Csc 407 Net-centric Computing.
Csc 407 Net-centric Computing.
Introduction
A distributed system is a system whose components are located on different networked computers, which
communicate and coordinate their actions by passing messages to one another from any system in order to
appear as a single system to the end-user. The computers that are in a distributed system can be physically
together and connected by a local network, or they can be geographically distant and connected by a wide
area network. A distributed system can consist of any number of possible components, such as mainframes,
personal computers, workstations, minicomputers, and so on. Common use cases of a distributed systems
are electronic banking systems, massive multiplayer online games, and sensor networks.
1. Functionality
There are two general ways that distributed systems function:
a. Each component of the system works to achieve a common goal and the end- user views result asone
combined unit.
b. Each component has its own end-user and the distributed system facilitates sharing resources or
communication services.
1.2 Architectural models
Distributed systems generally consist of four different basic architectural models
i. Client-server — Clients contact the server for data, then format it and display it to the
end-user.
ii. Three-tier — Information about the client is stored in a middle tier rather than on the
client, to simplify application deployment.
iii. n-tier — Generally used when the server needs to forward requests to additional
enterprise services on the network.
iv. Peer-to-peer — There are no additional nodes used to provide services or manage
resources. Responsibilities are uniformly distributed among components in the system,
known as peers, which can serve as either client or server.
1. Distributed computing
Distributed Computing is a much broader technology that has been around for more than
three decades now. Distributed computing is computing over distributed autonomous
computers that communicate only over a network. Distributed computing system are
usually treated differently from parallel computing systems or shared memory, where
multiple computers share a common memory pool that is used for communication
between the processors. Distributed memory systems use multiple computers to solve a
common problem, with computation distributed among the connected computers (nodes)
and using message- passing to communicate between the nodes.
Example of distributed computing is the grid computing where the nodes may belong to
different administrative domains. Another example is the network-based storage
virtualization solution which used distributed computing between data and metadata
servers
Figure 1: Distributed Computing Systems
1. Distributed computing, however, can include heterogeneous computations where some nodes may perform a lot more
computation, some perform very little computation and a few others may perform specialized functionality (like
processing visual graphics).
One of the main advantages of using distributed computing is that efficient scalable programs can be designed so that
independent processes are scheduled on different nodes and they communicate only occasionally to exchange results –
as opposed to working out of a shared memory with multiple simultaneous accesses to a common memory.
It is obvious that cloud computing is also a specialized form of distributed computing, where distributed Software as a
Service (SaaS) application utilize thin clients (such as browsers) which offload computation to cloud-hosted servers (and
services).
Distributed computing, virtualization, service orientation, and Web 2.0 form the core technologies enabling the
provisioning of cloud services from anywhere on the globe.
Distributed computing is a foundational model for cloud computing because cloud systems are
distributed systems. Besides administrative tasks mostly connected to the accessibility of resources in the cloud, the
extreme dynamism of cloud systems—where new nodes and services are provisioned on demand—constitutes the major
challenge for engineers and developers.
2. Web 2.0 technologies
Web 2.0 technologies constitute the interface through which cloud computing services ices
are delivered, managed, and provisioned. Besides the interaction with rich interfaces through
the Web browser, Web services have become the primary access point to cloud computing
systems from a programmatic standpoint.
3. Service Orientations
Service orientation is the underlying paradigm that defines the architecture of a cloud computing system.
Cloud computing is often summarized with the acronym XaaS meaning, Everything-as-a-Service—that clearly
underlines the central role of service orientation Infrastructure-as-a-Service solutions provide the capabilities
to add and remove resources, but it is up to those who deploy systems on this scalable infrastructure to make
use of such opportunities with wisdom and effectiveness.
Platform-as-a-Service solutions embed into their core offering algorithms and rules that
control the provisioning process and the lease of resources. These can be either completely
transparent to developers or subject to fine control. Integration between cloud resources and
existing system deployment is another element of concern.
Mobile & Wireless Computing
1. Mobile Computing
Mobile Computing is a technology that allows transmission of data, voice and video via a
computer or any other wireless enabled device without having to be connected to a fixed physical
link
Mobile computing involves human–computer interaction by which a computer is expected to be
transported during normal usage
The mobile communication refers to the infrastructure put in place to ensure that seamless and
reliable communication goes on
• These would include devices such as protocols, services, bandwidth, and portals
necessary to facilitate and support the stated services
• The data format is also defined at this stage
• This ensures that there is no collision with other existing systems which offer the same
service.
• the media is unguided/unbounded, the overlaying infrastructure is basically radio
wave-oriented
That is, the signals are carried over the air to intended devices that are capable of
receiving and sending similar kinds of signals.
3. Mobile hardware
• mobile devices or device components that receive or access the service of mobility
• They would range from portable laptops, smartphones, tablet Pc's, Personal Digital Assistants
5. Mobile Classification
• Mobile computing is not only limited to mobile phones, but there are various gadgets available
in the market that are built on a platform to support mobile computing
• They are usually classified in the following categories:
Personal Digital Assistant (PDA)
• The main purpose of this device is to act as an electronic organizer or day
planner that is portable, easy to use and capable of sharing information with your
computer systems.
• PDA is an extension of the PC, not a replacement
• These systems are capable of sharing information with a computer system
through a process or service known as synchronization
• Both devices will access each other to check for changes or updates in the
individual devices
•The use of infrared and Bluetooth connections enables these devices to always be
synchronized.
• With PDA devices, a user can browse the internet, listen to audio clips,
watch video clips, edit and modify office documents, and many more
services
• The device has a stylus and a touch sensitive screen for input and output
purposes
Figure 5: Personal Data Assistant
Smartphones
It combines the features of a PDA with that of a mobile phone or camera phone
It has a superior edge over other kinds of mobile phones.
Smartphones have the capability to run multiple programs concurrently
These phones include high-resolution touch screens, web browsers that can:
access and properly display standard web pages rather than just mobile-
optimized sites
high-speed data access via Wi-Fi and high speed cellular broadband.
The most common mobile Operating Systems (OS) used by modern
smartphones include:
a.Google's Android
b.Apple's iOS
c.Nokia's Symbian
d.RIM's BlackBerry OS
e.Samsung's Bada
f. Microsoft's Windows Phone, and embedded Linux distributions such as Maemo and
MeeGo. Such operating systems can be installed on different phone models, and typically
each device can receive multiple OS software updates over its lifetime.
• WiMAX
• WiMAX (Worldwide Interoperability for Microwave Access) is a wireless communications
standard designed to provide 30 to 40 megabit-per-second data rates, with the latest update
providing up to 1 Gbit/s for fixed stations
• It is a part of a fourth generation or 4G wireless-communication technology
• WiMAX far surpasses the 30-metre wireless range of a conventional Wi-Fi Local Area
Network (LAN), offering a metropolitan area network with a signal radius of about 50 km
• WiMAX offers data transfer rates that can be superior to conventional cable- modem and DSL
connections, however, the bandwidth must be shared among multiple users and thus yields
lower speed in practice
• Near Field Communication
• Near Field Communication (NFC) is a set of standards for smartphones and similar devices
to establish radio communication with each other by touching them together or bringing
them into close proximity, usually no more than a few centimeters
• Present and anticipated applications include contactless transactions, data exchange, and
simplified setup of more complex communications such as Wi- Fi. Communication is also
possible between an NFC device and an unpowered NFC chip, called a "tag"
Network Security
1.0 Introduction
The transmission of data from one point, A on the network to the other point, B is a great
concern and therefore, there is the need to deploy measure that can secure the transmission
of data away from unauthorized individuals. Hence, the need for network security
Companies that fall prey to cyberattacks often find themselves crippled from the inside out, unable to deliver services or
effectively address customer needs. Similarly, networks play a major role in internal company processes, and when they
come under attack, those processes may grind to a halt, further hampering an organization’s ability to conduct business
or even resume standard operations. But perhaps even more damaging is the detrimental effect that a network breach
can have on your business’s reputation.
Given the rising tide of identity theft and other dangers related to the theft of personal information,
many customers are already hesitant when it comes to sharing data with businesses. And if a cyberattack
should occur, many of these customers are likely to withdraw in favor of more secure alternatives. The
loss or corruption of valuable data, along with a significant disruption to customer services and internal
process, topped off with reputational injury that may persist long after other damages have been repaired
— it’s not hard to see what’s at stake when it comes to network security. In fact, it’s been suggested that
66 percent of SMBs would have to shut down (either temporarily or permanently) after experiencing a
data breach. And even larger, more established businesses may be unable to reclaim their former
standing.
On the other hand, reliable tools in network security software and hardware, coupled with the right
policies and strategies, can help ensure that when cyberattacks occur, their impact will be minimal your
network security by limiting user access and resources to only the parts of the network that directly
apply to individual users’ responsibilities.
2.Anti-malware software
Malware, in the form of viruses, trojans, worms, keyloggers, spyware, etc. are designed to
spread through computer systems and infect networks. Anti-malware tools are a kind of
network security software designed to identify dangerous programs and prevent them
from spreading. Anti-malware and antivirus software may also be able to help resolve
malware infections, minimizing the damage to the network.
3.Anomaly detection
It can be difficult to identify anomalies in your network without a baseline understanding
of how that network should be operating. Network anomaly detection engines (ADE)
allow you to analyze your network, so that when breaches occur, you’ll be alerted to them
quickly enough to be able to respond.
4. Application security
For many attackers, applications are a defensive vulnerability that can be exploited. Application
security helps establish security parameters for any applications that may be
relevant to your network security.
5. Data loss prevention (DLP)
Often, the weakest link in network security is the human element. DLP technologies and
policies help protect staff and other users from misusing and possibly compromising
sensitive data or allowing said data out of the network.
6. Email security
As with DLP, email security is focused on shoring up human-related security weaknesses. Via
phishing strategies (which are often very complex and convincing), attackers persuade email
recipients to share sensitive information via desktop or mobile device, or
inadvertently download malware into the targeted network. Email security helps identify
dangerous emails and can also be used to block attacks and prevent the sharing of vital
data.
7.Endpoint security
The business world is becoming increasingly bring your own device (BYOD), to the
point where the distinction between personal and business computer devices is almost
non-existent. Unfortunately, sometimes the personal devices become targets when users
rely on them to access business networks. Endpoint security adds a layer of defense
between remote devices and business networks
8. Firewalls
Firewalls function much like gates that can be used to secure the borders between your network and
the internet. Firewalls are used to manage network traffic, allowing authorized traffic through while
blocking access to non-authorized traffic.
9. Intrusion prevention systems
Intrusion prevention systems (also called intrusion detection) constantly scan and analyze
network traffic/packets, so that different types of attacks can be identified and responded to quickly.
These systems often keep a database of known attack methods, so as to be able to recognize threats
immediately.
10.Network segmentation
There are many kinds of network traffic, each associated with different security risks. Network
segmentation allows you to grant the right access to the right traffic, while
restricting traffic from suspicious sources.
11.Security information and event management (SIEM)
Sometimes simply pulling together the right information from so many different tools and resources
can be prohibitively difficult — particularly when time is an issue. SIEM tools
and software give responders the data they need to act quickly.
12.Virtual private network (VPN)
VPN tools are used to authenticate communication between secure networks and an
endpoint device. Remote-access VPNs generally use IPsec or Secure Sockets Layer (SSL)
for authentication, creating an encrypted line to block other parties from eavesdropping.
13.Web security
Including tools, hardware, policies and more, web security is a blanket term to describe the
network security measures businesses take to ensure safe web use when connected to an
internal network. This helps prevent web-based threats from using browsers as access
points to get into the network.
14.Wireless security
Generally speaking, wireless networks are less secure than traditional networks. Thus,
strict wireless security measures are necessary to ensure that threat actors aren’t gaining
access.