0% found this document useful (0 votes)
3 views

net-centric

Net-Centric Computing (NCC) is a distributed computing environment that facilitates the exchange of applications and data across networks, emphasizing collaboration and open standards. It encompasses various subject areas, including web applications, which involve client-server interactions and require both front-end and back-end development. Additionally, computing processes are integral to modern applications such as e-commerce, banking, and smart home technologies, utilizing various protocols like HTTPS, TCP, and IP for secure and efficient data transfer.

Uploaded by

Paulinus Onovo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

net-centric

Net-Centric Computing (NCC) is a distributed computing environment that facilitates the exchange of applications and data across networks, emphasizing collaboration and open standards. It encompasses various subject areas, including web applications, which involve client-server interactions and require both front-end and back-end development. Additionally, computing processes are integral to modern applications such as e-commerce, banking, and smart home technologies, utilizing various protocols like HTTPS, TCP, and IP for secure and efficient data transfer.

Uploaded by

Paulinus Onovo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

What is Net-Centric Computing?

Net-Centric Computing (NCC) is a distributed environment where applications and data are
downloaded from servers and exchanged with peers across a network. Net-centric Computing
focuses on large-scale distributed computing systems and applications that communicate
through open, wide-area networks like the Internet. General examples of large-scale network-
centric systems are the World-Wide Web and Computational Grids. For several years, major
changes are being brought to the world by universal networking capabilities, such as the
Internet. Today’s technology solutions represent the convergence of computing power,
networking capability and the information, data or knowledge that forms the content of these
solutions. At the center these solutions net-centric computing lies. Net-centric computing refers
to an emerging technology architecture and an evolutionary stage of client/server computing. It
is a common architecture built on open standards that supports in different ways for different
people to collaborate and to reach different information sources. The evolutionary nature of
net-centric computing links technological capabilities and strategic opportunities, helping
people in facing today’s new problems and providing the flexibility to meet tomorrow’s
challenges.

What are the subject areas one should specialize in Net-Centric Computing?
Just as other technologies used in the modern world, Net-centric computing also covers a great
amount of subject areas related to it. The knowledge on these areas, make you a good candidate
for the job market as well as a knowledgeable person compatible with present-day. There is a
wide array of subject areas, the most important of which are;

Web Applications
· Introduction
A web application (or web app) is an application software that runs on a web server. Web
applications are accessed by the user through a web browser with an active network
connection. Some examples of commonly-used web applications can be stated as web-mail,
online retail sales, online banking, and online auctions. Web applications can be designed for a
wide variety of users and can be used by anyone for numerous reasons.
· Functionality
For proper functioning a web application requires three elements; a web server to handle
requests from the client, an application server to execute the tasks requested by the user and a
database to store information. Typical web application flow can be described in five steps;
1. User presents a request to the web server over the Internet, through a web browser or the
application’s user interface.
2. Web server sends this request to the appropriate web application server.
3. Web application server performs the requested task and then generates the results of the
requested data.
4. Web application server sends results to the web server with the requested information or
processed data.
5. Web server responds to the client with the requested information that then appears on the
user’s display.
· Development
Development of a web application has two phases as front-end and back-end development.
Front-end development is the client-side development and scripting languages like JavaScript,
HTML5, or Cascading Style Sheets (CSS) are commonly used for the process. Back-end
development is the server-side development, languages such as Python, Java, and Ruby are
commonly used in server-side programming. Some of the web applications are dynamic,
requiring server-side processing while others are completely static with no processing required
at the server.
· Design
Web application design is an important stage in building a web application. It focuses on the
appearance and feel of the web application to the user. This stage encompasses several
different aspects, including user interface design (UI), usability design(UX), content
production, and graphic design. UI stands for User Interface. UI is the part of the web
application with which a user interacts. Simply, it’s everything you see and touch, such as
buttons, colors, fonts, navigation, etc. UX stands for User Experience. UX focuses on users’
experience and feeling towards their journey through the web app. Was the web application
hard to use, was it slow, was the user disappointed when using it? are the criteria mainly
considered by a UX designer.
What is Computing?
Computing is the process of using computers and technology to process, store, retrieve, and
manipulate data. It involves various activities such as programming, data management,
networking, artificial intelligence, and more. Computing enables automation, problem-solving,
and communication across different fields like business, healthcare, education, and
entertainment.

Real-World Example of Computing


1. Online Shopping (E-commerce)
• Scenario: When you visit an e-commerce website like Amazon or Jumia, you search
for a product, add it to your cart, and place an order.
• Computing in Action:
o Search Algorithm: The website uses computing to quickly search and display
products based on your query.
o Database Management: Your shopping cart and order details are stored in a
database.
o Secure Transactions: Computing ensures secure online payments through
encryption and authentication.

2. Banking and ATM Transactions


• Scenario: When you withdraw money from an ATM or check your account balance
online.
• Computing in Action:
o Networking: The ATM connects to the bank's servers to retrieve your account
information.
o Data Processing: The system verifies your PIN and processes transactions in real
time.
o Cybersecurity: Banking systems use computing to protect user data from fraud
and hacking.
4. Smart Homes and IoT (Internet of Things)
• Scenario: Controlling home appliances using a smartphone.
• Computing in Action:
o Automation: Smart devices like thermostats and lights respond to voice
commands or schedules.
o Cloud Computing: Data is stored and processed on cloud servers.
o Machine Learning: AI assistants like Alexa and Google Assistant learn user
preferences to improve automation

Servers and protocols


https,tcp,ip,ftp,udp, tcp/ip. Meaning, function, and example in real world scenario, when to use
all this protocols
1. HTTPS (HyperText Transfer Protocol Secure)

Meaning:
HTTPS is a secure version of HTTP that encrypts data transferred between a web browser and
a website using SSL/TLS encryption.

Function:
• Ensures secure communication by encrypting data to protect against cyber threats.
• Prevents man-in-the-middle attacks and eavesdropping.
• Used for secure transactions and sensitive information transfer.

Example (Real-World Scenario):


• Online banking, e-commerce sites (Amazon, Jumia), and login pages.
• Any website where security and privacy are crucial (Google, Facebook, etc.).

When to Use:
• When transmitting sensitive information (passwords, credit card details).
• If you need to protect user privacy and prevent data interception.

2. TCP (Transmission Control Protocol)

Meaning:
TCP is a connection-oriented protocol that ensures reliable data transfer by establishing a
connection before transmitting data.

Function:
• Ensures data integrity by verifying that all packets are received correctly.
• Resends lost packets and maintains order.
• Used for reliable communication between devices.

Example (Real-World Scenario):


• Web browsing (HTTPS, HTTP).
• Sending emails (SMTP, IMAP, POP3).
• Downloading large files where complete and ordered data is important.
When to Use:
• When accuracy is more important than speed (e.g., emails, file transfers).
• In applications where missing or corrupted data is unacceptable (banking, messaging
apps).

3. IP (Internet Protocol)

Meaning:
IP is responsible for addressing and routing data packets across networks.

Function:
• Assigns a unique address (IP address) to each device on a network.
• Ensures data reaches the correct destination.
• Works alongside TCP or UDP for communication.

Example (Real-World Scenario):


• Every website you visit has an IP address (e.g., Google’s IP is 142.250.190.46).
• Connecting to Wi-Fi assigns you a dynamic or static IP address.

When to Use:
• Any network-based communication relies on IP addresses.
• Used in both private (LAN) and public (Internet) networks.

4. FTP (File Transfer Protocol)

Meaning:
FTP is a protocol used for transferring files between a client and a server over a network.

Function:
• Allows uploading, downloading, and managing files on a remote server.
• Can use anonymous login or require authentication.
• Uses FTP clients like FileZilla or Cyberduck.

Example (Real-World Scenario):


• Web developers use FTP to upload website files to a server.
• Organizations use FTP to share large files securely.

When to Use:
• When transferring large files between servers and clients.
• When managing website content (web hosting services).
• Not recommended for sensitive data (use SFTP instead).

5. UDP (User Datagram Protocol)

Meaning:
UDP is a connectionless protocol that sends data faster but without error checking or re-
transmission.
Function:
• Sends data without establishing a connection.
• Doesn’t guarantee delivery, order, or error checking.
• Used for real-time applications where speed is more important than reliability.

Example (Real-World Scenario):


• Live video streaming (YouTube, Netflix, Twitch).
• Online gaming (Fortnite, Call of Duty).
• VoIP calls (Skype, Zoom, WhatsApp calls).

When to Use:
• When speed is more important than accuracy (real-time streaming, gaming).
• In applications that tolerate data loss but require low latency (video calls).

6. TCP/IP (Transmission Control Protocol/Internet Protocol)

Meaning:
TCP/IP is the fundamental protocol suite that enables communication over the Internet by
combining TCP and IP.

Function:
• IP handles addressing and ensures data is sent to the correct destination.
• TCP ensures reliable delivery by breaking data into packets and reassembling them
correctly.

Example (Real-World Scenario):


• Every time you browse the internet, TCP/IP enables your connection.
• Email, video calls, and web browsing all rely on TCP/IP.

When to Use:
• Always! TCP/IP is the backbone of the Internet and networking.
• Any communication between computers and devices uses TCP/IP.

DHCP (Dynamic Host Configuration Protocol)

Meaning:

DHCP is a network protocol that automatically assigns IP addresses to devices on a


network. It eliminates the need for manual IP configuration, making network management
easier.

Function:

• Automatically assigns IP addresses to devices when they connect to a network.


• Provides additional network information such as subnet mask, gateway, and DNS
servers.
• Prevents IP conflicts by ensuring each device gets a unique IP address.
Example (Real-World Scenario)

Wi-Fi Network in a Coffee Shop:

• When you connect your laptop or phone to a Wi-Fi network at a coffee shop, you don’t
need to manually configure an IP address.
• The DHCP server in the router assigns your device an IP address automatically.
• You can browse the internet without worrying about network settings.

When to Use DHCP?

✔ Large networks (offices, schools, public Wi-Fi) to manage multiple devices


automatically.
✔ Home Wi-Fi routers to assign IPs to connected devices (phones, laptops, smart TVs).
✔ Temporary networks (hotels, conferences, airports) where devices connect and
disconnect frequently.

You might also like