Sci & Tech Booklet B
Sci & Tech Booklet B
BOOKLET-5; S&T-5
COMPUTER & IT - 2
1. TABLE OF CONTENTS
1. Table of Contents............................................................................................................................. 0
2. SUPERCOMPUTERs .......................................................................................................................... 1
1) Supercomputing in India ........................................................................................................................... 1
A) AIRAWAT – PSAI ..............................................................................................................................................................1
B) Other IMportant SUpercomputers of India .....................................................................................................................2
C) National SuperComputing Mission (NSM) .......................................................................................................................2
3. Quantum Computer ......................................................................................................................... 2
1) National Quantum Computing Mission (April 2023) ................................................................................... 4
2) Quantum Entanglement ............................................................................................................................ 5
3) Quantum Gates: Devices that translate Quantum Effects to Computing Awesomness ............................... 6
4) QSIM – (Class Discussion) .......................................................................................................................... 6
4. Cloud Computing ............................................................................................................................. 8
5. Edge Computing (Class Discussion) .................................................................................................. 9
6. Web Browsers: How do they function? ............................................................................................ 9
7. Internet of Things (IOT) .................................................................................................................. 11
8. Industrial Revolution 4.0 ................................................................................................................ 12
9. Big Data ........................................................................................................................................ 13
10. Net Neutrality ............................................................................................................................ 14
11. Topics to be covered in Future Booklets ...................................................................................... 15
ú As per the 62nd edition of TOP500 released in Nov 2023, following are the most powerful
supercomputers currently:
» USA’s Frontier is the most powerful supercomputer in the world reaching 1194 petaflops (1.194
Exaflops)
» USA’s Aurora system is at 2nd spot with a capacity of 585.34 PFlop/s.
Note: Aurora is currently being commissioned and will reportedly exceed Frontier with a peak
performance of 2 EFLops/s when finished.
» Eagle (installed in the Microsoft Azure Cloud in the USA), is at 3rd Spot. This is the highest rank a
cloud system has ever achieved. It has the capacity of 561.2 PFlop/s.
» Fugaku (of Japan) is now ranked 4th (it was ranked second till July 2023 and ranked one till Nov
2021). It’s capacity is that of 441.02 PFlop/s.
» LUMI (of European Union, Finland) is ranked 5th with a capacity of 379.70 PFlops.
ú Uses: Super computers are generally used for scientific and engineering applications that must handle
very large databases or do a great amount of computation (or both). Some of the key areas where
supercomputers contribute are:
» Weather forecasting
» Climate research (E.g. Pratyush at IITM, Pune)
» Code-breaking
» Genetic analysis
» Oil and gas exploration – Seismic processing in the oil industry: Supercomputers help to detect
and accelerate deeper geological insights.
» Molecular modelling
» Other jobs that need many calculations including engineering, product design, complex supply
chain optimization (actually any kind of optimization), Bitcoin mining etc.
1) SUPERCOMPUTING IN INDIA
- In India, Indigenous development of Supercomputers began in 1980s. India’s first Supercomputer was
Param 8,000 which was created in 1991.
- Currently, as per the 62nd edition of TOP500 released in Nov 2023, the most powerful supercomputer in
India is AIRAWAT – PSAI which is ranked 75 with a total capacity of 13.17 Petaflops. Thus in terms of
supercomputing power India is way behind the world leaders.
A) AIRAWAT – PSAI
- C-DAC has implemented AI Research Analytics and Knowledge Dissemination Platform (AIRAWAT)
of 200 AI Petaflops at C-DAC, Pune under the initiative of Ministry of Electronics and IT, GoI.
- C-DAC has designed and commissioned the converged HPC-AI dense GPU infrastructure integrated
with the existing PARAM SIDDHI AI (PSAI) system to make the cumulative compute capacity of 410
AI PF (13.17 PF DP).
- Note: AI FLOPS refers to the floating-point operations per second specifically dedicated to AI
workload. It refers to FLOPS required for training an AI Model.
3. QUANTUM COMPUTER
ú Classical computers have enabled the information revolution that we are part of today. But these classical
computers can’t do a number of things including Optimization, Simulation of large molecules, factoring
of large numbers etc.
ú Quantum computers are based on the principle of quantum theory. They gain enormous processing
power due to the ability of quantum computer to perform task using all possible permutations
simultaneously.
ú Quantum Computers use qubit (Quantum bit). These qubits can take values 0 or 1 or any of the infinite
superpositions between 0 and 1. When Qubits are in superposition, it has some probability of being in
state 0 and some probability of being in state 1.
» Qubits are usually made of things like electrons, photons or even a nucleus. In case of electron spin
up correspond to state 0 and spin down correspond to state 1.
» According to quantum law, the particle then enters a superposition of states, in which it behaves as
if it were in both states simultaneously. Each qubit utilized could take a superposition of both 0 and
1. Thus, the number of computations that a quantum computer could undertake is 2^n, where n
is the number of qubits used
» Quantum computing also borrows inspiration from another property of quantum mechanics called
entanglement, wherein the two qubits could be connected in such a way that the state of one qubit
intrinsically affects the state of the other qubit.
» Each operation of a quantum computation is performed by a quantum gate, which like classical
gate, changes the state the qubits are in.
ú Quantum Supremacy: It refers to quantum computers being able to solve a problem that a classical
computer cannot. The term was coined by theoretical physicist John Preskill of the Caltech in 2012.
» Google recently used a 53 Qubit processor (Sycamore) to generate a sequence of millions of
numbers, that conform to an algorithm generated by google. A classical supercomputer checked
some of these values and they were correct.
» Google’s Quantum computer claimed ‘Supremacy’ because it reportedly did the task in 200 seconds
that would have apparently taken a supercomputer 10,000 years to complete.
ú Some Problems faced by Quantum Computing Sector: While the above concept sounds promising, but
there are still tremendous obstacles to be overcome.
» Interference: During the computation phase of a quantum calculation, the slightest disturbance in
the quantum system (a stray photon or a wave of EM radiation) causes the quantum computation
to collapse, a process known as Quantum Decoherence.
» Error Corrections: Because truly isolating the quantum system has proven so difficult, error
correction systems for quantum computing have been developed.
» Output observance: Observing the final output also risks corrupting the data.
ú The breakthroughs in the last 20 year including the quantum supremacy achieved by Google have
increased the chances of developing practical quantum computing mechanisms. However, it is not clear
whether the practical application is less than a decade away or a hundred years into the future.
ú Examples of Quantum Computers: While the idea governing quantum computers have been around since
the 1990s, the actual machines have been around since 2011, most notably built by Canadian company D-
Wave systems.
ú Applications: The potential that this technology offers are attracting tremendous interest from both the
governments and the private sector. The quantum computers have the potential to easily tackle
computational problems that may be tough for the classical computer. The basic advantage is speed as it
can stimulate several classical computers working in parallel.
ú Military Applications include breaking of advanced encryption using brute force searches.
ú Advanced Cryptography: Quantum uncertainties could be used to create private keys for encrypting
messages to be sent from one place to another.
ú Climate Change and Weather Forecasting
ú Faster Data analysis in industrial science applications will enable faster solution to business
problems in the era of big data.
» Improved Optimization for complex problems like NP-hard problems. This may lead to faster
optimization of very large-scale problems involving complex network structures, computational
biological science, and physical sciences.
» Transform Healthcare and Medicine: Drug Development and Discovery
» Other civilian applications include DNA Modelling and complex material science analysis.
» Improved Machine Learning Outcomes by enabling more efficient optimization of these algorithms
so that ML capabilities become more efficient, accurate and fast.
» Teleporting the information from one location to another without physically transmitting the
information. Entangling of quantum particles allow us to achieve this.
- NQM, planned during 2023-2031, will mainly work towards strengthening India’s research and
development in the quantum arena alongside indigenously building quantum-based computers.
- It entails development of satellite-based quantum communication between ground station and receiver
located 3,000 kms away during the first three year.
- For long distance communication, tests will be conducted in coming years.
- Thematic hub for each will be established at research institutes and R&D centres who are already working
in the field of research.
- Department of S&T (DST) will lead the mission, supported by other departments.
- The mission puts India among the top six leading nations involved in the R&D in quantum technologies.
Presently, R&D work in quantum tech is underway in USA, China, Canada, France, Finland and Australia.
2) QUANTUM ENTANGLEMENT
» 2022 Nobel Prize in Physics has gone to Alain Aspect (France), John F Clauser (USA) and Anton Zeilinger
(Australia). These three scientists over the last four decades, have conclusively established that the
‘entanglement’ phenomenon observed in quantum particles was real, not a result of any ‘hidden’ or
unknown forces, and that it could be utilized to make transformative technological advances in
computing, hack-free communication, and science fiction like concept of ‘teleportation’.
ú Albert Einstein, in particular was very uncomfortable with this. His Special theory of relativity
prohibited any signal from travelling faster than the speed of light. The seemingly instantaneous
communication due to entanglement went against Einstein’s theory. Therefore, Einstein proposed
that something was missing and the Quantum theory was incomplete.
ú However, experimentalists were discovering that almost every prediction made by quantum theory
were being obeyed by sub-atomic particles. Till, that time, experiment to test entanglement didn’t
appear feasible.
ú John Clauser was the first person to set up an experiment to test entanglement. In 1972, his
experiments produced results that were clear violations of Bell inequality
ú Anton Zeilinger meanwhile had already started using entanglement property to open up new
technological possibilities. He demonstrated that it was possible to teleport the quantum states of
particles to another location without the particle moving anywhere and without a medium.
ú These experiments conducted by Clauser, Aspect and Zeilinger have decisively demonstrated that
entanglement was real and in accordance with quantum theory and it was not being driven by any
hidden forces as suggested by Einstein and others.
Application: The entanglement property is now being utilized to build the next generation of computers
called quantum computers which exploit the quantum behaviour of particles to overcome the challenges
considered unsurmountable. It is also being used for quantum cryptography.
» Concerns
ú Loss of control over certain sensitive data
ú Limited customization options
E.g., a restaurant with a limited menu is cheaper than a personal chef who can cook anything
you want.
- Technology behind cloud: There are two vital technologies at the heart of Cloud Computing:
▫ Virtualization: It lets computer resource to be shared through multiple virtual machines.
▫ Network: It lets data requests flow to and from the datacenters or the Cloud through the Internet.
In cloud computing hardware resources are distributed across multiple locations and there is diverse
choice of software that is available to consumers.
- Service Models: IaaS, PaaS, SaaS etc represent various cloud service models. They offer different levels of
service and control.
ú Infrastructure as service (IaaS)
o It provides on-demand access to fundamental resources like Virtual Machines, storage,
networking, and servers.
o These are online services that abstract the user from the details of infrastructure like
physical computing resources, location, data partitioning, scaling, security, back up etc.
o E.g. AWS, Microsoft Azure.
o It is ideal for companies with strong technical team and need for high customization.
- Why in news?
» How do web browser work? (Dec 2023: Source - TH)
- Definition:
» A web browser is software that allows you to find and view websites on the Internet. They translate
code into the dynamic webpage that forms the backbone of our online experience.
» The next watershed moment was Mosaic browser in 1993. It was developed by US National Centre
for Supercomputing Application. It introduced the concept of displaying images alongside text. It
revolutionized our interaction with the web and made internet visually engaging.
» In 1994 came the Netscape Navigator and it became the most popular browser of its time. It brough
features like bookmarks and user-friendly URL bar. It simplified the navigation and made the web
more accessible.
» Late 1990s saw the period of the ‘Browser Wars’. Microsoft’s Internet Explorer (IE) and Netscape
Navigator were the primarily contenders. This competition led to a lot of innovation in various
browsers. But, by 2,000 IE emerged as undisputed leader mostly on the back of the success of
Windows operating system which generally shipped with IE as default browser which most of the
people used. But this monopoly also led to stagnation and lack of innovation.
» In 2004-05, this monopoly was broken with the arrival of Mozilla’s Firefox. Firefox was developed
by a community of volunteers and was based on open-source principles. It introduced
groundbreaking features like tabbed browsing, and pop-up blocking. It also allowed users to extend
their personal browsers with add-ons.
» In 2008, Google launched Chrome, which swiftly gained in popularity for its speed and minimalist
design. It also revitalized the browser market and encouraged innovation across the board.
» Today, the most popular browsers are Google Chrome, Firefox, Microsoft’s Edge and Apple’s Safari.
C) Rendering
- With HTML, CSS and JavaScript in hand, a browser begins the process of rendering. This involves
deciphering the HTML to understand the structural arrangement, applying CSS for stylistic finesse,
and executive JS to infuse interactivity.
- The process is remarkably swift, assembling the final webpage and presenting it to user in a cohesive
and visually appealing manner in much less than a second, depending on the amount of data.
- Rendering engines are in themselves a key piece of technology that enables screens to display
graphics.
D) Managing Data
- Browsers serve as adept custodians for your digital footprint, so they also implement instruments
like cookies and cache to enhance your online experience.
- Cookies are small snippets of data stored on your computer by websites you visit. They retain
information such as login status, site preference, and shopping cart content. This allows you to
navigate seamlessly, without having to re-login to a site when you close and reopen it in a short
span of time.
- Cache is a repository of frequently accessed files. When you revisit a webpage, the browser checks
its cache to see if it already has a copy of the required files. If so, it retrieves them from the cache
itself rather than re-downloading them from the server.
- Web browsers use an array of security measures to protect your data as they fly between your
computer to various servers, via the internet, and even when they’re stored on your computer. They
do this by using encryption protocols, such as HTTPS, to create secure tunnels for data exchange
shielding the information from prying eyes.
- Browsers also use warning systems to alert you about potentially malicious websites, preventing
inadvertent exposure to threats.
- As technology hurtles forward, web browsers evolve in tandem. They are embracing new technologies
like Web Assembly, a format that enables near-native performance within the browser environment.
o Note: Web Assembly is a type of code that can run on modern webbrowsers – it is low-level
assembly-like language with a compact binary format that runs with near native performance
and provides languages such C/C++ with a compilation target so that they can run on web. It is
also designed to run along JavaScript, allowing both to work together.
- Support for VR and AR experience is also on the horizon, promising immersive online interactions.
- Privacy features are being bolstered, providing users a greater control over their digital footprint.
- Introduction
ú IoT is a network of physical objects embedded with sensors, software, and other technologies for
connecting and exchanging data with other devices and systems via the internet.
ú A thing on the internet of Things, can be a person with a heart monitor implant, a farm animal with a
biochip transponder, an automobile with a built-in-sensors to alert the driver when tire pressure is low -
or any other natural or manmade object that can be assigned an IP address and provided with the ability
to transfer data over a network.
ú Movement from IPV4 (32 bit address) to IPV6 (128 bit address) also played a role in making IoT possible.
- Advantages
ú Reduce waste, loss, and cost -> by early detection of problems and taking corrective steps
ú We would know what things needed replacing, repairing, or recalling and whether they were fresh or
past their best. This helps in increasing the reliability of a device.
- Now a Fourth Industrial Revolution is building on the Third. It is characterized by a fusion of technologies
that is blurring the lines between the physical, digital, and biological spheres.
ú It is characterized by integration of advanced technologies such as AI, IOT, Robotics, big data, and more
into various industries and aspects of society.
ú It combines Machine to Machine Communication, Industrial Big Data Analytics technology, cyber
security, and automation. It’s driving new levels of efficiency and productivity.
- Three reasons why 4th IR is not merely a prolongation of the 3rd IR, but rather the arrival of a Fourth and
distinct one: Velocity, Scope and Systems impact.
ú The speed of current breakthroughs has no historical precedent. The 4th Industrial Revolution is evolving
at an exponential rather than a linear pace.
ú It is disrupting almost every industry in the country.
ú The breadth and depth of these changes herald the transformation of entire systems of production,
management, and governance.
9. BIG DATA
- Intro
» Big Data is a collection of data that is huge in volume (petabytes and exabytes of data) yet growing
exponentially with time. It is a data with so large size and complexity that none of the traditional data
management tools can store or process it efficiently. Big Data can be structured, semi-structured and
Unstructured. But they generally have potential to be mined for information.
- Challenges include capture, analysis, data curation, search, sharing, storage, transfer, visualization, querying,
updating, and information privacy.
» Security Agencies
ú To prevent cyber attack
ú Detect credit card frauds
ú Foil terrorism
- Net Neutrality (also network neutrality, internet neutrality or net equality) is the principle that ISPs and
Governments should treat all data on the internet equally, not discriminating or charging differentially
by user, content, site, platform, application, type of attached equipment, or mode of communication.
- The term was coined by Columbia University media law professor Tim Wu in 2003 as an extension of
the long-standing concept of a common carrier.