UPSC CDS II EXAM PATTERN 2024

UPSC CDS II EXAM PATTERN 2024

Are you preparing for the UPSC CDS Exam II in 2024? If so, understanding the exam pattern is crucial for your success. Here, we will delve into the details of the UPSC CDS Exam II Exam Pattern 2024 and how Manasa Defence Academy is providing the best training to the students.

Overview of UPSC CDS Exam II Exam Pattern 2024

The UPSC Combined Defence Services (CDS) Exam II is conducted in two stages – a written examination and an interview.

The written test comprises three sections: English, General Knowledge, and Elementary Mathematics.

Each paper is of 100 marks with a duration of 2 hours for English and 2 hours each for General Knowledge and Elementary Mathematics.

The interview stage is conducted by the Services Selection Board (SSB) and carries 300 marks.

Manasa Defence Academy: Providing the Best Training to the Students

Manasa Defence Academy is known for its specialized training programs for aspirants preparing for defence exams like UPSC CDS.

The academy offers comprehensive study material, expert faculty, regular mock tests, and personalized guidance to help students excel in the UPSC CDS Exam.

With a focus on all aspects of the exam pattern, including English, General Knowledge, and Mathematics, Manasa Defence Academy ensures holistic preparation for the students.

The academy’s track record of success and individual attention to each student make it a preferred choice for UPSC CDS Exam preparation.

Conclusion

In conclusion, understanding the UPSC CDS Exam II Exam Pattern 2024 is essential for aspirants looking to join the defence forces. With specialized training programs and expert guidance from institutions like Manasa Defence Academy, students can enhance their preparation and maximize their chances of success in the exam. Prepare diligently, stay focused, and trust in the training provided to achieve your goal of clearing the UPSC CDS Exam II in 2024.

Understanding Metropolitan Area Network (MAN)

Understanding Metropolitan Area Network (MAN)

Metropolitan Area Network (MAN) is a network that is wider than the Local Area Network (LAN). The area used in the MAN network is in a country. In this case, a computer network connects several Local Area Network (LAN) networks into a larger area environment. Multiple Local Area Netwrok (LAN) into one network can also be called Metropolitan Area Network (MAN).

Metropolitan Area Network (MAN) can be found on one campus or in a rather large area (can also be a city). Metropolitan Area Networks (MAN) are usually not owned by only one organization. Just like a Local Area Network (LAN), the Metropolitan Area Network (MAN) also has wireless with relatively similar advantages and disadvantages. Metropolitan Area Network (MAN) is also able to support text and voice data, and can even be connected to cable television networks or radio waves.
A metropolitan area network (MAN) is a computer network that usually covers a large city or campus. MAN usually interconnects a number of local area networks (LANs) using high capacity backbone technology, such as fiber-optic links, and provides up-link services for wide area networks (or WANs) and the Internet. The scope of this MAN is between 10 to 50 km, this MAN is the right network to build a network between offices in one city between factories / agencies and head office within its reach.

Metropolitan Area Network (MAN) is a computer network in a city with high-speed data transfer, which connects various locations such as campus, offices, government, and so forth. MAN network is a combination of several LANs. Metropolitan Area Network (MAN) is basically a version of a LAN that is larger and usually uses the same technology as a LAN. MAN is an option for building computer networks between offices in a city.

MAN is usually able to support data and voice, and can even be connected with cable television networks. MAN only has one or two cables and does not have a switching element, which serves to manage the packet through several cable outputs. The existence of switching elements makes the design simpler.

The IEEE 802-2002 standard describes MAN as:

“MAN is optimized for larger geographic areas of the LAN, starting from several building blocks for the entire city. MAN can also depend on moderate-to-high-speed data communication channels. MAN may be owned and operated by a single organization, but will usually be used by many individuals and organizations. MAN may also be owned and operated as a public utility. They will often provide facilities for internetworking local networks. ”

Author Kenneth C. Laudon and Jane P. Laudon (2001) Management Information Systems: Managing the Digital Firm 10th ed. defines a metropolitan area network as:

“A Metropolitan Area Network (MAN) is a large computer network that covers a metropolitan area or campus. Geographical coverage that falls between WAN and LAN. MAN provides Internet connectivity for LANs in metropolitan areas, and connects them to wider area networks such as the Internet. ”

Also Read Articles That May Be Associated:? Computer Network Topology: Understanding, Types & Strengths

History of the Metropolitan Area Network (MAN)

In the 1940s in America there was a study that wanted to use a computer device together. In the 1950s when the type of computer began to grow until the creation of a super computer, because of the high price of computer equipment, there was a demand that a computer must serve several terminals.

From this, the concept of time-based process distribution emerged, known as the TSS (Time Sharing System), the first form of computer networking applied. In TSS systems several terminals are connected in series to a host computer.

Furthermore, this concept developed into a distribution process (Distributed Processing). In this process several host computers do a big job in parallel to serve several terminals that are connected in series in each host computer.
When the prices of small computers have begun to decline and the concept of the distribution process has matured, the use of computers and networks has begun to vary from beginning to handle shared processes and communication between computers (Peer to Peer System) alone without going through the central computer. For this reason, network technology such as LAN, MAN and WAN began to develop
Metropolitan Area Network (MAN) Implementation
Some of the technologies used for this purpose are Asynchronous Transfer Mode (ATM), FDDI, and SMDS. This technology is in the process of being replaced by Ethernet-based connections (for example, Metro Ethernet) in most areas. MAN connections between local area networks have been built without cables using either a microwave, radio, or infra-red laser link. Most companies rent or lease circuits from general operators due to the fact that laying long cables that stretch is expensive.

DQDB, Distributed-queue dual bus, is a standard metropolitan area network for data communication. This is specified in the IEEE 802.6 standard. Using DQDB, the network can be up to 20 miles (30 km) and operate at speeds of 34-155 Mbit / s.

Some well-known networks started as MANs, such as MAE-West, MAE-East Internet peering points, and Sohonet network media.

Also Read Articles That May Be Associated: Understanding Computer Networks And Their Functions And Kinds

Strengths and Weaknesses of MAN NetworksAdvantages of MAN Networks
Data and information exchange can be faster and more accurate.
Development in the area of??science for a college or schools.
Communication between colleges or schools or employees in an office can be by e-mail or chat.
The process of data backup from various places is easier and faster.
Can create a means of discussion for colleges or schools.
Can be used as a tool to unite the solidarity of employees or students and students.
Can be used as a means of promotion that is appropriate and fast.
Can use application programs or games together.
The coverage of the network area is wider than the LAN network
Lack of MAN Network
Relatively large operational costs
The maintenance costs are fairly expensive
Crackers often target for personal gain
To repair a MAN network requires quite a long time
MAN Network Losses
High operational costs.
Installing the infrastructure is not easy.
Complicated if there is network trouble (network trouble shooting).
To repair a MAN network requires quite a long time.
Can be the target of operations by Crackers for personal gain
Function and Purpose of MAN
Building & implementing a network system that collaborates between servers to meet the internal needs of companies and governments in communicating the network used so that they can carry out activities such as chat, messenger, video and others with local bandwidth.
Types of Computer Networks MAN is commonly used to connect computer networks from one city to another. To be able to create a MAN network, telecommunications operators are usually required to connect between computer networks
The MAN Computer Network includes the wider network coverage area so that communication becomes more efficient, makes it easier to do business, and also security in the network becomes better
Able to support text and voice data, and can even be associated with cable television networks or radio waves
To connect computer networks from one city to anoth
Technology That Used MAN
Asynchronous Transfer Mode (ATM)
An international standard for cell relays where multiple types of service (such as digital voice / video, or data) are delivered in fixed length (53-byte) cells. Fixed-length cells allow cell processes to take place in hardware, thereby reducing ATM delays designed for high-speed media transmissions such as E3, SONET, and T3. ATM differs in a number of ways from other more common data link technologies such as Ethernet.

Fiber Distributed Data Interface (FDDI)
Is a protocol that uses a double optical fiber loop topology called the primary circle and secondary circle. Both of these circles can be used for data transmission but only the primary circle is usually used as the main network. The secondary circle only works if the primary circle is damaged.

Switched Multi-megabit Data Service (SMDS)
Is a connectionless service used to connect LANs, MANs and WANs for data exchange. In the early 1990s, in Europe this service was known as Broadband Connectionless Broadband Data Service (CBDS). The purpose of connectionless is that there is no need to manage connections over the network before sending data.

Characteristics of MAN
Covers an area of??between 5 and 50 km range. Many MANs cover urban areas.
A MAN (like WAN) is generally not owned by one organization. MAN, its communication links and equipment, are generally owned by either a consortium of users or by a network service provider that sells services to users.
MAN often acts as a high-speed network to allow sharing of regional resources. It is also often used to provide shared connections to other networks using links to WANs.
MAN is larger and usually uses the same technology as a LAN.
It only has one or two cables and has no switching element, which functions to manage packets through several cable outputs. The existence of switching elements makes the design simpler.

Impact and issues of Physical Security

Introduction
The world of computer is experiencing continued growth and development. However, the faster the world grows, the faster it becomes competitive and vulnerable to malicious attacks. Therefore, every business is now considering information security as one of the priority business components. IT security has become increasingly critical to business strategies and plans over the last decade because of the implementation of Local Area Networks (LANs) and Wide Area Networks (WANs) and the Internet. The above business implementations are at risk of exploitation by unauthorized users. It has become increasingly apparent that physical security is a critical issue since the terror attacks of 9/11. Therefore, it cannot be taken lightly. It holds true for all the organizations however regardless of the size of the organization. Organizations are investing new demands and more money than before to ensure that effective measures get taken in all dimensions of physical security. Physical security should be the first line of defense in protecting computer systems against exploitation. However, the measures can cost a company large amount of money, time, and resources (Fennelly, 2012)

Physical security
Information security should be a critical area of concern and focus regardless of the size of the business. It is important to the business organization such that it can make or destroy a business organization from a competitive perspective. There are various rings of security that a business should consider when determining information security. One of the key rings of security is the physical security. Physical security ring is the least technical method that business should use to inform security exploitation. Studies have shown that intruders require minimal technical knowledge to exploit physical security in any given company. However, physical security is frequently compromised by somebody whose intentions are not malicious. For example, a company’s custodial employee is cleaning the server room of the company. The cleaner unintentionally snags the power cable of the server and unplug it from the wall. A company that has no effective physical security safeguards in place could suffer drastically from the incidence if the server shuts down. The server could malfunction when rebooted. The incidence could impact the production negatively due to downtime.

Physical security has four rings just as the information technology security has rings. The four rings are (Baker & Benny, 2012).

Areas around the organization building
The immediate area around the organization environment
Internal environment of the organization building
Human Factor
Organizations should research thoroughly, address and implement when they are incorporating information security model in the organization.

Organizations should first secure the computer hardware when strategizing on IT business security. All other security measures should build on the physical security. A company may use millions of dollars when implementing the most sophisticated IT security technologies on their servers. However, if the servers have a weak physical security, it may be an expensive undertaking. Intruders will have easy access to the servers and can damage them either maliciously or unintentionally. An organization may use thousand dollars by the installation of firewalls, virus software, and data encryption to secure the servers. However, if the organization had a shallow thought about the implementation of the physical security, anyone could access the server room easily. It gives them the luxury of exploiting the installed security controls on the servers thereby obtaining the confidential information. Additionally, the situation could lead to physical theft of the servers.

Physical security and environmental factors
Implementation of physical security model should consider environmental factors and environmental security controls. Environmental factors come into the third ring of physical security. Studies have shown that environmental hazards pose a significant security threat to an organization’s revenues. Common environmental factors include floods, fire, moisture, temperature, and electricity. All the factors could affect the IT computer components negatively. Availability and continuity of computer systems should be a key issue that organizations should consider in environmental protection. Redundancy in the availability of power is a requirement in computer systems. In case electrical power to the systems fails, there should be a ready power backup device to take up and keep the systems running. An organization can either have a UPS or generator (Baker & Benny, 2012).

Fire hazards should also get planned in protection against breach of physical security. An organization could invest in smoke alarms, heat sensors, fire extinguishers, and sprinkler systems to address the issue. The devices could go a long way in protecting the organization against substantial damage to their systems. Temperature regulation is also critical to preventing losses from the environment. All computers should get stored in a dedicated computer room due to the fluctuation of temperatures. The room temperatures should get set to the suitable temperatures and humidity. Additionally, water could also damage to computer systems. Water could come from leakages or internal sprinkler systems. The rooms need water detector equipment and readily available water-proof covers in case of a water hazard incident (Baker & Benny, 2012).

Physical security and human factors
Human-related issues are one of the factors for computer system exploitation. Statistics has shown that most of computer system exploitations originate from within an organization regardless of whether it is intentional or unintentional. An organization should incorporate a perimeter wall to deter unauthorized access to their premises through surveillance cameras, fences, and utilizing security personnel. The mechanisms could get used to securing the immediate areas around the organization. Additionally, employees should receive training on the areas security awareness. Such training will enable the employees to report suspicious acts happening on the premises or the premises. Other methods that will secure the internal environment include using the door locks, implementation of access codes in critical areas, motion detectors, magnetic card swipes, and biological recognition (Roper, 1997).

Installation of complex authorization methods may not be enough. The organization should consider other ways that unauthorized users may access the premises such as social engineering, windows, and air ducts. Access through such methods does not require detection, authorization, or prevention. The methods should get researched depending on the need of an organization and the availability of funds. Access from authorized internal users can get prevented by incorporation of the above discussed environmental precautions (Roper, 1997).

Conclusion
IT departments add tremendous value to the organization when they support the physical security of the systems. An organization could find itself spending thousands of dollars on anti-virus, firewalls, and other intrusion prevention systems if its physical security is shambolic. An ineffective physical security will only see the organization’s confidential data stolen even if it may use all the resources in implementing other measures that are secondary to data and information protection