0% found this document useful (0 votes)
38 views6 pages

IT Communication SMARTPreCA2024 KING R QUEEN P

Uploaded by

myonline Works
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views6 pages

IT Communication SMARTPreCA2024 KING R QUEEN P

Uploaded by

myonline Works
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

VAJIRAM AND RAVI

Institute for IAS examination

Science and Tech.


Handout
Theme: IT & Communication

FREE BY KING R QUEEN P [Help Others God Will Help You]


IT and Communication Handout
Evolution from 1G to 5G Technology Private 5G Network
 1G(1980s): The first wireless telecom network  Non-public mobile networks that can use
system. Brick phones and “bag phones” licensed, unlicensed, or shared spectrum.
operated on 1G technology.
 2G (1990s): represented a shift from analogue to  Functions similarly to a public 5G network, but
digital cell phones. allows the owner to provide restricted access.
 3G (2000s): came with Wireless Code-Division  They can also be less prone to latency issues.
Multiple Access (CDMA) technology that
provides broadband-speed internet access. 5G Vertical Engagement and Partnership
 4G (2009): LTE (Long-Term Evolution) is a fourth-
generation (4G) wireless standard that provides Program (VEPP)
increased network capacity and speed.  Initiative of the Department of
 VoLTE (Voice over Long-Term Evolution) Telecommunications (DoT).
allowed voice calls via the 4G network,  Aim: To build collaboration partnerships across
supporting simultaneous voice and data 5G use-case ecosystem stakeholders.
services.  DoT will facilitate necessary approvals, and
o Speed: Upto 1 Gbps. regulatory clearances to enable use case
 5G: 5G mainly works in 3 bands, namely low, mid prototyping, pilots, demos, and trials at the user
and high-frequency spectrum or vertical industry premises.
 Low-band 5G (<1GHz): speeds around 50 Mbps.
 Mid-band 5G (1-6GHz): speed around 100-900 National Digital Communication Policy
Mbps. (2018)
 High-band 5G (>6GHz, 24Ghz band): provides  The Policy envisages three Missions:
the fastest speeds (1 Gbps speeds) over short o Connect India
distances. o Propel India
o Secure India
5G Open Radio Access Network(ORAN)  The policy aims to:
 Developed by the Centre for Development of o Provide Universal broadband
Telematics (C-DOT), VVDN Technologies Private connectivity at 50 Mbps to every citizen.
Limited and WiSig Networks Private Limited. o Provide 1 Gbps connectivity to all Gram
 Aim: To develop an O-RAN-compliant Panchayats.
disaggregated 5G RAN solution for FR1 (low- o Ensure connectivity to all uncovered
frequency) and FR2 (high-frequency) bands for areas.
public and private 5G networks. o Attract investments of USD 100 Billion
 The second such initiative under the C-DOT in the Digital Communications Sector
Collaborative Research Program 2022 initiative.  The policy advocates the establishment of a
 Standalone 5G: Cellular infrastructure built National Digital Grid by creating a National Fibre
specifically for 5G services by implementing 5G Authority.
standards and protocols in the radio network
and controller core. Network Slicing
 Non-Stand Alone 5G uses the 4G LTE core and  Involves the creation of multiple virtual
cannot offer any 5G functionality beyond the networks within a single physical 5G
radio connectivity. infrastructure.
 Each “slice” or portion of the network can be
5G India Forum allocated based on the specific needs of the
 Formed by Cellular industry body Cellular application, use case, or customer.
Operators Association of India (COAI).  A key feature of 5G core architecture leading to
 Aim: To bolster efforts around using and faster data transmission,
deploying the 5G technology. lower latency, and greater connectivity.

Vajiram & Ravi - An Institute for IAS Preparation | Delhi Branch- 9-B, Bada Bazar Marg, Old Rajinder Nagar, New Delhi-110060 | Chennai Branch - Vajiram & Ravi
New No. 62, P Block, 6th Avenue, Anna nagar, Chennai - 600040 | E-mail: [email protected] | Tel: 080-6220-6330

FREE BY KING R QUEEN P [Help Others God Will Help You]


Fiberisation to understand the needs of 6G technology from
 It is the process of connecting mobile towers society and business, and to foster consensus.
with optical fibre cables.  Telecom Technology Development Fund:
 It helps in 5G deployment.
 Helps in providing full utilization of network o Launched by the Universal Service
capacity. Obligation Fund (USOF)
 Comes in a lot of forms such as FTTH (Fiber to
the Home) and FTTx (Fiber to the X). Embedded SIM (eSIM)
Massive Multi-user MIMO (multiple-  It is also known as eUICC (Embedded Universal
Circuit Card).
input, multiple-output)  It is a digital SIM card that's permanently
 It is the key technology used in 5G Networks. embedded as part of the motherboard of a
 The key feature of Massive MIMO is the base device.
station having a massive number of antennas,  They are programmable remotely via software.
much more than user devices can have.  Advantages:
 Uses a technique called beamforming to reduce o Small physical footprint than nano SIMs
interference between users and improve overall o Convenient, secure than physical SIMs.
network efficiency.
 Benefits: Increased network capacity, improved
user data rates, and better coverage, especially Wi-Fi 7 Technology
at the network's edge.  Also known as IEEE 802.11be Extremely High
Throughput (EHT).
 Backward compatibility: Devices in the 2.4 GHz,
Mobile edge computing (MEC) 5 GHz, and 6 GHz bands can be connected
 Also known as Multi-access Edge Computing. without additional hardware.
 It is the near-real-time processing of large  Reduced latency: 100 times lower latency than
amounts of data produced by edge devices and Wi-Fi 6.
applications closest to where it’s captured.  Multi-Link Operation (MLO): Combines multiple
 Benefits: Higher bandwidth, lower latency, and channels on different frequencies to improve
faster response times and decision-making. network performance.
 Four times faster than Wi-Fi 6 and has better
Beamforming reliability than Wi-Fi 6.
 It is a signal processing technique used in  Enhanced privacy and security than Wi-Fi 6.
antenna arrays to focus radio waves (or sound  Adaptive puncturing technology: Allows the
waves) in a specific direction. system to use wider channels even when there
 Used to improve the signal-to-noise ratio of is interference.
received signals, and eliminate undesirable  PM WANI scheme: Aims to provide broadband
interference sources. through public Wi-Fi hotspot providers.
 Central to MIMO wireless communications  In-flight Wi-Fi: It is a service that allows
systems such as 5G, LTE, and WLAN. passengers to access voice, video, and data
o Aims to fund R&D in rural-specific services after the aircraft has reached an
communication technology altitude of 3,000 meters.
applications.  It relies on onboard antenna as well as satellites
o Aim to promote technology ownership for Internet and mobile communication.
and indigenous manufacturing.
WiMAX (Worldwide Interoperability for
6G Networks Microwave Access)
 Operates in Terahertz (THz) frequencies.  It is a telecommunications technology that
 Uses technologies like AI to enable offers wireless data over long distances.
communication multiple times faster than the  It provides high-speed internet service to large
5G network. geographical areas.
 Bharat 6G Vision: Government initiative to  WiMAX can offer data-transfer rates of up to 75
develop and fund the next generation of 6G megabits per second.
technology.  It has a range of up to 50 km and can operate in
 Bharat 6G Alliance (B6GA): Collaborative non-line-of-sight.
platform that includes academia, research  Supplanted by Long Term Evolution (LTE) in 4G
institutions, standards development communications.
organizations, and public and private companies

Vajiram & Ravi - An Institute for IAS Preparation | Delhi Branch- 9-B, Bada Bazar Marg, Old Rajinder Nagar, New Delhi-110060 | Chennai Branch - Vajiram &
Ravi New No. 62, P Block, 6th Avenue, Anna nagar, Chennai - 600040 | E-mail: [email protected] | Tel: 080-6220-6330

FREE BY KING R QUEEN P [Help Others God Will Help You]


Li-Fi (light fidelity)  The response from the server is not a singular
 Li-Fi is a wireless communication technology entity. Instead, it is an amalgam of various files.
that uses light to transmit data and position  Typically, these files have information encoded
between devices. in three languages: HTML, CSS, and JavaScript.
 Can transmit data at speeds of up to 224 Gbit/s.  HTML provides the architectural blueprint of a
 Uses light sources such as lamps, streetlights, webpage defining the structure of the page.
and LED televisions.  CSS imparts style and aesthetics to the HTML
 Li-Fi has a coverage range of about 10 meters. structure.
 LiFi is faster, cheaper, and more secure than  Java Script is the dynamic engine, that makes
WiFi. web pages interactive and responsive.
 Hypertext Transfer Protocol (HTTP) is a set of
Bluetooth rules for transferring files over the internet. It is
 Wireless technology standard that allows the foundation of the worldwide Web and is
devices to communicate with each other over used to load webpages using hypertext links.
short distances without cables or wires.  Hypertext transfer protocol secure (HTTPS) is
 Uses radio frequency to transmit data. the secure version of HTTP. It is encrypted to
 Range: Up to 10 meters. increase the security of data transfer.
 Bluebugging: a hacking technique that allows  Web 3.0 and 5.0:
hackers to access a device with an open o Web 3.0 is built on blockchain
Bluetooth connection and gain complete control technology and is communally
over it. controlled by its users.
 Bluejacking: Bluejacking is when an attacker o Web 5.0 is a decentralized web platform
sends unsolicited messages, such as spam to a that combines Web 2.0 and Web 3.0 to
victim’s Bluetooth-enabled device. give users more control over their data
 Bluesnarfing: a cyberattack where the security and identity.
vulnerabilities of a Bluetooth connection are
exploited to access the sensitive data of the
target device.
Virtual Private Network (VPN)
 Juice jacking: a cyberattack that involves  Creates a secure and encrypted connection
hacking public USB charging ports to steal data between your device and the internet.
or install malware on connected devices. Can be  Hides IP address and online activity from third
used to steal passwords, credit card information, parties, and keeps data safe from
addresses, and other sensitive data. cybercriminals.
 VPN creates a point-to-point tunnel that
encrypts personal data, masks IP addresses, and
RFID (Radio Frequency Identification) sidesteps website blocks and firewalls.
 A wireless technology that uses radio waves to  Types of VPN
identify and track objects or people. o Secure socket VPN: Uses the Secure
 RFID systems use low-frequency, high- Sockets Layer (SSL) protocol to encrypt
frequency, and ultra-high-frequency bands. data. Often used for remote access to
 Range: up to 100 meters. corporate resources, website, payment
 Line of sight is not required for RFID technology gateways
to function. o Site-to-Site VPN: Connects two entire
 Types of RFID: Mono-directional (Read-Only) networks together, creating a secure
RFID and Bidirectional (Duplex) RFID. tunnel between them.
o Client to Server VPN: Allows users to
Near Field Communication (NFC) connect to a server from the internet to
 Short-range wireless technologies that allow access a local area network (LAN) or
communication between two devices within corporate network.
4cm of each other.  VPN kill switch: A security feature that
 Uses magnetic field induction to enable completely cuts-off the internet connection
communication between devices. dropping when your VPN connection is lost to
 NFC requires less power consumption than prevent the data from getting exposed.
Bluetooth.
Space Internet
Internet- Web Browser  It is an internet connection powered by satellites
 A software application that allows users to orbiting the Earth.
access information on the World Wide Web
(WWW).
Vajiram & Ravi - An Institute for IAS Preparation | Delhi Branch- 9-B, Bada Bazar Marg, Old Rajinder Nagar, New Delhi-110060 | Chennai Branch - Vajiram &
Ravi New No. 62, P Block, 6th Avenue, Anna nagar, Chennai - 600040 | E-mail: [email protected] | Tel: 080-6220-6330

FREE BY KING R QUEEN P [Help Others God Will Help You]


 These signals from satellites are then routed to Cyber Attacks
internet service providers and then to users'  Botnet: A network of computers that have been
internet modems. infected with malware and controlled by an
 Examples: JioSpace Fiber, Starlink, Amazon's attacker, known as the "bot-herder".
Kuiper project, and OneWeb.  Malware: Malware, or “malicious software,” is
 Sky wave propagation (Ionospheric wave an umbrella term that describes any malicious
propagation): A type of radio wave transmission program or code that is harmful to systems.
that uses the ionosphere's reflection mechanism  Worm: Malware that self-replicates, targeting
to spread electromagnetic waves. vulnerabilities within a network to spread its
o Frequency range: 3 MHz to 30 MHz. presence.
 Space wave propagation (tropospheric  Trojan Horse: A type of malware that is often
propagation) is a type of radio wave masked as legitimate software, used to gain
propagation that occurs within 20 km of the access to user systems.
Earth's surface. It's also known as line-of-sight  Spyware: malicious software that enters a user's
propagation. computer, gathers data from the device and
 Laser Communications Relay Demonstration user, and sends it to third parties without their
(LCRD) The LCRD is NASA's first laser consent.
communications system.  Adware: Software that automatically displays or
o Uses infrared light or invisible lasers, to downloads advertising material such as banners
transmit and receive signals rather than or pop-ups when a user is online.
radio waves.  Virus: Viruses are self-replicating programs that
o Launched in a geosynchronous orbit attach themselves to other files and spread from
over 35,000 km above Earth. one computer to another.
 Deep Space Optical Communication (DSOC):  Pharming: A cyberattack that steals personal or
o DSOC is NASA's first demonstration of financial information by redirecting it to a fake
optical communications. website.
o DSOC is a laser space communication  Phishing: A cybercrime that involves contacting
system that uses near-infrared laser a target through email, text message, or phone,
signals to transmit data between and posing as a legitimate institution.
spacecraft and Earth.  Ransomware: A type of malware that encrypts a
o Launched in 2023. user's files and then demands a ransom
 Free space optical communication (FSOC) is a payment to decrypt them.
wireless technology that uses light to transmit  Maze ransomware: It is a type of ransomware
data over long distances without the need for that can encrypt networks and steal sensitive
cables. data.
 Project Taara: The project uses Free Space  Spoofing: A cyberattack where a criminal
Optical Communication (FSOC) technology to impersonates a trusted entity or device to gain
provide internet access to remote areas. unauthorized access to a system.
 Wi-Fi Eavesdropping: A cyberattack that
Open Source Operating System (OS): involves hackers stealing data while on a public,
 The copyright holders allow users to see, use, unsecured wifi network.
and edit the OS's source code.  Chameleon Trojan: is an Android banking trojan
 OpenKylin: It is China's first open-source that can mimic legitimate apps, disable
desktop operating system (OS). It is a Linux- biometric security, and steal PINs and data.
based operating system.  Zero Day Attack: is the use of a zero-day exploit
 BharOS: BharOS is a mobile operating system and attack the unknown security flaw that hasn’t
based on an AOSP (Android Open Source been addressed to cause damage to or steal data
Project). from a system affected by a vulnerability.
o It supports Native Over The Air (NOTA)  Acoustic Side-Channel Attack: The sound of
updates and No Default Apps (NDA). clicks generated by a keyboard is used to analyse
o It will employ the Private App Store keystrokes and interpret what is being typed to
Services (PASS) system. leak sensitive information.
 Storm - 0558: a China-based hacking group.
DarkNet  Predator: Also known as HawkEye, is a keylogger
 Part of the internet that's encrypted and hidden and trojan that steals information from PCs.
from search engines and normal browsers.  Keylogger: Keyloggers are a type of spyware that
 Operates in secrecy using the Onion Router records keystrokes to reveal passwords and
(ToR). personal information.
Vajiram & Ravi - An Institute for IAS Preparation | Delhi Branch- 9-B, Bada Bazar Marg, Old Rajinder Nagar, New Delhi-110060 | Chennai Branch - Vajiram &
Ravi New No. 62, P Block, 6th Avenue, Anna nagar, Chennai - 600040 | E-mail: [email protected] | Tel: 080-6220-6330

FREE BY KING R QUEEN P [Help Others God Will Help You]


 Lock Bit 3.0: LockBit ransomware works as a self- Nabhmitra
spreading malware that blocks access to  Developed by the ISRO’s Space Applications
computer systems and demands payment in Centre (SAC) to improve the safety of fishermen.
exchange.  It enables two-way messaging services from and
 Fjord Phantom: is a new kind of Android to the sea.
malware that targets banking customers. It  Aim: For real-time tracking of the sub-20 m
propagates through messaging services and boats going into the deep sea for fishing.
combines app-based malware with social
engineering to deceive banking customers.
 Zero-click Spyware: refers to a type of spyware Dark Fibre
that can be installed on a device without any  Refers to a spare piece of network fibre that is in
interaction or action required from the user. the ground that can be leased to companies in
 Distributed Denial of Service (DDOS): is a the future.
cybercrime that involves flooding a target  Used for telecom and network communications.
server, service, or network with internet traffic
to prevent users from accessing online services Dark Patterns
and sites.  They are also known as deceptive patterns.
 They are tricks used in websites and apps to
Pass-Keys manipulate or deceive users into taking certain
(concepts explained in the class) actions or making specific choices online.
 It is a type of security feature that allows users  Dark patterns can include drip pricing, disguised
to access their online accounts without using advertisement, bait and switch, and false
passwords. urgency.
 Work by using public-key cryptography.
India Stack
RISC-V Chip Technology  It is a government-led initiative that focuses on
(concepts explained in the class) building a robust digital infrastructure to enable
 Fifth generation of processors built on the various digital services across different sectors.
concept of the reduced instruction set computer  Aims to streamline and enhance identity
(RISC). verification, data exchange, and digital payment
 Allows developers to create processors for a processes to make them more accessible and
variety of applications, including energy- efficient for citizens.
efficient IoT gadgets.  Key components: Aadhaar, UPI and Digital
Locker.
Sagar Sampark
 It is an indigenous Differential Global Navigation Grid Computing
Satellite System (DGNSS).  It is a method of using a network of computers
 Helps in providing radio aids to ships for marine to work together as a virtual supercomputer to
navigation. complete large tasks.
 DGNSS is a terrestrial-based enhancement  GARUDA (Global Access to Resource Using
system which corrects the errors and Distributed Architecture) is India's Grid
inaccuracies in the Global Navigation Satellite Computing initiative connecting 17 cities across
System (GNSS) the country.
o Initiative of Centre for Development of
Advanced Computing (C-DAC).

Vajiram & Ravi - An Institute for IAS Preparation | Delhi Branch- 9-B, Bada Bazar Marg, Old Rajinder Nagar, New Delhi-110060 | Chennai Branch - Vajiram &
Ravi New No. 62, P Block, 6th Avenue, Anna nagar, Chennai - 600040 | E-mail: [email protected] | Tel: 080-6220-6330

FREE BY KING R QUEEN P [Help Others God Will Help You]

You might also like