Documente Academic
Documente Profesional
Documente Cultură
UNIT-V
Emerging Computer Technologies & Wireless Networks
----------------------------------------------------------------------------------------------
Distributed Networking
Distributed indicates that the computing resources are spread over more than one computer.This is
usually implemented over a network.Client–server computing is a popular form of distributed
computing. Key terms used in distributed networking are
Distributed Computing: It is a branch of computer science that studies distributed systems and uses
them to solve computational programs. A complex task is divided into many smaller tasks, each of
which is solved by one or more computers that are physically distributed within some geographical area.
Distributed System: It is a system where computers are spread over a network for communication and
coordination with each other. Distributed systems are widely used because of the following reasons:
• It Enables the data produced by one computer to be processed by another computer
• For complex and time-consuming applications, it is always more efficient to execute the
application using a cluster of low-end computers than using a single computer
• Provides More reliability than a non-distributed system
• It is More scalable and manageable
• It Enables an application hosted and executed on one computer to be accessed by several
computers
The Program that runs on a distributed system is called Distributed Program. Process of writing
Distributed Programs is called Distributed Programming.
Parallel Computing is a tightly coupled system in which all processors access a shared memory to
exchange information between them whereas Distributed Computing is a loosely coupled system in
which each processor has its own private memory.
------------------------------------------------------------------------------------------------------------------------------
Peer-to-Peer (P2P) Computing
P2P network is a type of network where each computer has the same capabilities and responsibilities.
This is in contrast to client-server or master-slave architecture where some computers have higher
capabilities (called server) than others (clients). P2P networks are simple but give low performance
under heavy loads.
In P2P network, either party can initiate communication. These networks are widely used on the Internet
to share files, printers, and other devices among different users.
To exchange files, users must first download P2P networking program. Then they must enter the address
of the computer to which they want to connect. Once the connection is established, files can be
exchanged between two computers. P2P networks handle the traffic by distributing the load across many
computers.
As resources are distributed across P2P networks, this system provides
➔ Higher storage and access capacity
➔ Improved Reliability
➔ Improved Security
B. Degree of Structure
• Unstructured: Nodes and data are positioned in an ad hoc manner in the network without
certain rules
• Structured: Nodes and data are placed in a structured way to enable the peer computers to
efficiently locate data
• Centralized unstructured: A central server maintains an index of the resources available in the
network. If the server fails, whole system will stop functioning
• Pure decentralized unstructured: No central server and all nodes are directly connected to one
another
• Hybrid unstructured: Maintains computers in a hierarchy. Supernodes form the highest level
in hierarchy
• Pure decentralized structured: Maintains resources in a structured way to allow efficient
retrieval
• May degenerate to a client–server network when significant network traffic is routed to a smaller
number of hosts for a scarcer content
• Usually implemented using low-cost hardware. This may lead to system failures
------------------------------------------------------------------------------------------------------------------------------
Grid Computing
● A new technology that coordinates the use of computer resources such as processor capacity,
sensors, software, storage capacity, and data.
● Million computers of different types (laptops desktops, supercomputers, and mobile phones)
from all over the world are connected together to form a single huge super-powerful computer
which is called the grid.
● Grid Computing supports features such as interoperability, security, quality of service,
standardized infrastructure, fault tolerance, scalability and self-organization.
● Grid Computing enables researchers and scientists all over the world to analyze and store
massive amounts of data.
● The grid will be a global network of computers operating as a vast computational resource.
● A grid computing system can be as simple as a collection of simple computers using the same
operating system or as complex as an nter-networked system in which each computer runs on a
different operating system.
Grid computing can be used for a wide range of applications. For example, a scientist studying proteins
can use it to analyze data; a businessman can use to forecast the future of a particular stock etc.,
Cloud Computing
Cloud: The term Cloud refers to a Network or Internet. Cloud is something, which is present at
remote location. Cloud can provide services over public and private networks, i.e., WAN, LAN or VPN
(Virtual Private Network). Applications such as e-mail, web conferencing, customer relationship
management (CRM) execute on cloud.
Cloud Computing: It refers to manipulating, configuring and accessing the hardware and software
resources remotely. It offers online data storage, infrastructure, and application.
1. On Demand Self Service: User gets on demand self-services. User can get computer services like
email, applications etc. without interacting with each service provider. Some of the cloud service
providers’ are- Amazon Web Service, Microsoft, IBM, Salesforce.com
2. Broad network access: Cloud services are available over the network and can be accessed through
different clients such as mobile, laptops etc.
3. Resource pooling: Same resources can be used by more than one customer at a same time. For
example- storage, network bandwidth can be used by any number of customers and without knowing the
exact location of that resource.
4. Rapid elasticity: Allocation of resources can increase or decrease depending on the user’s demand
5. Measured service: Resources used by the users can be monitored, controlled. This reports is
available for both cloud providers and consumer. On the basis of this measured reports cloud systems
automatically controls and optimizes the resources based on the type of services like Storage,
processing, bandwidth etc.
6. Scalability: The cloud can scale upwards when the user’s demands are high and downwards when
there is little demand.
7. Standardized interfaces: Cloud services support standardized application programming interfaces
(APIs)
8. Billing and service usage metering: Users pay only for the resources they had actually used
9. Self-healing: Maintain backup of data and applications
10. Multi-tenancy: Allows several users to share resources without compromising the privacy and
security
11. Virtualized: Multiple applications can run on one computer or multiple computers can be used to
run one application
Platform-as-a-Service (PaaS): This model provides development platform and tools on its own
infrastructure and makes them available to customers over the internet.
Characteristics of PaaS service model:
● PaaS offers browser based development environment. It allows the developer to create database
and edit the application code either via Application Programming Interface or point-and-click
tools.
● PaaS provides built-in security, scalability, and web service interfaces.
● PaaS also provides web services interfaces that allow us to connect the applications outside the
platform.
Software-as–a-Service (SaaS): This model allows providing software application as a service to the
end users. It refers to software that is deployed on a host service and is accessible via Internet.
Characteristics of SaaS service model:
● SaaS makes the software available over the Internet.
● The software applications are maintained by the vendor.
● The license to the software may be subscription based or usage based. And it is billed on
recurring basis.
● SaaS applications are cost-effective since they do not require any maintenance at end user side.
● They are available on demand.
● They can be scaled up or down on demand.
● They are automatically upgraded and updated.
● SaaS offers shared data model. Therefore, multiple users can share single instance of
infrastructure.
Department of CSE |$@M€€N@
Fundamentals of Computer Science (ES1112) R19
The cloud technology architecture consists of front-end platforms called the cloud client which
comprises servers, thin & fat client, tablets & mobile devices. While back end refers to the cloud itself, it
comprises of the resources that are required for cloud computing services. It consists of virtual
machines, servers, data storage, security mechanism etc. It is under provider control. The interaction is
done through middleware or via web-browser. According to Jason Bloomberg, the cloud-oriented
architecture can essentially be the building block of IoT (Internet of Things) in which anything can be
connected to the internet. It is the responsibility of the back-end to provide the security of data for cloud
users along with the traffic control mechanism.
Cloud Computing systems require at least twice the number of storage devices it actually needs to
satisfy users. They store a backup of users’ data (redundant data) so that even if one or more devices
fail, the system can continue to satisfy users with its backup copy.
The cloud architecture is a combination of both services oriented architecture & event-driven
architecture. Unlike subscription-based models of pricing, payment structure of the cloud enables the
user to subscribe to vendor services & cloud infrastructures and pay on a 'pay-per-use' basis.
Wireless Networks
Introduction
• A computer network that uses radio waves to connect computing devices. It is a cost-effective
means to access the internet. When we access the internet at either hotels, airports, or other
public places, we are doing it through wireless networks.
• Enables users to conveniently access network resources from any location within its coverage
area.
• Users are no longer tied to the desk as in the case of a wired connection.
• Helps users to be more productive as they can work as per their convenience.
• Can be easily installed. They are also inexpensive as no wires are used.
• Wireless networks are more scalable, so new devices can be easily added with the existing
equipment. No additional wiring is required.
• Allows multiple devices to simultaneously use the same wireless connection.
Wireless links can be provided through the following techniques:
1. Terrestrial microwave:
2. Communication satellites
3. Radio technologies and
4. Optical Communication
Properties of each of the wireless technologies includes Performance, Space and Shared Resources.
At the receiver’s site, the same set of process takes place but in reverse. The router receives the data
from the Internet via a wired connection. It translates the data into radio signals and transmits it to the
computer’s wireless adapter.
A wireless network is often referred to as WiFi, and an area with an accessible wireless network is
called a WiFi hotspot
address.
• Configure router to block requests from remote users, restrict the number of devices that can be
connected to the router, and disable remote administration so that network settings are changed
only by computers that are directly plugged into the router.
Bluetooth
Introduction
A wireless technology for exchanging data by using low-power radio communications. It is used to link
phones, PDAs, wireless headsets, computers, and other devices over short distances, typically up to 30
feet (10m). Bluetooth operates in the 2.4 GHz of frequency range and allows devices to communicate at
less than 1 Mbps. Bluetooth networking is slower but also limited in range and supports fewer devices.
Bluetooth is commonly used in following applications:
• Used for transferring data and files between devices.
• Used for controlling hands-free headset from a mobile phone.
• Used to control a bluetooth compatible car stereo systems from a mobile phone.
• Used for enabling wireless communication between computers i/o devices.
• Used in the controls of and communication between devices where infrared is used.
• Used for advertising products by using Bluetooth enabled hoardings to send advertisements to
other discoverable Bluetooth devices
• Used for transmitting health sensor data from medical devices to mobile phones.
• Used for tracking and identifying the location of objects in Real time location systems (RTLS).
Bluetooth Piconets
• Bluetooth networks support a dynamic topology called a piconet or PAN which may include two
to eight peer devices that can communicate using protocols
• For example, a smart home may have a stereo, DVD player, television, cordless phone, and
desktop computer. Each of these Bluetooth enabled devices forms its own piconet to
communicate with the main unit and peripherals
• Each piconet contains a single master device and up to seven slave devices
• The master device initiates transmissions, whereas the slave devices are responsible for
responding to the master.
• When two or more piconets overlap with each other, they form a scatternet.
• A Bluetooth device can participate in more than one piconet at the same time. However, at a
particular point of time, it can be active only in one of piconets.
Bluetooth Security
In any wireless network, security is a matter of prime concern. Therefore, devices sending sensitive
information over a wireless connection must take some precautions to ensure that their signals are not
intercepted by malicious user’s device. Let us consider a common problem that can threaten the security
of data exchanged between two devices:
• An unknown person may send an infected file (virus) to the user’s mobile phone.
• Bluejacking is a security threat in which an unknown user sends a business card to other users.
• Bluebugging a llows hackers to illegally and remotely access a user’s phone to use its features
such as placing calls and sending text messages. The users are unaware of their phone being used
by another person.
• Car Whisperer is a software tool that hackers use to send and receive audio from a
Bluetooth-enabled car stereo.
Bluetooth offers several security modes which include the following:
• Users must maintain a list of trusted devices
• When an unknown bluetooth device tries to connect with the user’s device, the user has to decide
whether to permit connection with that device or ot.
• Bluetooth provides authorization and identification procedures to limit the use of Bluetooth
services to the registered user. It empowers users to decide whether to open a file or accept a data
transfer or not.
• ode so that other devices cannot find it
A user can set his/her device to the non-discoverable m
and thus cannot connect with it.