Computer and Network Technology
Computer and Network Technology
The origins of cloud computing technology can be traced back to the 1960s, when the concept of "time-
sharing" in mainframe computers was introduced. Despite its perception as a contemporary
phenomenon, cloud computing has historical foundations in this earlier era. Nonetheless, the pivotal
moment occurred during the 1990s with the advent of virtualization, a technological advancement that
facilitated the operation of numerous virtual systems on a solitary physical system. This breakthrough, as
highlighted by Buyya et al. (2009), led to a substantial enhancement in efficiency. The emergence of the
Internet and the extensive integration of broadband technology established the requisite circumstances
for the contemporary manifestation of cloud computing. Amazon has played a significant role in the
advancement of cloud computing by introducing Amazon Web Services (AWS) in 2006. This service
provides flexible and cost-effective computing resources in the form of scalable, pay-as-you-go capacity
in the cloud (Vogels, 2008). In subsequent years, additional prominent entities, including Google and
Microsoft, introduced their respective cloud computing services. In contemporary times, the utilization
of cloud computing has become an indispensable component of numerous services and applications,
thereby exemplifying the transformative potential of the amalgamation of technology and connectivity
in the realm of data accessibility and storage.
IaaS provides users with virtualized computing resources over the internet. This model gives businesses a
flexible, scalable, and cost-effective solution to their infrastructure needs, eliminating the expense and
complexity of maintaining physical servers (Buyya et al., 2009). PaaS provides a platform that includes
infrastructure, runtime environment, and development tools required to develop, test, and manage
applications. This saves developers time and resources in setting up and managing the underlying
infrastructure (Vogels, 2008). SaaS delivers software over the internet on a subscription basis,
eliminating the need for local installation or maintenance. This model reduces the upfront cost of
software purchases and simplifies updates and patch management (Linthicum, 2017).
Each model offers unique benefits and is best suited to specific use-cases. Businesses must evaluate their
specific needs to choose the most appropriate model.
Cloud computing platforms provide various services ranging from infrastructure to software, with
popular platforms including Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform
(GCP).
AWS, the pioneer in cloud services, offers a broad array of services ranging from compute power,
storage, and databases to machine learning, analytics, and Internet of Things (IoT). It is renowned for its
scalability, reliability, and vast global infrastructure (Vogels, 2008). Microsoft Azure, often favored by
organizations heavily invested in Microsoft technologies, provides an extensive suite of cloud services,
integrating seamlessly with other Microsoft products. It also offers robust support for hybrid cloud
environments, bridging the gap between on-premises servers and the cloud (Chappell, 2017). Google
Cloud Platform, while newer than AWS and Azure, excels in data analytics and machine learning services.
It also offers considerable pricing flexibility with its sustained-use discounts and per-second billing (Kavis,
2017).
Each platform has its strengths, and the choice depends on an organization's specific requirements,
existing technological investments, budget, and the expertise of its technical team.
Client and server environments represent two halves of a client-server architecture, a common model
for networked computing. The client environment is where users interact with applications. Clients send
requests to servers for data or services. Clients can be anything from a web browser on a desktop to a
mobile app on a smartphone (Comer, 2000). The server environment, on the other hand, is responsible
for processing these requests and returning the requested data or services to the client. Servers are
powerful machines designed to handle multiple requests concurrently and are typically more robust and
have more resources than clients (Leiner et al., 2009). The client-server model is a distributed application
structure that partitions tasks or workloads between providers of a resource or service, called servers,
and service requesters, called clients.
Serverless computing, also known as Function as a Service (FaaS), offers a range of benefits, especially
for developers looking to streamline their operations and business models.
Serverless computing provides automatic scaling. It can instantly scale up to handle thousands of
concurrent functions and scale down when demand drops, allowing for highly efficient use of resources.
This elasticity enables applications to handle high traffic loads without manual intervention, saving time
and resources (Roberts, 2016). The pay-per-execution pricing model in serverless computing ensures
that you only pay for the compute time you consume. This model can significantly reduce costs,
especially for applications with unpredictable or highly variable workloads (Eivy, 2017). Serverless
computing allows developers to focus more on coding and less on server management. The
responsibility of server maintenance, patching, and capacity planning is shifted to the cloud provider,
which can greatly speed up the development process (Baldini et al., 2017). However, serverless
computing isn't without its drawbacks. These include potential latency issues for applications requiring
real-time responses, as there can be delays (known as cold starts) when functions are initiated. There are
also concerns related to vendor lock-in due to the specific implementations of serverless platforms
(Hong et al., 2018).
In summary, serverless computing provides significant benefits for certain use cases, although
considerations regarding application requirements and potential drawbacks must be assessed.
Section B
The establishment and adherence to network standards and protocols are imperative in guaranteeing a
uniform and efficient exchange of information among interconnected devices within a network. The
rules and conventions governing communication encompass various aspects such as data formatting,
addressing, transmission, reception, and acknowledgment.
The Internet Protocol Suite, commonly known as TCP/IP, encompasses a set of essential network
standards. It derives its name from its two primary protocols, namely the Transmission Control Protocol
(TCP) and the Internet Protocol (IP). The Transmission Control Protocol (TCP) is tasked with the reliable
transmission of data across a network, guaranteeing the delivery of data without any errors and in the
intended sequence. The Internet Protocol (IP), however, is tasked with the responsibility of efficiently
directing data packets across interconnected networks, thereby guaranteeing their accurate delivery to
the intended recipients (Comer, 2006). The Hypertext Transfer Protocol (HTTP) is a significant protocol
that forms the basis for data communication on the World Wide Web. The Hypertext Transfer Protocol
(HTTP) is a protocol that specifies the structure and transmission of messages, as well as the appropriate
actions that web servers and browsers should undertake in response to different commands (Fielding et
al., 1999). The Domain Name System (DNS) is a widely utilized protocol that facilitates the conversion of
user-friendly domain names into numerical IP addresses. These IP addresses are subsequently employed
by network equipment to effectively direct data traffic. According to Mockapetris (1987), this
functionality enables users to conveniently access websites by utilizing domain names that are simple to
remember, rather than relying on numerical IP addresses. Wireless communication standards, such as
IEEE 802.11, colloquially referred to as Wi-Fi, establish the protocols by which wireless devices establish
connections and engage in communication within a network (Gast, 2005).
The standards and protocols are of utmost importance in guaranteeing smooth and dependable
communication throughout the intricate and worldwide scope of digital networks.
A Bus topology is simple and economical, with all devices connected to a single cable or backbone.
However, it has scalability issues and a failure in the central cable can disrupt the entire network
(Stallings, 2017). In Ring topology, each device is connected to two other devices, forming a circular
network. This allows for reliable and equal data access for each device but failure of a single device or
connection can disrupt the entire network. Additionally, adding or removing devices can be complicated,
causing temporary network disruption (Forouzan and Fegan, 2007). Star topology connects all devices to
a central hub or switch. It is easy to set up and manage, and failure of one device doesn't affect the rest
of the network. However, it is more expensive due to the need for more cabling, and the entire network
depends on the functioning of the central hub (Tanenbaum and Wetherall, 2011). Mesh topology
involves each device being connected to every other device on the network. This offers high reliability
and robustness because if one link fails, data can be rerouted along other paths. However, it's the most
expensive and complex topology to install and maintain (Kurose and Ross, 2017). Hybrid topology
combines two or more topologies and leverages the strengths of each. It offers great flexibility and
scalability but can be complex to design and implement (Forouzan and Fegan, 2007).
In summary, choosing the appropriate network topology depends on factors such as the scale of the
network, cost, the importance of reliability, and the available maintenance resources.
Network standards have a significant impact on the functioning, compatibility, and evolution of digital
networks. They play a crucial role in ensuring consistent and effective communication across diverse
devices and platforms.
Standards like TCP/IP, which govern how data is sent and received over networks, underpin the
functioning of the internet itself. Without a standard protocol, network communication would be chaotic
as each device or network could potentially follow different rules. Such standards ensure reliability and
interoperability in data transmission across the globe (Comer, 2006). The Hypertext Transfer Protocol
(HTTP) has shaped the development of the World Wide Web, enabling the communication and transfer
of data that underpins our digital interactions (Fielding et al., 1999). Wireless network standards like IEEE
802.11 (Wi-Fi) have revolutionized how we access the internet, freeing us from the constraints of wired
connections and enabling the rise of mobile devices and IoT applications (Gast, 2005). On the downside,
the existence of multiple standards for similar applications can sometimes lead to fragmentation and
compatibility issues. This is evident in the competing standards for cellular networks (2G, 3G, 4G, 5G) or
the past competition between HD-DVD and Blu-Ray formats.
Network standards have profound impacts on the evolution of digital technology, driving compatibility,
efficiency, and innovation.
Identify and explain various network hardware and software available for an
internet setup
The establishment of an internet network necessitates the integration of both hardware and software
elements.
Regarding hardware, a modem generally serves as the initial component, facilitating the conversion of
data received from an Internet Service Provider (ISP) into a format compatible with devices within a
network. Subsequently, the data is routed by a router to various devices within your network. In order to
establish wireless connectivity, it is necessary to utilize either a Wireless Access Point (WAP) or a router
that possesses integrated wireless capabilities. Furthermore, network switches serve the purpose of
facilitating the connection of numerous devices within a local area network (LAN) configuration,
commonly employed in corporate settings (Meyers, 2015). Network interface cards (NICs) or controllers
are hardware components that play a crucial role in facilitating device connectivity to a network. The
process involves the conversion of data obtained from the user's device into a suitable format that
enables its transmission over a network, regardless of whether the network is wired or wireless (Kurose
and Ross, 2017). Network drivers facilitate the interaction between the operating system and the
Network Interface Card (NIC) in the context of software. Firewall software plays a crucial role in
enhancing security measures by actively monitoring and regulating network traffic, both incoming and
outgoing, in accordance with pre-established security protocols (Zwicky et al., 2000). According to
Stallings (2017), network management software offers essential resources for the purposes of network
monitoring, control, and troubleshooting.
Reference
Buyya, R., Yeo, C.S., and Venugopal, S., 2009. Market-Oriented Cloud Computing: Vision, Hype, and
Reality for Delivering IT Services as Computing Utilities. 10th IEEE International Conference on High
Performance Computing and Communications.
Vogels, W., 2008. A Head in the Cloud – The Power of Infrastructure as a Service. 1st Workshop on Cloud
Computing and its Applications.
Kavis, M., 2017. Architecting the Cloud: Design Decisions for Cloud Computing Service Models. Wiley.
Vogels, W., 2008. A Head in the Cloud – The Power of Infrastructure as a Service. 1st Workshop on Cloud
Computing and its Applications.
Comer, D.E., 2000. Internetworking with TCP/IP Vol.1: Principles, Protocols, and Architecture. 4th ed.
Prentice Hall.
Leiner, B.M., Cerf, V.G., Clark, D.D., Kahn, R.E., Kleinrock, L., Lynch, D.C., Postel, J., Roberts, L.G., and
Wolff, S., 2009. A Brief History of the Internet. Computer Communication Review, 39(5), pp.22-31.
Baldini, I., Castro, P., Chang, K., Cheng, P., Fink, S., Ishakian, V., Mitchell, N., Muthusamy, V., Rabbah, R.,
Slominski, A., and Suter, P., 2017. Serverless Computing: Current Trends and Open Problems. Research
Advances in Cloud Computing.
Eivy, R., 2017. Be Wary of the Economics of Serverless Cloud Computing. IEEE Cloud Computing, 4(2),
pp.6-12.
Hong, L., Gao, Y., Gao, H., and Han, J., 2018. Towards Economical and Personalized Cloud Service
Selection. IEEE INFOCOM.
Comer, D., 2006. Internetworking with TCP/IP Volume One. 6th ed. Pearson.
Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., and Berners-Lee, T., 1999. Hypertext
Transfer Protocol – HTTP/1.1. IETF.
Gast, M., 2005. 802.11 Wireless Networks: The Definitive Guide. 2nd ed. O'Reilly Media.
Forouzan, B.A., and Fegan, S.C., 2007. Data Communications and Networking. 4th ed. McGraw-Hill.
Kurose, J.F., and Ross, K.W., 2017. Computer Networking: A Top-Down Approach. 7th ed. Pearson.
Stallings, W., 2017. Data and Computer Communications. 10th ed. Pearson.
Tanenbaum, A.S., and Wetherall, D.J., 2011. Computer Networks. 5th ed. Prentice Hall.
Kurose, J.F., and Ross, K.W., 2017. Computer Networking: A Top-Down Approach. 7th ed. Pearson.
Meyers, M., 2015. CompTIA Network+ Certification All-in-One Exam Guide. 6th ed. McGraw-Hill.
Stallings, W., 2017. Data and Computer Communications. 10th ed. Pearson.
Zwicky, E.D., Cooper, S., and Chapman, D.B., 2000. Building Internet Firewalls. 2nd ed. O'Reilly Media.