone or built into another piece of hardware such as keyboard

    or mouse.

    3ome handheld computers notebook :s and storage de"ices today ha"e built-in fingerprint

    readers to allow only authoried users access to the : or data stored on the de"ice.

    +iometric input de"ices are increasingly being used to restrict access to facilities or computer

    systems authorie electronic payments log on to secure web sites punch in and out of work

    and more

    +adio ,reuenc' #dentification +,#D$

    ,obile de"ices@-cellular phones and other communications de"ices with computer or internetcapabilities.

    :ersonal computers@-con"entional desktop notebook(;aptops) tablet and handheld computers.

    ,idrange ser"ers-computers that host data and programs a"ailable to a small group of users.

    ,ainframe computers@-powerful computers used to host large amount of data and programs

    a"ailable to a wide group of users.

    http://en.wikipedia.org/wiki/Research_and_developmenthttp://en.wikipedia.org/wiki/Research_and_developmenthttp://en.wikipedia.org/wiki/Product_(business)http://en.wikipedia.org/wiki/Product_(business)http://en.wikipedia.org/wiki/Planthttp://en.wikipedia.org/wiki/Planthttp://en.wikipedia.org/wiki/Planthttp://en.wikipedia.org/wiki/Research_and_developmenthttp://en.wikipedia.org/wiki/Product_(business)http://en.wikipedia.org/wiki/Plant
  • 8/12/2019 IT Notes2003

    3/28

    3upercomputers@-$!tremely powerful computers used for comple! computations and processing.

    'n &nternet :rotocol (&:) address is a number that identifies a de"ice on a computer network and is used

    to mo"e information on the &nternet. 'n e!ample of an &: address is 19.129.5./. $"ery de"ice

    directly connected to the &nternet must ha"e a uni>ue &: address. ' domain name is a label that people

    use to find points on the &nternet without ha"ing to remember a string of numbers. 'n e!ample of a

    domain name is www.arin.net. #yping either F19.129.5./G or Fwww.arin.netG into a web browser willconnect to the '4&%website. omputers only understand &: addresses whereas people generally find it

    easier to remember words or terms. #he Domain %ame system (D%3) translates these easily

    remembered names into their uni>ue &: addresses for the computer to find.

    name use

    .com ommercial business

    .edu $ducational institutions

    .go" o"ernment organiations

    .int &nternational organiations

    .org %on commercial organiations

    .net %et work pro"iders and &3:

    .mil ,ilitary organiations

    ' computes is a data processing machine

    speed H accuracy

    no intelligence

    functions without direct human

    inter"ention (use of stored program)

    do not get tired

    is consistent and ne"er forgets

    high storage capability

    6ardware@ keyboard monitor

    3oftware@ ,3 e!cel

  • 8/12/2019 IT Notes2003

    4/28

    T.o main t'pes of soft.are(

    &pplication soft.are- software used to sol"e specific problems or perform specific tasks

    "'stem soft.are

    Operating s'stem soft.are- supports the application software and manages how the hardwarede"ices work together

    Utilit' soft.are- pro"ides additional functionality to the operating system

    Computer categories(

    /ersonal digital assistant /D&$- a small hand-held computer that performs simple tasksI.

    0oteboo computer- a fully functional computer designed to be carried around and run on battery

    power.

    Tablet computer- a pen-based computer that pro"ides the screen capabilities of a :D' with the

    functional capabilities of a notebook or a desktop computer.

    Destop computer- the most popular choice for personal computing need

    Minicomputer- designed to meet the computing needs of se"eral people simultaneously in a small to

    medium-sie business en"ironment.

    Mainframe computer- designed to meet the computing needs of hundreds of people in a large business

    en"ironmentI.

    "upercomputers -the fastest most powerful and most e!pensi"e type of computerI.

    MEMO+2

    omputer ,emory ell 6&6 J 1 ;=8 - 0

    )inar' digit(bit) - the smallest unit of information that a computer can process

    &"C##(&merican "tandard Code for #nformation #nterchange) - the coding system that most

    personal computers use to represent process and store information

    )'te - a group of eight bits

    COM/UTE+ basics

    Kilobytes (K+) H ,egabytes (,+) igabytes (+) #erabytes (#+)

  • 8/12/2019 IT Notes2003

    5/28

    Components of a computer(

    13 T4E CE0T+&L /+OCE""#0G U0#T C/U$@

    &nterprets and carries out the basic instructions that operate the computer ontains the control unit and

    the arithmetic and logic unit.

    &3 Control Unit@

    Directs and co-ordinates most of the operations in the computer. &nterprets each instruction and then

    initiates the action.

    ,achine ycle

    $ach instruction is completed before the ne!t one begins

    M#/" M#LL#O0 #0"T+UCT#O0" /E+ "ECO0D$&3 '%=#6$4 ,$'3*4$,$%# =A :* 3:$$D.

    #ypes of processors@

    :entium 2 !eon athlon celero itanium duron

    )U" data path$

    #he circuitry used to transmit data and instructions from one place to another within the :*.

    '# L 7 bits

    7/3 L 1/ bits

    7/D27/ L bits

  • 8/12/2019 IT Notes2003

    6/28

    :entium L /2 bits

    &LU(

    +egisters( 6igh speed temporary storage locations for data and instructions

    MEMO+2(

    ('lias @ ,ain memory &nternal memory :rimary memory) consist of one or more chips on the

    motherboard.

    +&M +andom &ccess memor'$( 8hen users discuss memory in a computer they are usually referring

    to 4',

    +OM(ontains +&=3 and start-up programs. #he +&=3 are instructions to perform many elementary

    functions such as

    sendErecei"e characters on a communication line

    ,o"e cursor

    /O+T"( 3erial ports :arallel ports firewire ports *3+ ports

    MODULE-5

    omputer %etworks =riginally networks were used to connect only mainframe computers. +ut with the

    proliferation of ine!pensi"e computer systems and ad"ances in software the need to network personal

    computers and other computer peripherals became apparent. omputer networking has been de"eloped

    at three le"els@ local area net.or L&0$that interconnect computers located within a relati"e small area

    such as a college campusB metropolitan area network (,'%) representing ;'% technologies optimied for

    a metropolitan area such as a cityB .ide area net.or 6&0$pro"iding communication ser"ices o"er

    se"eral kilometers across the nation or around the globe. #he idea of computer networking started in the

    19/0s when time-sharing ser"ices were first a"ailable to the public. $arly pioneers were eneral $lectric

    ($) $4= '# H# &+, go"ernment agencies research ;aboratories and uni"ersities. '4:'%$#

    was built in 19/9 by the 'd"anced 4esearch :ro?ects ('4:') an arm of the *.3. Department of

    Defense. &t was a public network connecting se"eral ma?or uni"ersities and research institutions. #he

    '4:'%$# e"entually grew into a *.3. backbone network leading to the current &nternet. #he success of

    the '4:'%$# led its primary contractors (+olt +eranek and %ewman) to form a commercial network

    company #$;$%$# in 19.

    The metropolitan area net.ors M&0s) are an outgrowth of ;'%s. #he ,'% effort started in 197.

    #he ob?ecti"es were to pro"ide for interconnection of ;'%s bulk data transfer digitied "oice and "ideo.

    #he fiber distributed data interface (ADD&) proposed by the 'merican %ational 3tandard &nstitute ('%3&) is

    the most popular ,'%. &t is a token ring network with fiber optic as its transmission medium. &n the late190s the concept of &3D% was born. #he &3D% is regarded as an all-purpose digital network in that it

    will pro"ide an integrated access that will support a wide "ariety of applications in a fle!ible and cost-

    effecti"e manner. #he implementation of &3D% has been slow in actual practice. #he &3D% concept has

    been tried in many nations. #he real e!citement of &3D% comes about when one considers the

    capabilities of broadband &3D% (+&3D%).

    &pplications of net.ors(

  • 8/12/2019 IT Notes2003

    7/28

    +esource "haring

    1. 6ardware (computing resources disks printers)

    . 3oftware (application software)

    #nformation "haring

    1. $asy accessibility from anywhere (files databases)

    . 3earch apability (888)

    Communication

    1. $mail

    . ,essage broadcast

    +emote computing

    Distributed processing G+#D Computing$

    0ET6O+7 TO/OLOG2

    #he network topology defines the way in which computers printers and other de"ices are connected. '

    network topology describes the layout of the wire and de"ices as well as the paths used by data

    transmissions.

    )us topolog'(ommonly referred to as a linear bus all the de"ices on a bus topology are connected by

    one single cable.

    Linear bus(#he type of network topology in which all of the nodes of the network are connected to a

    common transmission medium which has e!actly two endpoints (this is the MbusM which is also commonlyreferred to as the backbone or trunk) J all data that is transmitted between nodes in the network is

    transmitted o"er this common transmission medium and is able to be recei"ed by all nodes in the network

    simultaneously.

    %ote@ #he two endpoints of the common transmission medium are normally terminated with a de"ice

    called a terminator that e!hibits the characteristic impedance of the transmission medium and which

    dissipates or absorbs the energy that remains in the signal to pre"ent the signal from being reflected or

  • 8/12/2019 IT Notes2003

    8/28

    propagated back onto the transmission medium in the opposite direction which would cause interference

    with and degradation of the signals on the transmission medium.

    Distributed bus( #he type of network topology in which all of the nodes of the network are connected to

    a common transmission medium which has more than two endpoints that are created by adding branches

    to the main section of the transmission medium J the physical distributed bus topology functions in

    e!actly the same fashion as the physical linear bus topology (i.e. all nodes share a common transmissionmedium).

    "tar and Tree topolog'( #he star topology is the most commonly used architecture in $thernet ;'%s.

    8hen installed the star topology resembles spokes in a bicycle wheel. ;arger networks use the e!tended

    star topology also called tree topology. 8hen used with network de"ices that filter frames or packets like

    bridges switches and routers this topology significantly reduces the traffic on the wires by sending

    packets only to the wires of the destination host. #he network does not necessarily ha"e to resemble a

    star to be classified as a star network but all of the nodes on the network must be connected to one

    central de"ice. 'll traffic that tra"erses the network passes through the central hub. #he hub acts as a

    signal repeater. #he star topology is considered the easiest topology to design and implement. 'n

    ad"antage of the star topology is the simplicity of adding additional nodes. #he primary disad"antage of

    the star topology is that the hub represents a single point of failure.

    #ree

    +ing topolog'(' frame tra"els around the ring stopping at each node. &f a node wants to transmit data

    it adds the data as well as the destination address to the frame.

    #he frame then continues around the ring until it finds the destination node which takes the data out of

    the frame.

    3ingle ring J 'll the de"ices on the network share a single cable.

    Dual ring J #he dual ring topology allows data to be sent in both directions.

    Mesh Topolog'(

  • 8/12/2019 IT Notes2003

    9/28

    #he mesh topology connects all de"ices (nodes) to each other for redundancy and fault tolerance. &t is

    used in 8'%s to interconnect ;'%s and for mission critical networks like those used by banks and

    financial institutions. &mplementing the mesh topology is e!pensi"e and difficult.

    0et.or Components(

    :hysical ,edia &nterconnecting De"ices omputers %etworking 3oftware 'pplications

    0et.oring media( %etworking media can be defined simply as the means by which signals (data) are

    sent from one computer to another (either by cable or wireless means).

    0et.oring Devices(6*+ 3witches 4outers 8ireless 'ccess :oints and ,odems etc.

    Computer clients and servers( &n a clientEser"er network arrangement network ser"ices are located in

    a dedicated computer whose only function is to respond to the re>uests of clients. #he ser"er contains the

    file print application security and other ser"ices in a central computer that is continuously a"ailable to

    respond to client re>uests.

    'pplications@ $-mail 3earchable Data (8eb 3ites) $-ommerce %ews roups &nternet

    #elephony(o&:) ideo onferencing hat roups &nstant ,essengers &nternet 4adio.

    E8T+&0ET

    'n e!tranet is a computer network that allows controlled access from the outside for specific business or

    educational purposes. 'n e!tranet can be "iewed as an e!tension of a companyMs intranet that is

    e!tended to users outside the company usually partners "endors and suppliers

    &dvantages

    $!change large "olumes of data using $lectronic Data &nterchange($D&)

    3hare product catalogs e!clusi"ely with trade partners

    ollaborate with other companies on ?oint de"elopment efforts

    Cointly de"elop and use training programs with other companies

    http://en.wikipedia.org/wiki/Electronic_Data_Interchangehttp://en.wikipedia.org/wiki/Electronic_Data_Interchange
  • 8/12/2019 IT Notes2003

    10/28

    :ro"ide or access ser"ices pro"ided by one company to a group of other companies such as

    an online banking application managed by one company on behalf of affiliated banks

    Disadvantages

    $!tranets can be e!pensi"e to implement and maintain within an organiation (e.g.

    hardware software employee training costs) if hosted internally rather than by an applicationser"ice pro"ider.

    3ecurity of e!tranets can be a concern when hosting "aluable or proprietary information

    #0T+&0ET

    'n intranet is a computer network that uses &nternet :rotocol technology to securely share any part of an

    organiationMs information or network operating system within that organiation. #he term is used in

    contrast to internet a network between organiations and instead refers to a network within an

    organiation.

    6orforce productivit'@ &ntranets can help users to locate and "iew information faster and useapplications rele"ant to their roles and responsibilities. 8ith the help of a web browserinterfaceusers can access data held in any database the organiation wants to make a"ailable anytimeand N sub?ect to security pro"isions N from anywhere within the company workstations increasingemployeesM ability to perform their ?obs faster more accurately and with confidence that they ha"ethe right information. &t also helps to impro"e the ser"ices pro"ided to the users.

    Time@ &ntranets allow organiations to distribute information to employees on an as-needed basisB$mployees may link to rele"ant information at their con"enience rather than being distractedindiscriminately by electronic mail.

    Communication@ &ntranets can ser"e as powerful tools for communication within an organiation"ertically and horiontally. Arom a communications standpoint intranets are useful to communicatestrategic initiati"es that ha"e a global reach throughout the organiation. #he type of information that

    can easily be con"eyed is the purpose of the initiati"e and what the initiati"e is aiming to achie"ewho is dri"ing the initiati"e results achie"ed to date and who to speak to for more information. +ypro"iding this information on the intranet staff ha"e the opportunity to keep up-to-date with thestrategic focus of the organiation. 3ome e!amples of communication would be chat email and orblogs. ' great real world e!ample of where an intranet helped a company communicate is when%estle had a number of food processing plants in 3candina"ia. #heir central support system had todeal with a number of >ueries e"ery day.OP8hen %estle decided to in"est in an intranet they >uicklyrealied the sa"ings. ,co"ern says the sa"ings from the reduction in >uery calls was substantiallygreater than the in"estment in the intranet.

    6eb publishingallows cumbersome corporate knowledge to be maintained and easily accessedthroughout the company usinghypermediaand 8eb technologies. $!amples include@ employeemanuals benefits documents company policies business standards news feeds and e"en training

    can be accessed using common &nternet standards ('crobat files Alash files & applications).+ecause each business unit can update the online copy of a document the most recent "ersion isusually a"ailable to employees using the intranet.

    )usiness operations and management@ &ntranets are also being used as a platform forde"eloping and deploying applications to support business operations and decisions across theinternetworked enterprise.

    Cost-effective@ *sers can "iew information and data "ia web-browser rather than maintainingphysical documents such as procedure manuals internal phone list and re>uisition forms. #his can

    http://en.wikipedia.org/wiki/Application_service_providerhttp://en.wikipedia.org/wiki/Application_service_providerhttp://en.wikipedia.org/wiki/Web_browserhttp://en.wikipedia.org/wiki/Intranet#cite_note-McGovern-2http://en.wikipedia.org/wiki/Hypermediahttp://en.wikipedia.org/wiki/Hypermediahttp://en.wikipedia.org/wiki/Application_service_providerhttp://en.wikipedia.org/wiki/Application_service_providerhttp://en.wikipedia.org/wiki/Web_browserhttp://en.wikipedia.org/wiki/Intranet#cite_note-McGovern-2http://en.wikipedia.org/wiki/Hypermedia
  • 8/12/2019 IT Notes2003

    11/28

    potentially sa"e the business money on printing duplicating documents and the en"ironment as wellas document maintenance o"erhead. Aor e!ample :eople soft

  • 8/12/2019 IT Notes2003

    12/28

  • 8/12/2019 IT Notes2003

    13/28

    runs in a distributed system is called a distributed program and distributed programming is theprocess of writing such programs. Distributed computing also refers to the use of distributed systemsto sol"e computational problems. &n distributed computing a problem is di"ided into many taskseach of which is sol"ed by one or more computers.

    :arallel and distributed computing Distributed systems are groups of networked computers which

    ha"e the same goal for their work. #he terms

  • 8/12/2019 IT Notes2003

    14/28

  • 8/12/2019 IT Notes2003

    15/28

    :eer-to-peer N Distributed architecture without the need for central coordination withparticipants being at the same time both suppliers and consumers of resources (in contrast to thetraditional clientJser"er model).

    Grid computingis a term referring to the combination of computer resources from multiple administrati"edomains to reach a common goal. #he grid can be thought of as a distributed system with non-interacti"eworkloads that in"ol"e a large number of files. 8hat distinguishes grid computing from con"entional high

    performance computing systems such as cluster computing is that grids tend to be more loosely coupledheterogeneous and geographically dispersed. 'lthough a grid can be dedicated to a specialiedapplication it is more common that a single grid will be used for a "ariety of different purposes. rids areoften constructed with the aid of general-purpose grid software libraries known as middleware.

    rid sie can "ary by a considerable amount. rids are a form of distributed computing whereby a Fsuper"irtual computerG is composed of many networked loosely coupled computers acting together to perform"ery large tasks. Aurthermore FdistributedG or FgridG computing in general is a special type of parallelcomputing that relies on complete computers (with onboard :*s storage power supplies networkinterfaces etc.) connected to a network (pri"ate public or the &nternet) by a con"entional networkinterface such as $thernet. #his is in contrast to the traditional notion of a supercomputer which hasmany processors connected by a local high-speed computer bus.

    G"M( Global "'stem for Mobile communication( 3, (lobal 3ystem for ,obile communication) is adigital mobile telephony system that is widely used in $urope and other parts of the world. 3, uses a"ariation of time di"ision multiple access (#D,') and is the most widely used of the three digital wirelesstelephony technologies (#D,' 3, and D,'). 3, digities and compresses data then sends itdown a channel with two other streams of user data each in its own time slot. &t operates at either the 900,6 or 1700 ,6 fre>uency band. 3ince many 3, network operators ha"e roaming agreements withforeign operators users can often continue to use their mobile phones when they tra"el to othercountries. 3&, cards (3ubscriber &dentity ,odule) holding home network access configurations may beswitched to those will metered local access significantly reducing roaming costs while

    http://en.wikipedia.org/wiki/Peer-to-peerhttp://upload.wikimedia.org/wikipedia/commons/b/b5/Cloud_computing.svghttp://en.wikipedia.org/wiki/Peer-to-peer
  • 8/12/2019 IT Notes2003

    16/28

    e!periencing no reductions in ser"ice. 3, together with other technologies is part of the e"olution ofwireless mobile telecommunications that includes 6igh-3peed ircuit-3witched Data (63D) eneral:acket 4adio 3ystem (:43) $nhanced Data 3, $n"ironment ($D$) and *ni"ersal ,obile#elecommunications 3er"ice (*,#3).CDM& ( Code Division Multiple &ccessD,' (ode-Di"ision ,ultiple 'ccess) refers to any of se"eral protocols used in so-calledsecond-generation () and third-generation () wireless communications. 's the term implies D,'is a form of multiple!ing which allows numerous signals to occupy a single transmission channeloptimiing the use of a"ailable bandwidth. 'udio input is first digitied into binary elements. #he fre>uencyof the transmitted signal is then made to "ary according to a defined pattern (code) so it can beintercepted only by a recei"er whose fre>uency response is programmed with the same code so itfollows e!actly along with the transmitter fre>uency. #here are trillions of possible fre>uency-se>uencingcodes which enhances pri"acy and makes cloning difficult.G/+" ( General /acet +adio "erviceeneral :acket 4adio 3er"ices (:43) is a packet-based wireless communication ser"ice thatpromises data rates from 5/ up to 112 Kbps and continuous connection to the &nternet formobile phone and computer users. #he higher data rates allow users to take part in "ideo conferencesand interact with multimedia 8eb sites and similar applications using mobile handheld de"ices as well asnotebook computers. :43 is based on lobal 3ystem for ,obile (3,) communication andcomplements e!isting ser"ices such circuit-switched cellular phone connections and the 3hort ,essage

    3er"ice (3,3). :43 also complements +luetooth a standard for replacing wired connections betweende"ices with wireless radio connections.

    or rd generation mobile telecommunications is a generation of standards for mobile phones andmobile telecommunication ser"ices fulfilling the &nternational ,obile #elecommunications-000 (&,#-000) specifications by the &nternational #elecommunication *nion.O1P 'pplication ser"ices include wide-area wireless "oice telephone mobile &nternet access "ideo calls and mobile # all in a mobileen"ironment.

    5G

    3e"eral telecommunications companies market wireless mobile &nternet ser"ices as indicating that

    the ad"ertised ser"ice is pro"ided o"er a wireless network. 3er"ices ad"ertised as are re>uired tomeet &,#-000 technical standards including standards for reliability and speed (data transfer rates). #omeet the &,#-000 standards a system is re>uired to pro"ide peak data rates of at least 00 kbitEs (about0. ,bitEs). 6owe"er many ser"ices ad"ertised as pro"ide higher speed than the minimum technicalre>uirements for a ser"ice. 4ecent releases often denoted .5 and .5 also pro"ide mobilebroadband access of se"eral ,bitEs to smartphones and mobile modems in laptop computers.

    #he following standards are typically branded @ #he *,#3 system first offered in 001 standardiedby :: used primarily in $urope Capan hina (howe"er with a different radio interface) and otherregions predominated by 3, system infrastructure. #he cell phones are typically *,#3 and 3,hybrids. 3e"eral radio interfaces are offered sharing the same infrastructure@

    #he original and most widespread radio interface is called 8-D,'.

    #he #D-3D,' radio interface was commercialised in 009 and is only offered in hina.

    #he latest *,#3 release 63:'T can pro"ide peak data rates up to 5/ ,bitEs in the downlink in theory(7 ,bitEs in e!isting ser"ices) and ,bitEs in the uplink.

    the D,'000 system first offered in 00 standardied by :: used especially in %orth 'mericaand 3outh Korea sharing infrastructure with the &3-95 standard. #he cell phones are typically

  • 8/12/2019 IT Notes2003

    17/28

    D,'000 and &3-95 hybrids. #he latest release $D= 4e" + offers peak rates of 12. ,bitEsdownstream.

    #he abo"e systems and radio interfaces are based on kindred spread spectrum radio transmissiontechnology. 8hile the 3, $D$ standard (uirements called &,#-'d"anced. Airst release ;#$ isnot backwards compatible with but is a pre-2 or .9 technology howe"er sometimes brandeduirements for 2 standards setting peak speedre>uirements for 2 ser"ice at 100 ,bitEs for high mobility communication (such as from trains and cars)and 1 bitEs for low mobility communication (such as pedestrians and stationary users).' 2 system ise!pected to pro"ide a comprehensi"e and secure all-&: based mobile broadband solution to laptopcomputer wireless modems smartphones and other mobile de"ices. Aacilities such as ultra-broadband&nternet access &: telephony gaming ser"ices and streamed multimedia may be pro"ided to users.

    &,#-'d"anced compliant "ersions of ;#$ and 8i,' are under de"elopment and called

  • 8/12/2019 IT Notes2003

    18/28

    telecommunications networks with high-speed access channels into end-user premises "ia set-top bo!esor other customer-premises e>uipment.

    !O#/

    !oice over #nternet /rotocol(voice over #/ !o#/) is a family of technologies methodologies

    communication protocols and transmission techni>ues for the deli"ery of "oice communicationsandmultimediasessions o"er &nternet :rotocol(&:) networks such as the&nternet.=ther terms fre>uentlyencountered and often used synonymously with o&: are &: telephony &nternet telephony "oice o"erbroadband (o++) broadband telephony and broadband phone.

    &nternet telephony refers to communications ser"icesNoice fa!3,3 andEor "oice-messagingapplicationsNthat are transported "ia the &nternet rather than the public switched telephone network(:3#%). #he steps in"ol"ed in originating a o&: telephone call are signaling and media channel setupdigitiation of the analog "oice signal encoding packetiation and transmission as &nternet :rotocol(&:)packets o"er a packet-switched network. =n the recei"ing side similar steps (usually in the re"erse order)such as reception of the &: packets decoding of the packets and digital-to-analog con"ersion reproducethe original "oice stream. $"en though &: #elephony and o&: are terms that are used interchangeablythey are actually differentB &: telephony has to do with digital telephony systems that use &: protocols for

    "oice communication while o&: is actually a subset of &: #elephony. o&: is a technology used by &:telephony as a means of transporting phone calls.

    o&: systems employ session control protocols to control the set-up and tear-down of calls as well asaudio codecswhich encode speech allowing transmission o"er an &: network as digital audio"ia anaudiostream. #he choice of codec "aries between different implementations of o&: depending on applicationre>uirements and network bandwidthB some implementations rely on narrowbandand compressedspeechwhile others support high fidelitystereocodecs.

    o&: is a"ailable on many smart phones and &nternet de"ices so that users of portable de"ices that arenot phones may place calls or send 3,3 te!t messages o"er or 8i-Ai

    MODULE -uently takes the form of multimedia catalogsof product information. enerating and managing catalog content is a ma?or subset of contentmanagement.

    ontent and catalog management may be e!panded to include product configuration processesthat support 8eb- based customer selfNser"ice and the mass customiation of a companySs

    products. onfiguration software helpsonline customers select the optimum feasible set ofproduct features that can be included in a finished product.

    6orflo. Management( e-business workflow systems help employees electronicallycollaborate to accomplish structured work tasks withinknowledge-based business processes.8orkflow management in both e-business and e-commerce depends on aworkflow softwareengine containing software models of the business processes to be accomplished. #heworkflowmodel e!presses the predefined sets of business rules roles of stakeholdersauthoriation re>uirements routing alternati"es databases used and se>uence of tasksre>uired for each e-commerce process.

    Event 0otification( ,ost e-commerce applications are e"ent-dri"en systems that respond to amultitude of e"ents. $"ent notification processes play an important role in e-commerce systems

    since customers suppliers employees and other stakeholders must be notified of all e"entsthat might affect their status in a transaction.

    Collaboration and Trading( #his category of e-commerce processes are those that support the"ital collaboration arrangements and trading ser"ices needed by customers suppliers and otherstakeholders to accomplish e-commerce transactions.

  • 8/12/2019 IT Notes2003

    21/28

    &n practice e-business is more than ?ust e-commerce. 8hile e-business refers to more strategic focuswith an emphasis on the functions that occur using electronic capabilities e-commerce is a subset of ano"erall e-business strategy.

    $-commerce seeks to add re"enue streams using the 8orld 8ide 8eb or the &nternet to build andenhance relationships with clients and partners and to impro"e efficiency using the $mpty essel strategywhere as $-business deals with re"enue and also the ser"ices with all the key operations

    $-business in"ol"es business processes spanning the entire "alue chain ser"ices and supply chainmanagement processing orders electronically handling customer ser"ice and cooperating with businesspartners. #he $-commerce do not in"ol"e more into this domain le"el relations.

    The E-)usiness Modelswork on reaching the customers and suppliers in global scope which

    make a durable and reliable business on electronic medium

    #hey pro"ide the global ser"ices like

    Direct Manufacturer )usiness Model

    'd"ertising %etworks N feed banner ads to a network of member sites thereby enabling

    ad"ertisers to deploy large marketing campaigns

    'udience ,easurement 3er"ices N online audience market research agencies.

    &ncenti"e ,arketing N customer loyalty program that pro"ides incenti"es to customers

    such as redeemable points or coupons for making purchases from associated retailers

    &ffiliate )usiness Model

    :ay-per-click N site that pays affiliates for a user click-through.

    4e"enue 3haring N offers a percent-of-sale commission based

    Communit' )usiness Model

    =pen ontent N openly accessible content de"eloped

    :ublic +roadcasting N user-supported model used by not-for-profit radio and tele"ision

    3ocial %etworking 3er"ices N sites that pro"ide indi"iduals with the ability to connect to other

    indi"iduals along a defined common interest

    http://www.ebusinessmodels.com/2008/direct-manufacturer-business-model/http://www.ebusinessmodels.com/2008/direct-manufacturer-business-model/http://www.ebusinessmodels.com/2008/affiliate-business-model/http://www.ebusinessmodels.com/2008/community-business-model/http://www.ebusinessmodels.com/2008/direct-manufacturer-business-model/http://www.ebusinessmodels.com/2008/affiliate-business-model/http://www.ebusinessmodels.com/2008/community-business-model/
  • 8/12/2019 IT Notes2003

    22/28

    "ubscription )usiness Model

    #rust 3er"ices N come in the form of membership associations

    &nternet 3er"ices :ro"iders N offer network connecti"ity

    Utilit' )usiness Model

    #he utility or Fon-demandG model is based on metering usage or a Fpay as you goG

    )roerage )usiness Model

    ,arketplace $!change N offers a full range of ser"ices co"ering the transaction process

    +uyE3ell Aulfillment N takes customer orders to buy or sell a product or ser"ice

    Demand ollection 3ystem N the patented Fname-your-priceG model pioneered by

    :riceline.com.

    'uction +roker N conducts auctions for sellers (indi"iduals or merchants).

    3earch 'gent N a software agent or FrobotG used to search-out the price and a"ailability.

    E-)usiness Transformations( &t is critical for the +usiness systems to ensure that the efficiency of its

    +usiness =perations as better than its competitors e"ery in"estment has an assured and time-bound

    and e!pectations +usiness operations are process-oriented and through &nformation technology we can

    e!pand and make transformations in optimal budget.

    #he management of system aim on following measures (factors) for #ransformations process.

    +evenue Gro.thJ with empowering new market places and new customers.

    Monitor' )enefitsJ 'lso called to be the "alue added ser"ices.

    Technolog' enabled-introduce more technology and performance.

    Operations managementJ Dri"ing the 3ales management in global and getting the

    right scope in market

    "ervice OfferingsJ oming up with effecti"e ser"ice offerings to clients

    Optimi=ing the investmentsJ controlling the in"estments.

    #nfrastructureJ De"eloping the ad"anced infrastructure.

    CommunicationJ =rganiing the ad"anced communications and presentations

    +oles in transforming E-)usiness(

    #ransformation of business needs lot of thought process from top le"el leadership management

    and also the technology e!perts. 'll the members of the hierarchy ha"e the roles in the

    transformation.

    #his needs the additional focus on creati"ity definite "ision and also prosperity.

    http://www.ebusinessmodels.com/2008/subscription-business-model/http://www.ebusinessmodels.com/2008/utility-business-model/http://www.ebusinessmodels.com/2008/brokerage-business-model/http://www.ebusinessmodels.com/2008/brokerage-business-model/http://www.ebusinessmodels.com/2008/subscription-business-model/http://www.ebusinessmodels.com/2008/utility-business-model/http://www.ebusinessmodels.com/2008/brokerage-business-model/
  • 8/12/2019 IT Notes2003

    23/28

    6ere are some of the roles in transformation.

    !enture capitalplays a key role in transforminginno"ation into successful business with

    investment and procurement.

    Relation managementneeds intellectual role

    Social mediahas a role to host the need.

    Technologyenhancements have vital role in providing the value adds and good designs

    by archiects.

    The HRteam has role to come up with new policies.

    #he staeholdersha"e role to define the right path in functional de"elopment

    Leadershipat top le"el and middle le"el ha"e a key role to define the purpose and dri"e

    them from the scratch le"el.

    #he )usiness &nal'stteam has the ma?or role to understand the competitor strategyand define the new strategies.

    #)@

    #he $-business transformations ha"e de"eloped a new roadmap with focus on

    &nternational business for growth and profitability.

    #he &+ focus opened some factors to work on for achie"ing the large business proposals.

    #his &+ Aocus in"ol"es all those business acti"ities which has cross border transactions

    of goods ser"ices resources between two or more nations.

    #ransaction of economic resources include capital skills people etc. for internationalproduction of physical goods and ser"ices such as finance banking insurance

    construction etc

    #his worldwide operations approach made the opening for ,% companies (,ulti

    national corporations).

    #he &nternational e!posure for business making had not only attracted enabled but

    also

    %on- companies like :ia-6ut and ,-Donalds also gained lot of e!posure and profits.

    6ere are some of the factors enabling the &+ in positi"e

    &nternational =b?ecti"es

    sales e!pansion

    resource ac>uisition

    risk minimiation

  • 8/12/2019 IT Notes2003

    24/28

    ost 3a"ing

    increased profits

    MODULE->

    E-Governance

    3e"eral dimension and related factors influence the definition of eGovernance. #he word FelectronicG inthe term e-o"ernance implies technology dri"en go"ernance. $-o"ernance is the application of&nformation and communication #echnology () for deli"ering go"ernment 3er"ices e!change ofinformation communication transactions integration "arious stand-one systems and ser"ices betweeno"ernment-to-citiens () o"ernment-to-+usiness(+)o"ernment-to-o"ernment( ) as wellas back office processes and interactions within the entire go"ernment frame work P. #hrough the e-o"ernance the go"ernment ser"ices will be made a"ailable to the citiens in a con"enient efficient andtransparent manner. #he three main target groups that can be distinguished in go"ernance concepts areo"ernment citiens and businessesEinterest groups. &n eo"ernance there are no distinct boundaries.

    enerally four basic models are a"ailable-o"ernment to ustomer (itien) o"ernment to $mployeeso"ernment to o"ernment and o"ernment to +usiness

    Difference bet.een e-governance and e-government

    +oth the terms are treated to be the same howe"er there is some difference between the two.

  • 8/12/2019 IT Notes2003

    25/28

    implemented effecti"ely and properly to follow 4#&' which means 4esponsibility #ransparency &ntegrityand 'ccountability.

    ;ocaliation of ;anguages which is a ,*3# for $AA$#&$ &mplementation of eo"ernance 4#& 'ctand all other 'cts of &%D&'.#here are 0 to official languages in &%D&'. 'll '#3 of &%D&' needs to be#4'%3;'#$D into these official ;angauges.

    =nly 5 V in &%D&' speak $nglish. =nly 0 to 5 V in &%D&' knows 6indi.75 V to 90 V of people speakthere own 3#'#$ ;'%'*$. 8e need to '#$4 to these people. #his should happen in &%D&'. =&needs to think about this for itSs future. 4eal 4#& 'cti"ists who are in the field knows about this problems.

    4ight to &nfo 'ct hits language barrier

    'd"antages@

    #here are ad"antages while implementing an electronic go"ernment. #he main ad"antage of an electronicgo"ernment this will be to impro"e the efficiency of the current system. #hat would in return sa"e moneyand time. #he introduction would also facilitate better communications between go"ernments andbusinesses. 'n e!ample would be $-:rocurement facilitates and ++ communicationB this will

    permit smaller business to compete for go"ernment contracts as well as larger business. #his will ha"ethe ad"antage of creating an open market and stronger economy. +usiness and citiens can obtaininformation at a faster speed and it is possible at any time of the day.

    &n addition mo"ing away from a hea"ily paper based system to an electronic system would reduces theneed for man power. #hus this would allow the process to be handled by lesser employees and thereforeto reduce operations cost.

    #he society is mo"ing toward the mobile connections. #he ability of an e-go"ernment ser"ice to beaccessible to citiens irrespecti"e of location throughout the country brings the ne!t and potentiallybiggest benefit of an e-go"ernment ser"ice. #he society is mo"ing toward the mobile connections.

    Due to the fact that information and statistics are posted online the idea of an Fopened upG go"ernmentand made go"ernment policy information (including some socially "aluable archi"al and historicalinformation) and ser"ices more a"ailable. #his would reflect a greater transparency of the ser"icepro"ided by the go"ernment .

    Disad"antages@

    $lectronic go"ernments also consist on certain disad"antage. #he main disad"antage of an electronicgo"ernment is to mo"e the go"ernment ser"ices into an electronic based system. #his system loses theperson to person interaction which is "alued by a lot of people.

    &n addition the implementation of an e-go"ernment ser"ice is that with many technology based ser"icesit is often easy to make the e!cuse (e.g. the ser"er has gone down) that problems with the ser"ice

    pro"ided are because of the technology.

    #he implementation of an e go"ernment does ha"e certain constraints. ;iteracy of the users and theability to use the computer users who do not know how to read and write would need assistance. 'ne!ample would be the senior citiens. &n general senior citiens do not ha"e much education and theywould ha"e to approach a customer ser"ice officer for assistance.

    3tudies ha"e shown that there is potential for a reduction in the usability of go"ernment online due tofactors such as the access to &nternet technology and usability of ser"ices and the ability to access to

  • 8/12/2019 IT Notes2003

    26/28

    computersB $"en though the le"el of confidence in the security offered by go"ernment web sites are highthe public are still concerned o"er security fear of spam from pro"iding email addresses and go"ernmentretention of transaction or interaction history.

    MC&91 pro?ect

    ,'1 pro?ect is designed to fully automate all processes related to the proacti"e enforcement andcompliance of the legal re>uirements under the ompanies 'ct 195/. #his will help the businesscommunity to meet their statutory obligations. #he ma?or components in"ol"ed in this comprehensi"e e-o"ernance pro?ect are Aront =ffice and +ack =ffice. Arom the customer perspecti"e the Aront =fficeoperations assume significance which would be administered through the Aront =ffice portal. #he entire+ack =ffice operations of the ,' would be automated so as to achie"e the ob?ecti"e of a user-friendlycomputeried en"ironment. ,' portal is the single point of contact for all ,' related ser"ices whichcan be easily accessed o"er the &nternet by all users.

    #he pro?ect also en"isages a cost-effecti"e integrated software solution for computeriing "arious in-house functions like 6uman 4esources ,anagement :ayroll 'ccounting and Ainance for internal users(employees) of ,'. 'dopting international best practices ,'1 application adds immense "alue tothe stakeholders. #he following points highlight the pro?ectSs in"aluable importance@

    W $nable the business community to register a company and file statutory documents >uickly andeasily.

    W :ublic will get easy access to rele"ant records and get their grie"ances redressed effecti"ely.

    W :rofessionals will be able to offer efficient ser"ices to their client companies.

    W Ainancial institutions will find registration and "erification of charges easy.

    W ,' will ensure proacti"e and effecti"e compliance with rele"ant laws and corporate go"ernance.

    W $mployees will be enabled to deli"er best of breed ser"ices.

    )4OOM# /+O@ECT

    +hoomi is a pro?ect ?ointly funded by the o"ernment of &ndia and the o"ernment of Karnataka to

    digitie the paper land records and create a software mechanism to control changes to the land registry inKarnataka. #he pro?ect was designed to eliminate the long-standing problem of inefficiency and corruptionin the maintenance of land records at dispersed and poorly super"ised and audited block-le"el officesknown as uest for mutation to their land records . the Kiosk is fully funded by 3tate

    o"ernment.

  • 8/12/2019 IT Notes2003

    27/28

    #ouch 3creen Kiosk where farmers can see their land related information without anybodyMs

    inter"ention or help.

    )enifits of )hoomi

    Aarmers@ ,armers can uicl' get their land records from 7ioss and are protected from

    harassment and e;tortion3

    's against time delay of to 0 days they now get their records in less than minutes.%o o"erhead cost is to be incurred. %o application is re>uired to be submitted at thekiosk. #he records are authentic and legible. *se of biometrics authentication systemfor updation of records ha"e freed farmers from the worry of probable manipulation oftheir records by some times some unscrupulous officials.

    +eduction in processing time for mutation3

    Aarmers can lodge application for mutation (change in land title) to their land records

    at the mutation kiosks get acknowledgement for the same and can monitor the

    progress using touch screen kiosks a"ailable in some +hoomi centers. #hey wouldthen get their updated land record in a fi!ed time frame without the need of

    approaching any authority. 's against earlier time of 0-00 days mutation would now

    re>uire less than 5 days

    Online tracing of mutation status3

    Aarmers can also get the official status report of their re>uest for mutation which would

    let them know the stage at which their re>uest is pending. #his status report would

    help them in enforcing their right of getting the record mutated in the prescribed time.

    Eas' access to ,arm Credit3

    =nline connecti"ity to banks would ensure farm credit to farmers in less than 5 days asagainst 5-0 days in manual system.

    Ease in case of legal matters3

    &t would be easier for the farmers to pursue land related litigation in the court.

    &dministrators(

    Ease of maintenance and updation of land records documents3

    &n manual system land records updation used to get delayed by as high as 1- years in

    some cases. %ow it would always be in sync with time.

    Auic and eas' access to Land records3

    3upport for de"elopment programs based on "aluable land records data like "arious

    crops grown in a "illage or a sub district the fertiliers and pesticide re>uirement in a

    season etc to Departments like 'griculture &ndustries and :lanning. 3uch data in

    earlier system became a"ailable to departments only after - years. &t is now

    a"ailable almost immediately.

    http://void%280%29/http://void%280%29/http://void%280%29/http://void%280%29/http://void%280%29/http://void%280%29/http://void%280%29/http://void%280%29/http://void%280%29/http://void%280%29/http://void%280%29/http://void%280%29/http://void%280%29/http://void%280%29/http://void%280%29/http://void%280%29/
  • 8/12/2019 IT Notes2003

    28/28

    Auic and eas' access to Land records for anal'sis purpose3

    3upport for de"elopment programs based on "aluable land records data like "arious

    crops grown in a "illage or a sub district the fertiliers and pesticide re>uirement in a

    season etc to Departments like 'griculture &ndustries and :lanning. 3uch data in

    earlier system became a"ailable to departments only after - years. &t is now

    a"ailable almost immediately.

    Ease of monitoring Government Lands3

    ,onitoring of o"ernment lands and pre"ention of their encroachments. ;ack of

    monitoring had costed a reported loss of 4s.5 billion to 3tate o"ernment by way of

    officials tampering with records.

    =thers

    ,or ,inancial #nstitutions% Online ,arm credit related activities3

    =nline connecti"ity to financial institutions would help banks in planning for their farm

    credit related acti"ities. &n manual system they worked on years old data or ?ust

    guessed the farm sector re>uirement.

    #nformation availabilit' for /rivate "ector3

    :ri"ate sector had complained of absence of crop and land data for their planning

    purpose. +hoomi data would help supplier of "arious agricultural inputs like seeds

    pesticide fertiliers etc. to plan their acti"ities. Details of irrigated lands and pattern of

    land holding could be used by pri"ate sector for more informed decision making. &n

    manual system such data was ?ust not a"ailable.

    http://void%280%29/http://void%280%29/http://void%280%29/http://void%280%29/http://void%280%29/http://void%280%29/http://void%280%29/http://void%280%29/