Net-Centric Computing-Csc 421 - T
Net-Centric Computing-Csc 421 - T
Net-Centric Computing-Csc 421 - T
BY
1
CSC 421– NET-CENTRIC COMPUTING
Course Objectives:
1. Understand the foundational concepts of networking and distributed systems.
2. Analyze and design efficient and secure net-centric systems.
3. Develop skills in implementing and managing networked applications.
4. Evaluate emerging technologies and trends in net-centric computing.
5. Apply knowledge in real-world scenarios to solve network-related challenges.
2
CSC 421– NET-CENTRIC COMPUTING
Note Development:
1. Introduction to Net-centric Computing: Defining net-centric computing, its
importance, and the evolution of networked systems in modern computing.
2. Network Fundamentals: Understanding the basic components of networks,
network topologies, protocols, and the OSI/TCP/IP models.
3. Distributed Systems: Exploring the architecture of distributed systems,
emphasizing concepts like transparency, scalability, and fault tolerance.
4. Cloud Computing: Studying the principles behind cloud infrastructure, service
models (IaaS, PaaS, SaaS), virtualization, and cloud deployment models.
5. Internet of Things (IoT): Discussing the concept of interconnected devices, IoT
protocols, IoT applications, and challenges in IoT system design.
6. Security in Net-centric Systems: Examining cybersecurity concerns, encryption
techniques, authentication, authorization, and security protocols in networked
environments.
7. Web Services and Applications: Understanding web-based application
development, RESTful services, APIs, and their integration into distributed
systems.
8. Emerging Trends: Exploring recent developments in net-centric computing, such
as edge computing, 5G networks, blockchain, and their impact on distributed
systems.
3
CSC 421– NET-CENTRIC COMPUTING
4
CSC 421– NET-CENTRIC COMPUTING
5
CSC 421– NET-CENTRIC COMPUTING
Edge Computing: With the growing need for faster processing and reduced latency,
edge computing emerged. It involves processing data closer to its source (at the edge
of the network) rather than relying solely on centralized cloud servers.
Blockchain and Decentralization: Blockchain technology introduced decentralized
networks, ensuring secure and transparent transactions without a central authority,
impacting various industries beyond finance.
✓ TCP/IP: The foundational protocol suite for the internet, responsible for data
transmission and routing.
✓ OSI Model: A conceptual framework defining how networking protocols should
interact, consisting of seven layers (Physical, Data Link, Network, Transport,
Session, Presentation, Application).
6
CSC 421– NET-CENTRIC COMPUTING
network and effectively describes computer packet transfer by using various layers
of protocols.
TCP/IP stands for Transmission Control Protocol/ Internet Protocol. It is
specifically designed as a model to offer highly reliable and end-to-end byte stream
over an unreliable internetwork.
TCP/IP helps you to determine how a specific computer should be connected to the
internet and how you can transmit data between them. It helps you to create a virtual
network when multiple computer networks are connected together.
TCP/IP is about end-to-end data communication, providing the specifics on how data
should be transmitted, addressed, packetized, routed, and ultimately received. It
involves four layers, namely the application, transport, internet, and link layers. Its
technical standards were developed and are maintained by the Internet Engineering
Task Force (IETF). The building architecture of both OSI and TCP/IP Models are
shown in figure 1 below.
7
CSC 421– NET-CENTRIC COMPUTING
6
4
5 7
OSI TCP/IP
MODEL MODEL
2
3
2 1
1
Both OSI and TCP/IP reference models are based on the concept of a stack of
protocols. The functionality of the layers is almost similar. In both models, the layers
are there to provide an end-to-end network- independent transport service to
processes wishing to communicate with each other.
9
CSC 421– NET-CENTRIC COMPUTING
OSI model helps you to standardize router, switch, motherboard, and other hardware
whereas TCP/IP helps you to establish a connection between different types of
computer. The full highlights of the network models are shown in table 1-6 below.
10
CSC 421– NET-CENTRIC COMPUTING
Table 1: OSI LAYERS AND THEIR FUNCTIONS
11
CSC 421– NET-CENTRIC COMPUTING
12
CSC 421– NET-CENTRIC COMPUTING
13
CSC 421– NET-CENTRIC COMPUTING
14
CSC 421– NET-CENTRIC COMPUTING
Attributes of TCP
• Delivery Acknowledgements
15
CSC 421– NET-CENTRIC COMPUTING
• Re -transmission
• Delays transmission when the network is congested
• Easy Error detection
16
CSC 421– NET-CENTRIC COMPUTING
Data Encapsulation is the process in which some extra information is added to the
data item to add some features to it. We use either the OSI or the TCP/IP model in
our network, and the data transmission takes place through various layers in these
models. Data encapsulation adds the protocol information to the data so that data
transmission can take place in a proper way. This information can either be added in
the header or the footer of the data.
As data is transferred from upper layer to lower level of TCP/IP protocol stack
(outgoing transmission) each layer includes a bundle of relevant information called
a header along with the actual data. The data package containing the header and the
data from the upper layer then becomes the data that is repackaged at the next lower
level with lower layer's header. Header is the supplemental data placed at the
beginning of a block of data when it is sent. This supplemental data is used at the
receiving side to extract the data from the encapsulated data packet. This packing of
data at each layer is known as data encapsulation as seen in Figure 2 below. The
reverse process of encapsulation (or de-capsulation) occurs when data is received on
the destination computer. As the data moves up from the lower layer to the upper
layer of TCP/IP protocol stack (incoming transmission), each layer unpacks the
corresponding header and uses the information contained in the header to deliver the
packet to the exact network application waiting for the data.
17
CSC 421– NET-CENTRIC COMPUTING
ENCAPSULATION DE-CAPSULATION
Bits
Physical Application
Network
Frames Interface Application
Data-link Presentation
s
Packet
Session
Network Internet
Transport
Interface
Application Physical
SENDER RECEIVER
18
CSC 421– NET-CENTRIC COMPUTING
CONCLUSION
The paper presents ideal differences between the OSI and TCP/IP models are in their
areas of the number of layers, header sizes and their connection interface. More so,
the OSI model encapsulates at the sender’s side from upper layer(Application layer)
to lower layer(Physical layer) while the TCP/IP model de-capsulates at the
receiver’s side from lower layer(network interface/link) to the upper
layer(Application layer). The trending model used due to their availability and low-
cost is the TCP/IP model because of the featured connection and connectionless
interface in routing and addressing support in their network interface.
DATA TRANSMISSION:
Data Packet: Basic unit of data transmitted over a network, containing payload,
headers, and sometimes trailers.
Bandwidth: The maximum data transfer rate of a network or internet connection,
often measured in bits per second (bps), kilobits per second (Kbps), or megabits per
second (Mbps).
NETWORK DEVICES:
Router: Device that forwards data packets between computer networks, determining
the best path for transmission.
Switch: Connects devices within a local area network (LAN) and forwards data only
to the intended recipient.
Hub: Simplest networking device that connects multiple devices in a LAN,
broadcasting data to all connected devices.
19
CSC 421– NET-CENTRIC COMPUTING
NETWORK ADDRESSING:
IP Address: Unique numerical label assigned to each device connected to a
computer network, identifying its location on the network.
MAC Address: Physical address embedded in network interface cards (NICs) used
for identifying devices at the data link layer.
6. Network Security:
Firewalls: Security devices that monitor and control incoming and
outgoing network traffic based on predetermined security rules.
Encryption: Process of encoding data to prevent unauthorized access, ensuring
secure transmission over networks.
DISTRIBUTED SYSTEMS:
Definition of Distributed Systems:
Distributed Systems refer to a collection of independent computers that work
together as a unified system. These computers are connected via a network and
communicate with each other to achieve a common goal.
20
CSC 421– NET-CENTRIC COMPUTING
21
CSC 421– NET-CENTRIC COMPUTING
22
CSC 421– NET-CENTRIC COMPUTING
Backup services on the cloud provide secure and automated backup solutions
for critical data, ensuring redundancy and data recovery.
2. Infrastructure as a Service (IaaS):
Companies utilize IaaS for scalable and on-demand infrastructure, allowing
them to host applications, databases, and services without investing in
physical hardware. Amazon Web Services (AWS), Microsoft Azure, and
Google Cloud Platform (GCP) are major providers.
23
CSC 421– NET-CENTRIC COMPUTING
24
CSC 421– NET-CENTRIC COMPUTING
Concept of IoT:
The Internet of Things (IoT) refers to a network of interconnected devices embedded
with sensors, software, and other technologies that enable them to collect and
exchange data with other devices or systems over the internet. The key idea behind
IoT is to create a web of connected devices that can communicate, interact, and share
data without human intervention.
25
CSC 421– NET-CENTRIC COMPUTING
With IoT, data processing can occur closer to the source (at the edge of the network)
rather than solely relying on centralized servers. This enables faster response times
and reduces latency.
Applications of IoT:
1. Smart Home Automation: IoT devices enable the automation and control of home
appliances, lighting, heating, security systems, and entertainment systems. Smart
thermostats, smart locks, and voice-controlled assistants are examples.
2. Healthcare and Remote Monitoring: Wearable IoT devices, such as fitness
trackers and health monitors, track vital signs, physical activity, and provide
valuable health insights. Remote patient monitoring systems allow healthcare
providers to monitor patients' health status from a distance.
3. Industrial Internet of Things (IIoT): IoT is extensively used in industries for asset
tracking, predictive maintenance, process optimization, and monitoring. It helps
in improving efficiency, reducing downtime, and enabling data-driven decision-
making in manufacturing, logistics, and supply chain management.
4. Smart Cities: IoT technologies facilitate smarter city management by monitoring
and controlling traffic flow, managing energy consumption, optimizing waste
management, and enhancing public safety through surveillance systems and
smart lighting.
5. Agriculture: IoT devices are used for precision farming, where sensors monitor
soil moisture, temperature, and crop health. This data helps optimize irrigation,
fertilizer usage, and crop yield.
6. Retail and Inventory Management: Retailers use IoT devices for inventory
tracking, supply chain optimization, and enhancing customer experiences
through personalized marketing strategies and smart shopping experiences.
7. Environmental Monitoring: IoT devices assist in monitoring and managing
environmental conditions, including air quality, water quality, and pollution
levels. These devices contribute to environmental conservation efforts.
8. Transportation and Logistics: IoT enables vehicle tracking, route optimization,
fleet management, and real-time monitoring of cargo conditions, ensuring
efficient logistics operations and better customer service.
26
CSC 421– NET-CENTRIC COMPUTING
27
CSC 421– NET-CENTRIC COMPUTING
C. Vulnerability Management:
Regularly scanning systems for vulnerabilities and applying patches or updates to
mitigate potential security risks.
28
CSC 421– NET-CENTRIC COMPUTING
Educating users and employees about security best practices, potential threats, and
how to recognize and respond to security incidents.
With the evolving threat landscape, ensuring robust security measures in net-centric
systems is essential to safeguard data, prevent unauthorized access, and maintain the
integrity and availability of systems and services.
Web services and applications are integral components of the internet infrastructure,
facilitating communication, data exchange, and interaction between different
systems and users. Here are the key concepts:
1. Web Services:
Definition: Web services are software systems designed to allow
interoperable machine-to-machine interaction over a network, commonly the
internet.
2. Communication Protocols: They utilize standardized communication
protocols such as SOAP (Simple Object Access Protocol), REST
(Representational State Transfer), and XML/JSON for data exchange.
3. Service-Oriented Architecture (SOA): Web services adhere to the principles
of SOA, breaking down applications into discrete services that are loosely
coupled and can be accessed independently.
Uses:
1. Enable seamless integration between disparate systems, allowing applications
to communicate and share data across platforms.
29
CSC 421– NET-CENTRIC COMPUTING
Web Applications:
Definition: Web applications are software applications that are accessed and
used via a web browser over the internet.
1. Client-Server Model: They typically follow a client-server architecture where
the user interface runs on a web browser (client) while the application's logic
and data are stored and processed on a server.
2. Development Technologies: Web applications are built using various
technologies including HTML, CSS, JavaScript for front-end development,
and programming languages like Python, Java, Ruby, PHP, or .NET for
backend development.
Examples:
1. Social media platforms, online shopping websites, email services, project
management tools, and banking applications are all examples of web
applications.
2. Integration:
3. Web services often serve as the backbone for web applications, enabling
seamless integration between different systems or functionalities. They allow
applications to access and utilize services or data from other sources,
enhancing functionality and connectivity on the web.
30