0% found this document useful (0 votes)
20 views11 pages

IT (GE) Unit-2

Uploaded by

rajeshgoud0310
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views11 pages

IT (GE) Unit-2

Uploaded by

rajeshgoud0310
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

BSC: Sem-V Information Technologies Sai Chaitanya Degree College

UNIT-II
Introduction to Emerging Computer Technologies:
1. Distributed Networking,
2. Peer-to-peer Computing,
3. Grid Computing,
4. Cloud Computing,
5. Utility Computing,
6. On-demand Computing,
7. Wireless Network,
8. Bluetooth,
9. Artificial Intelligence.

1|Page
BSC: Sem-V Information Technologies Sai Chaitanya Degree College

Q. Discuss in detail about distributed networking?


Distributed networking is a computer network architecture in which multiple networks are
interconnected to form a single network. Each of the individual networks is managed independently,
but they communicate with each other to share resources and provide a more reliable and efficient
service to users.

Benefits of distributed networking

Distributed networking offers a number of benefits over traditional centralized networks, including:

▪ Scalability: Distributed networks are more scalable than centralized networks, meaning that
they can be easily expanded to accommodate more users and devices.
▪ Reliability: Distributed networks are more reliable than centralized networks because they
are not dependent on a single point of failure. If one node in the network fails, the other
nodes can continue to operate.
▪ Performance: Distributed networks can provide better performance for users who are
located geographically dispersed. This is because the data can be routed through the network
in a way that minimizes the distance travelled.
▪ Security: Distributed networks can be more secure than centralized networks because there
is no single point of attack. If an attacker is able to compromise one node in the network,
they will not be able to access the entire network.

Examples of distributed networking

• The Internet: The Internet is a global distributed network that connects billions of devices
around the world.
• Content delivery networks (CDNs): CDNs are used to deliver web content to users around
the world with high performance and reliability.
• Peer-to-peer (P2P) networks: P2P networks allow users to share files and resources with
each other without the need for a central server.
• Cloud computing: Cloud computing platforms such as Amazon Web Services (AWS) and
Microsoft Azure use distributed networking to provide scalable and reliable services to their
customers.

2|Page
BSC: Sem-V Information Technologies Sai Chaitanya Degree College

Q. Explain in detail about peer-to-peer network?


▪ The peer-to-peer computing architecture contains nodes that are equal participants in data
sharing.
▪ All the tasks are equally divided between all the nodes.
▪ The nodes interact with each other as required as share resources.
A diagram to better understand peer to peer computing is as follows −

Characteristics of Peer-to-Peer Computing

▪ Peer to peer networks is usually formed by groups of a dozen or less computers. These
computers all store their data using individual security but also share data with all the other
nodes.
▪ The nodes in peer-to-peer networks both use resources and provide resources. So, if the
nodes increase, then the resource sharing capacity of the peer-to-peer network increases.
This is different than client server networks where the server gets overwhelmed if the nodes
increase.
▪ Since nodes in peer-to-peer networks act as both clients and servers, it is difficult to provide
adequate security for the nodes. This can lead to denial-of-service attacks.

3|Page
BSC: Sem-V Information Technologies Sai Chaitanya Degree College

▪ Most modern operating systems such as Windows and Mac OS contain software to
implement peer to peer networks.

Advantages of Peer-to-Peer Computing

▪ Some advantages of peer-to-peer computing are as follows −


▪ Each computer in the peer-to-peer network manages itself. So, the network is quite easy to
set up and maintain.
▪ In the client server network, the server handles all the requests of the clients. This provision is
not required in peer-to-peer computing and the cost of the server is saved.
▪ It is easy to scale the peer-to-peer network and add more nodes. This only increases the data
sharing capacity of the system.
▪ None of the nodes in the peer-to-peer network are dependent on the others for their
functioning.
Disadvantages of Peer-to-Peer Computing
Some disadvantages of peer-to-peer computing are as follows −
▪ It is difficult to back up the data as it is stored in different computer systems and there is no
central server.
▪ It is difficult to provide overall security in the peer-to-peer network as each system is
independent and contains its own data.

Grid Computing- advantages and dis-advantages:


 Grid computing is also called as "distributed computing." It links multiple computing
resources (PC's, workstations, servers, and storage elements) together and provides a
mechanism to access them.
 The main advantages of grid computing are that it increases user productivity by providing
transparent access to resources, and work can be completed more quickly.

4|Page
BSC: Sem-V Information Technologies Sai Chaitanya Degree College

Grid Computing for Business and Developers

 Grid computing allows for distributing jobs to many small server components using load
sharing software. The software distributes the load evenly based on resources and policies.
Now, instead of having one heavily burdened server, the load is spread evenly across many
smaller computers.
Pros and Cons of Grid Computing

Advantages of Grid Computing

1. Cheaper Servers
No need to buy large SMP servers! Applications would be able to break apart and run across smaller
servers. Those servers cost far less than SMP servers.
2. More Efficient
Much more efficient use of idle resources. Idle servers and desktops would be able to accept
3. jobs! Many resources sit idle, especially during off business hours. This is not the case anymore with
a grid computing setup.
4. Fail-safe
Grid computer environments are modular and don’t have just one fail point. Hence if one of the
machines within the grid fails, there are plenty of others able to pick the load. Jobs can automatically
restart if a failure occurs.
Dis-advantages of Grid Computing

1. May Still Require Large SMP


2. Will be forced to run on a large SMP for memory hungry applications that can’t take advantage of
MPI
3. Requires Fast Interconnect
You may need to have a fast interconnect between compute resources (gigabit ethernet at a
minimum). InfiniBand for MPI intense applications
4. Some Applications Require Customization
Applications would need tweaking to take full advantage of new models.
5. Licensing
Licensing across many servers may make it prohibitive for some apps.

5|Page
BSC: Sem-V Information Technologies Sai Chaitanya Degree College

Cloud Computing:
▪ Cloud computing is a technology that allows users to access computing resources such as
servers, storage, and applications over the internet

Top benefits of cloud computing:

1. Cost savings: Cloud computing eliminates the need for businesses to invest in expensive
hardware and software. Instead, they can pay for what they use on a subscription basis,
which can be more cost-effective.
2. Flexibility: Cloud computing allows businesses to scale their computing resources up or
down as needed, depending on their requirements.
3. Mobility: Cloud computing allows users to access their data and applications from
anywhere with an internet connection, making it easier to work remotely 1.
4. Improved collaboration: Cloud computing allows teams to work together on documents
and projects in real-time, regardless of their location .
5. Quality control: Cloud computing providers offer service level agreements (SLAs) that
guarantee a certain level of uptime and performance, which can help businesses ensure that
their applications are running smoothly.
6. Disaster recovery: Cloud computing providers offer backup and disaster recovery services,
which can help businesses recover from data loss or system failures .
7. Automatic software updates: Cloud computing providers automatically update their
software, which can help businesses stay up-to-date with the latest features and security
patches.

6|Page
BSC: Sem-V Information Technologies Sai Chaitanya Degree College
Types of cloud computing

▪ There are several types of cloud computing, including public cloud, private cloud, hybrid
cloud, and multi-cloud.
▪ Public cloud is a cloud computing model where the cloud provider offers computing
resources such as servers, storage, and applications over the internet. Public clouds are
owned and operated by third-party cloud service providers.
▪ Private cloud is a cloud computing model where the cloud infrastructure is dedicated to a
single organization. Private clouds can be located on-premises or hosted by a third-party
service provider.
▪ Hybrid cloud is a cloud computing model that combines public and private cloud
models. Hybrid clouds allow organizations to leverage the benefits of both public and private
clouds .

▪ Multi-cloud is a cloud computing model that involves the use of multiple cloud computing
services in a single heterogeneous architecture. Multi-cloud can be used to avoid vendor
lock-in, improve reliability, and optimize costs

Utility Computing:
▪ Utility computing is a service provisioning model that offers computing resources such as
hardware, software, and network bandwidth to clients as and when they require them on an
on-demand basis.
▪ The service provider charges only as per the consumption of the services, rather than a fixed
charge or a flat rate.
▪ Utility computing is a subset of cloud computing, allowing users to scale up and down based
on their needs.
▪ Clients, users, or businesses acquire amenities such as data storage space, computing
capabilities, applications services, virtual servers, or even hardware rentals such as CPUs,
monitors, and input devices.
▪ The utility computing model is based on conventional utilities and originates from the process
of making IT resources as easily available as traditional public utilities such as electricity, gas,
water, and telephone services.
The benefits of utility computing include:

• Cost savings: Utility computing eliminates the need for businesses to invest in expensive
hardware and software. Instead, they can pay for what they use on a subscription basis, which
can be more cost-effective.
• Scalability: Utility computing allows businesses to scale their computing resources up or
down as needed, depending on their requirements.
• Flexibility: Utility computing allows users to access their data and applications from
anywhere with an internet connection, making it easier to work remotely.
• Improved collaboration: Utility computing allows teams to work together on documents
and projects in real-time, regardless of their location .
7|Page
BSC: Sem-V Information Technologies Sai Chaitanya Degree College

On-demand Computing:
▪ On-demand computing (ODC) is a model of technology and computing in which resources
are provided on an as-needed and when-needed basis.
▪ This enterprise-level model makes computing resources such as storage capacity,
computational speed, and software applications available to users as and when needed for
specific temporary projects, known or unexpected workloads, routine work, or long-term
technological and computing requirements.
▪ ODC is also known as OD computing or utility computing.
▪ The major advantage of ODC is low initial cost, as computational resources are essentially
rented when they are required. This provides cost savings over purchasing them outright.
▪ However, there are some disadvantages to ODC. One of the main disadvantages is that the
cost of using ODC can be higher than the cost of purchasing the resources outright if the
resources are used frequently .
▪ Another disadvantage is that the quality of service may not be as good as that provided by a
dedicated system.
▪ Additionally, there may be security concerns with ODC, as data is stored on remote servers
that may be vulnerable to attack . Finally, there may be issues with compatibility between
different systems, which can make it difficult to integrate ODC with existing systems .

In summary, ODC is a useful model for providing computing resources on an as-needed basis, but
it has some disadvantages that should be considered before adopting it.

Wireless Network:
▪ A wireless network enables people to communicate and access applications and information
without wires.
▪ This provides freedom of movement and the ability to extend applications to different parts
of a building, city, or nearly anywhere in the world. Wireless networks allow people to interact
with e-mail or browse the Internet from a location that they prefer.
▪ Many types of wireless communication systems exist, but a distinguishing attribute of a
wireless network is that communication takes place between computer devices.
▪ These devices include personal digital assistants (PDAs), laptops, personal computers (PCs),
servers, and printers.
▪ Computer devices have processors, memory, and a means of interfacing with a particular type
of network.

8|Page
BSC: Sem-V Information Technologies Sai Chaitanya Degree College

Types of Wireless Networks

WLANS: Wireless Local Area Networks:

▪ WLANS allow users in a local area, such as a university campus or library, to form a network
or gain access to the internet. A temporary network can be formed by a small number of users
without the need of an access point; given that they do not need access to network resources.

WPANS: Wireless Personal Area Networks

▪ The two current technologies for wireless personal area networks are Infra Red (IR) and
Bluetooth (IEEE 802.15). These will allow the connectivity of personal devices within an area
of about 30 feet. However, IR requires a direct line of site and the range is less.

WMANS: Wireless Metropolitan Area Networks

▪ This technology allows the connection of multiple networks in a metropolitan area such as
different buildings in a city, which can be an alternative or backup to laying copper or fibre
cabling.

WWANS: Wireless Wide Area Networks

▪ These types of networks can be maintained over large areas, such as cities or countries, via
multiple satellite systems or antenna sites looked after by an ISP. These types of systems are
referred to as 2G (2nd Generation) systems.
Securities of Wireless Networks

Wi-Fi Protected Access (WPA) :

▪ It is a wireless security protocol designed to address and fix the known security issues in WEP.
WPA provides users with a higher level of assurance that their data will remain protected by
using Temporal Key Integrity Protocol (TKIP) for data encryption. 802.1x authentication has
been introduced in this protocol to improve user authentication.

Wi-Fi Protected Access 2 (WPA2):

▪ It is based on IEEE 802.11i, is a new wireless security protocol in which only authorised users
can access a wireless device, with features supporting stronger cryptography (e.g. Advanced
Encryption Standard or AES), stronger authentication control (e.g. Extensible Authentication
Protocol or EAP), key management, replay attack protection and data integrity.

9|Page
BSC: Sem-V Information Technologies Sai Chaitanya Degree College

Bluetooth:
 Bluetooth wireless technology is a short-range communications technology intended to
replace the cables connecting portable unit and maintaining high levels of security.
 Bluetooth technology is based on Ad-hoc technology also known as Ad-hoc Pico nets, whichis
a local area network with a very limited coverage.
 Bluetooth specification details the entire protocol stack.
Bluetooth employs Radio Frequency (RF) for communication. It
makes use of frequency modulation to generate radio waves in
the ISM band.

The usage of Bluetooth has widely increased for its special features.

1. Bluetooth offers a uniform structure for a wide range of devices


to connect and
communicate with each other.
2. Bluetooth technology has achieved global acceptance such that
any Bluetooth enabled
device, almost everywhere in the world, can be connected with
Bluetooth enabled devices.
3. Low power consumption of Bluetooth technology and an offered range of up to ten meters
has paved the way for several usage models.
4. Bluetooth offers interactive conference by establishing an adhoc network of laptops.
Bluetooth usage model includes cordless computer, intercom, cordless phone and mobile
phones.

Artificial Intelligence:

▪ Artificial intelligence (AI) is the intelligence demonstrated by machines, in contrast to the


natural intelligence displayed by humans and animals.
▪ It is a field of computer science that aims to create machines that can perform tasks that
would normally require human intelligence, such as visual perception, speech recognition,
decision-making, and language translation.
▪ AI is a broad field that includes several subfields, such as machine learning, natural
language processing, robotics, and computer vision.
▪ The advantages of AI include efficiency through task automation, data analysis for informed
decisions, assistance in medical diagnosis, and the advancement of autonomous vehicles .
▪ AI can also help in improving the accuracy and speed of tasks, reducing errors, and
increasing productivity .

10 | P a g e
BSC: Sem-V Information Technologies Sai Chaitanya Degree College

▪ However, there are some disadvantages to AI.


▪ One of the main disadvantages is that AI can be expensive to develop and implement .
▪ Another disadvantage is that AI can lead to job displacement, as machines can replace
human workers in certain tasks .
▪ Additionally, there may be ethical concerns about bias and privacy, security risks from
hacking, and a lack of human-like creativity and empathy .

▪ In summary, AI has the potential to bring about significant benefits to society, but it also
raises ethical and social concerns that should be considered before adopting it.

11 | P a g e

You might also like