0% found this document useful (0 votes)
3 views

Csc 407 Net-centric Computing.

Net-Centric Computing (NCC) is a crucial technology for modern distributed systems, enabling applications and data exchange over networks like the Internet. It encompasses various architectural models, including client-server and peer-to-peer systems, facilitating collaboration and resource sharing. Mobile computing, a subset of distributed computing, allows for data transmission via wireless devices, enhancing flexibility and productivity while also presenting security challenges.

Uploaded by

rshzgdfwv7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Csc 407 Net-centric Computing.

Net-Centric Computing (NCC) is a crucial technology for modern distributed systems, enabling applications and data exchange over networks like the Internet. It encompasses various architectural models, including client-server and peer-to-peer systems, facilitating collaboration and resource sharing. Mobile computing, a subset of distributed computing, allows for data transmission via wireless devices, enhancing flexibility and productivity while also presenting security challenges.

Uploaded by

rshzgdfwv7
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 35

CSC 407 Net-Centric Computing Fundamentals

Net-Centric Computing Fundamentals


Introduction
Net-Centric or network centered computing is an ongoing area in the twenty-first century with a
great interest among software engineers as it is an enabling technology for modern distributed
computing systems and applications. Today, Net-Centric applications have invaded the lives of
people in many ways. Net-Centric Computing (NCC) is a distributed environment where
applications and data are downloaded from servers and exchanged with peers across a network.
Net-centric Computing focuses on large-scale distributed computing systems and applications that
communicate through open, wide-area networks like the Internet. General examples of large-scale
network-centric systems are the World-Wide Web and Computational Grids. For several years,
major changes are being brought to the world by universal networking capabilities, such as the
Internet. Today’s technology solutions represent the convergence of computing power, networking
capability and the information, data or knowledge that forms the content of these solutions. At the
center these solutions net-centric computing lies.
Net-centric computing refers to an emerging technology architecture and an evolutionary stage of
client/server computing. It is a common architecture built on open standards that supports in
different ways for different people to collaborate and to reach different information sources. The
evolutionary nature of net-centric computing links technological capabilities and strategic
opportunities, helping people in facing today’s new problems and providing the flexibility to meet
tomorrow’s challenges.
Introduction to Distributed Computing

Introduction

A distributed system is a system whose components are located on different networked computers, which
communicate and coordinate their actions by passing messages to one another from any system in order to
appear as a single system to the end-user. The computers that are in a distributed system can be physically
together and connected by a local network, or they can be geographically distant and connected by a wide
area network. A distributed system can consist of any number of possible components, such as mainframes,
personal computers, workstations, minicomputers, and so on. Common use cases of a distributed systems
are electronic banking systems, massive multiplayer online games, and sensor networks.
1. Functionality
There are two general ways that distributed systems function:
a. Each component of the system works to achieve a common goal and the end- user views result asone
combined unit.
b. Each component has its own end-user and the distributed system facilitates sharing resources or
communication services.
1.2 Architectural models
Distributed systems generally consist of four different basic architectural models

i. Client-server — Clients contact the server for data, then format it and display it to the
end-user.
ii. Three-tier — Information about the client is stored in a middle tier rather than on the
client, to simplify application deployment.
iii. n-tier — Generally used when the server needs to forward requests to additional
enterprise services on the network.
iv. Peer-to-peer — There are no additional nodes used to provide services or manage
resources. Responsibilities are uniformly distributed among components in the system,
known as peers, which can serve as either client or server.
1. Distributed computing
Distributed Computing is a much broader technology that has been around for more than
three decades now. Distributed computing is computing over distributed autonomous
computers that communicate only over a network. Distributed computing system are
usually treated differently from parallel computing systems or shared memory, where
multiple computers share a common memory pool that is used for communication
between the processors. Distributed memory systems use multiple computers to solve a
common problem, with computation distributed among the connected computers (nodes)
and using message- passing to communicate between the nodes.
Example of distributed computing is the grid computing where the nodes may belong to
different administrative domains. Another example is the network-based storage
virtualization solution which used distributed computing between data and metadata
servers
Figure 1: Distributed Computing Systems
1. Distributed computing, however, can include heterogeneous computations where some nodes may perform a lot more
computation, some perform very little computation and a few others may perform specialized functionality (like
processing visual graphics).
One of the main advantages of using distributed computing is that efficient scalable programs can be designed so that
independent processes are scheduled on different nodes and they communicate only occasionally to exchange results –
as opposed to working out of a shared memory with multiple simultaneous accesses to a common memory.

It is obvious that cloud computing is also a specialized form of distributed computing, where distributed Software as a
Service (SaaS) application utilize thin clients (such as browsers) which offload computation to cloud-hosted servers (and
services).

Distributed computing, virtualization, service orientation, and Web 2.0 form the core technologies enabling the
provisioning of cloud services from anywhere on the globe.
Distributed computing is a foundational model for cloud computing because cloud systems are
distributed systems. Besides administrative tasks mostly connected to the accessibility of resources in the cloud, the
extreme dynamism of cloud systems—where new nodes and services are provisioned on demand—constitutes the major
challenge for engineers and developers.
2. Web 2.0 technologies
Web 2.0 technologies constitute the interface through which cloud computing services ices
are delivered, managed, and provisioned. Besides the interaction with rich interfaces through
the Web browser, Web services have become the primary access point to cloud computing
systems from a programmatic standpoint.

3. Service Orientations
Service orientation is the underlying paradigm that defines the architecture of a cloud computing system.
Cloud computing is often summarized with the acronym XaaS meaning, Everything-as-a-Service—that clearly
underlines the central role of service orientation Infrastructure-as-a-Service solutions provide the capabilities
to add and remove resources, but it is up to those who deploy systems on this scalable infrastructure to make
use of such opportunities with wisdom and effectiveness.

Platform-as-a-Service solutions embed into their core offering algorithms and rules that
control the provisioning process and the lease of resources. These can be either completely
transparent to developers or subject to fine control. Integration between cloud resources and
existing system deployment is another element of concern.
Mobile & Wireless Computing
1. Mobile Computing
Mobile Computing is a technology that allows transmission of data, voice and video via a
computer or any other wireless enabled device without having to be connected to a fixed physical
link
Mobile computing involves human–computer interaction by which a computer is expected to be
transported during normal usage

Figure 2: Internet with Mobile Devices


2. Mobile communication

The mobile communication refers to the infrastructure put in place to ensure that seamless and
reliable communication goes on
• These would include devices such as protocols, services, bandwidth, and portals
necessary to facilitate and support the stated services
• The data format is also defined at this stage
• This ensures that there is no collision with other existing systems which offer the same
service.
• the media is unguided/unbounded, the overlaying infrastructure is basically radio
wave-oriented
That is, the signals are carried over the air to intended devices that are capable of
receiving and sending similar kinds of signals.
3. Mobile hardware
• mobile devices or device components that receive or access the service of mobility
• They would range from portable laptops, smartphones, tablet Pc's, Personal Digital Assistants

• Its the essential component that operates the mobile device


Figure 4: Mobile Software
• Since portability is the main factor, this type of computing ensures that users are not tied or
pinned to a single physical location, but are able to operate from anywhere. It incorporates all
aspects of wireless communications

5. Mobile Classification
• Mobile computing is not only limited to mobile phones, but there are various gadgets available
in the market that are built on a platform to support mobile computing
• They are usually classified in the following categories:
 Personal Digital Assistant (PDA)
• The main purpose of this device is to act as an electronic organizer or day
planner that is portable, easy to use and capable of sharing information with your
computer systems.
• PDA is an extension of the PC, not a replacement
• These systems are capable of sharing information with a computer system
through a process or service known as synchronization
• Both devices will access each other to check for changes or updates in the
individual devices
•The use of infrared and Bluetooth connections enables these devices to always be
synchronized.
• With PDA devices, a user can browse the internet, listen to audio clips,
watch video clips, edit and modify office documents, and many more
services
• The device has a stylus and a touch sensitive screen for input and output
purposes
Figure 5: Personal Data Assistant
 Smartphones
 It combines the features of a PDA with that of a mobile phone or camera phone
 It has a superior edge over other kinds of mobile phones.
 Smartphones have the capability to run multiple programs concurrently
 These phones include high-resolution touch screens, web browsers that can:
 access and properly display standard web pages rather than just mobile-
optimized sites
 high-speed data access via Wi-Fi and high speed cellular broadband.
 The most common mobile Operating Systems (OS) used by modern
smartphones include:
a.Google's Android
b.Apple's iOS
c.Nokia's Symbian
d.RIM's BlackBerry OS
e.Samsung's Bada
f. Microsoft's Windows Phone, and embedded Linux distributions such as Maemo and
MeeGo. Such operating systems can be installed on different phone models, and typically
each device can receive multiple OS software updates over its lifetime.

Figure 6: Smart Phones


 Tablet PC and iPads
• This mobile device is larger than a mobile phone or a PDA and integrates into a touch
screen and is operated using touch sensitive motions on the screenThey are often controlled
by a pen or by the touch of a finger
• They are usually in slate form and are light in weight. Examples would include ipads, Galaxy
Tabs, Blackberry Playbooks etc.
• They offer the same functionality as portable computers
• They support mobile computing in a far superior way and have enormous processing
horsepower
• Users can edit and modify document files, access high speed internet, stream
video and audio data, receive and send e-mails, attend/give lectures and
presentations among its very many other function
• They have excellent screen resolution and clarity
6. Advantages
• Location Flexibility
• This has enabled users to work from anywhere as long as there is a connection established
• A user can work without being in a fixed position
• Their mobility ensures that they are able to carry out numerous tasks at the same time and perform
their stated jobs
• Saves Time
• The time consumed or wasted while travelling from different locations or to the office and back, has
been slashed
• One can now access all the important documents and files over a secure channel or portal and
work as if they were on their computer
• It has enhanced telecommuting in many companies
• It has also reduced unnecessary incurred expenses
• Enhanced Productivity
• Users can work efficiently and effectively from whichever location they find comfortable
• This in turn enhances their productivity level
• Ease of Research
• Research has been made easier, since users earlier were required to go to the field and
search for facts and feed them back into the system
• It has also made it easier for field officers and researchers to collect and feed data from
wherever they are without making unnecessary trips to and from the office to the field
• Entertainment
• Video and audio recordings can now be streamed on-the-go using mobile computing
• It's easy to access a wide variety of movies, educational and informative material
• With the improvement and availability of high speed data connections at considerable cost,
one is able to get all the entertainment they want as they browse the internet for streamed
data
• One is able to watch news, movies, and documentaries among other entertainment
offers over the internet
• This was not possible before mobile computing dawned on the computing world.
• Streamlining of Business Processes
• Business processes are now easily available through secured connections
• Looking into security issues, adequate measures have been put in place to ensure
authentication and authorization of the user accessing the services
• Some business functions can be run over secure links and sharing of information
between business partners can also take place
• Meetings, seminars and other informative services can be conducted using video and voice
conferencing
• Travel time and expenditure is also considerably reduced
7. Security Issues
• Mobile computing has its fair share of security concerns as any other technology
• Due to its nomadic nature, it's not easy to monitor the proper usage
• Users might have different intentions on how to utilize this privilege
• Improper and unethical practices such as hacking, industrial espionage, pirating, online fraud
and malicious destruction are some but few of the problems experienced by mobile computing
• Another big problem plaguing mobile computing is credential verification
• Issues with unauthorized access to data and information by hackers, is also an enormous
problem
• Outsiders gain access to steal vital data from companies, which is a major hindrance in rolling
out mobile computing services.
• No company wants to lay open their secrets to hackers and other intruders, who will in turn
sell the valuable information to their competitors
• It's also important to take the necessary precautions to minimize these threats from taking
place
• Some of those measures include:
• Hiring qualified personnel.
• Installing security hardware and software
• Educating the users on proper mobile computing ethics
• Auditing and developing sound, effective policies to govern mobile computing
• Enforcing proper access rights and permissions
• In the absence of such measures, it's possible for exploits and other unknown threats to
infiltrate and cause irrefutable harm.
• These may be in terms of reputation or financial penalties
• In such cases, it's very easy to be misused in different unethical practices
• If these factors aren’t properly worked on, it might be an avenue for constant threat
• Various threats still exist in implementing this kind of technology
8. Current Trends
• These are the list of the current mobile technologies starting from 5G technologies which is
the hottest mobile technology available in the market.
• 5G
• In telecommunications, 5G is the fifth generation technology standard for broadband
cellular networks, which cellular phone companies began deploying worldwide in 2019, and is
the planned successor to the 4G networks which provide connectivity to most current
cellphones. 5G networks are predicted to have more than 1.7 billion subscribers worldwide by
2025, according to the GSM Association.[1] Like its predecessors, 5G networks are cellular
networks, in which the service area is divided into small geographical areas called cells.
• All 5G wireless devices in a cell are connected to the Internet and telephone network by radio
waves through a local antenna in the cell.
• The main advantage of the new networks is that they will have greater bangwidth, giving higher
download speeds, eventually up to 10 gigabits per second (Gbit/s). [2] In addition to 5G being
faster than existing networks, 5G can connect more different devices, and even if people are in
crowded areas, the servers will be more unified, improving the quality of Internet services. [3]
• Due to the increased bandwidth, it is expected the networks will increasingly be used as
general internet service providers (ISPs) for laptops and desktop computers, competing
with existing ISPs such as cable internet, and also will make possible new applications
in internet of things (IoT) and machine –to-machine areas.
• 4G
• 4G is the fourth generation of broadband cellular network technology, succeeding 3G, and
preceding 5G. A 4G system must provide capabilities defined by ITU in IMT Advanced.
Potential and current applications include amended mobile web access, IP telephony, gaming
services, high- definition mobile TV, video conferencing, and 3D television.
• The first-release WIMAX standard was commercially deployed in South Korea in 2006 and
has since been deployed in most parts of the world.
• The first-release Long Term Evolution (LTE) standard was commercially deployed in Oslo,
Norway, and Stockholm, Sweden in 2009, and has since been deployed throughout most parts
of the world. It has, however, been debated whether first-release versions should be
considered 4G LTE. The 4G wireless cellular standard was defined by the International
Telecommunication Union (ITU) and specifies the key characteristics of the standard,
including transmission technology and data speeds.
• 3G or third generation
• 3G mobile telecommunications is a generation of standards for mobile phones and mobile
telecommunication services fulfilling the International Mobile Telecommunications-2000
(IMT-2000) specifications by the International Telecommunication Union. Application
services include wide-area wireless voice telephone, mobile Internet access, video calls and
mobile TV, all in a mobile environment.
• Global Positioning System (GPS)
• The Global Positioning System (GPS) is a space-based satellite navigation system that
provides location and time information in all weather, anywhere on or near the Earth, where
there is an unobstructed line of sight to four or more GPS satellites
• The GPS program provides critical capabilities to military, civil and commercial users
around the world
• In addition, GPS is the backbone for modernizing the global air traffic system, weather, and
location services.
• Long Term Evolution (LTE)
• LTE is a standard for wireless communication of high-speed data for mobile phones and data
terminals
• It is based on the GSM/EDGE and UMTS/HSPA network technologies, increasing the
capacity and speed using new modulation techniques
• It is related with the implementation of fourth Generation (4G) technology

• WiMAX
• WiMAX (Worldwide Interoperability for Microwave Access) is a wireless communications
standard designed to provide 30 to 40 megabit-per-second data rates, with the latest update
providing up to 1 Gbit/s for fixed stations
• It is a part of a fourth generation or 4G wireless-communication technology
• WiMAX far surpasses the 30-metre wireless range of a conventional Wi-Fi Local Area
Network (LAN), offering a metropolitan area network with a signal radius of about 50 km
• WiMAX offers data transfer rates that can be superior to conventional cable- modem and DSL
connections, however, the bandwidth must be shared among multiple users and thus yields
lower speed in practice
• Near Field Communication
• Near Field Communication (NFC) is a set of standards for smartphones and similar devices
to establish radio communication with each other by touching them together or bringing
them into close proximity, usually no more than a few centimeters
• Present and anticipated applications include contactless transactions, data exchange, and
simplified setup of more complex communications such as Wi- Fi. Communication is also
possible between an NFC device and an unpowered NFC chip, called a "tag"
Network Security
1.0 Introduction
The transmission of data from one point, A on the network to the other point, B is a great
concern and therefore, there is the need to deploy measure that can secure the transmission
of data away from unauthorized individuals. Hence, the need for network security

2. Data as the Life-Blood of Businesses


Data is the lifeblood of any business. It supports business growth, carries vital resources and helps
the organization stay healthy. And if data is blood, then the network is the beating heart that pumps
it through the business system. But modern cyber threats are like vampires, doing everything
possible to get at the blood that keeps any business going.
In order to defend against these vampiric threats and save your business from potentially millions
of dollars in data loss, you need more than just a stake and some cloves of garlic; you need effective,
robust network security and network visibility.
3. The Three Key Focuses of Network Security
There are three key focuses that should serve as a foundation of any network security strategy: protection, detection and response.
1. Protection entails any tools or policies designed to prevent network security intrusion.
2. Detection refers to the resources that allow you to analyze network traffic and quickly identify problems before they can do
harm.
3. Response is the ability to react to identified network security threats and resolve them as quickly as possible.

Benefits of Network Security


Network security tools and devices exist to help organizations protect, not only its sensitive information, but also its
overall performance, reputation and even its ability to stay in business. Continued operational ability and an intact
reputation are two key benefits of effective network security.

Companies that fall prey to cyberattacks often find themselves crippled from the inside out, unable to deliver services or
effectively address customer needs. Similarly, networks play a major role in internal company processes, and when they
come under attack, those processes may grind to a halt, further hampering an organization’s ability to conduct business
or even resume standard operations. But perhaps even more damaging is the detrimental effect that a network breach
can have on your business’s reputation.
Given the rising tide of identity theft and other dangers related to the theft of personal information,
many customers are already hesitant when it comes to sharing data with businesses. And if a cyberattack
should occur, many of these customers are likely to withdraw in favor of more secure alternatives. The
loss or corruption of valuable data, along with a significant disruption to customer services and internal
process, topped off with reputational injury that may persist long after other damages have been repaired
— it’s not hard to see what’s at stake when it comes to network security. In fact, it’s been suggested that
66 percent of SMBs would have to shut down (either temporarily or permanently) after experiencing a
data breach. And even larger, more established businesses may be unable to reclaim their former
standing.

On the other hand, reliable tools in network security software and hardware, coupled with the right
policies and strategies, can help ensure that when cyberattacks occur, their impact will be minimal your
network security by limiting user access and resources to only the parts of the network that directly
apply to individual users’ responsibilities.
2.Anti-malware software
Malware, in the form of viruses, trojans, worms, keyloggers, spyware, etc. are designed to
spread through computer systems and infect networks. Anti-malware tools are a kind of
network security software designed to identify dangerous programs and prevent them
from spreading. Anti-malware and antivirus software may also be able to help resolve
malware infections, minimizing the damage to the network.
3.Anomaly detection
It can be difficult to identify anomalies in your network without a baseline understanding
of how that network should be operating. Network anomaly detection engines (ADE)
allow you to analyze your network, so that when breaches occur, you’ll be alerted to them
quickly enough to be able to respond.
4. Application security
For many attackers, applications are a defensive vulnerability that can be exploited. Application
security helps establish security parameters for any applications that may be
relevant to your network security.
5. Data loss prevention (DLP)
Often, the weakest link in network security is the human element. DLP technologies and
policies help protect staff and other users from misusing and possibly compromising
sensitive data or allowing said data out of the network.
6. Email security
As with DLP, email security is focused on shoring up human-related security weaknesses. Via
phishing strategies (which are often very complex and convincing), attackers persuade email
recipients to share sensitive information via desktop or mobile device, or
inadvertently download malware into the targeted network. Email security helps identify
dangerous emails and can also be used to block attacks and prevent the sharing of vital
data.
7.Endpoint security
The business world is becoming increasingly bring your own device (BYOD), to the
point where the distinction between personal and business computer devices is almost
non-existent. Unfortunately, sometimes the personal devices become targets when users
rely on them to access business networks. Endpoint security adds a layer of defense
between remote devices and business networks
8. Firewalls
Firewalls function much like gates that can be used to secure the borders between your network and
the internet. Firewalls are used to manage network traffic, allowing authorized traffic through while
blocking access to non-authorized traffic.
9. Intrusion prevention systems
Intrusion prevention systems (also called intrusion detection) constantly scan and analyze
network traffic/packets, so that different types of attacks can be identified and responded to quickly.
These systems often keep a database of known attack methods, so as to be able to recognize threats
immediately.
10.Network segmentation
There are many kinds of network traffic, each associated with different security risks. Network
segmentation allows you to grant the right access to the right traffic, while
restricting traffic from suspicious sources.
11.Security information and event management (SIEM)
Sometimes simply pulling together the right information from so many different tools and resources
can be prohibitively difficult — particularly when time is an issue. SIEM tools
and software give responders the data they need to act quickly.
12.Virtual private network (VPN)
VPN tools are used to authenticate communication between secure networks and an
endpoint device. Remote-access VPNs generally use IPsec or Secure Sockets Layer (SSL)
for authentication, creating an encrypted line to block other parties from eavesdropping.

13.Web security
Including tools, hardware, policies and more, web security is a blanket term to describe the
network security measures businesses take to ensure safe web use when connected to an
internal network. This helps prevent web-based threats from using browsers as access
points to get into the network.

14.Wireless security
Generally speaking, wireless networks are less secure than traditional networks. Thus,
strict wireless security measures are necessary to ensure that threat actors aren’t gaining
access.

You might also like