0% found this document useful (0 votes)
190 views24 pages

CHAPTER FOUR Networks and Cloud Computing

The document discusses network fundamentals including different types of networks like LAN, MAN, and WAN. It also covers topics like peer to peer networks, client/server networks, advantages and disadvantages of networks, and the internet and world wide web.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
190 views24 pages

CHAPTER FOUR Networks and Cloud Computing

The document discusses network fundamentals including different types of networks like LAN, MAN, and WAN. It also covers topics like peer to peer networks, client/server networks, advantages and disadvantages of networks, and the internet and world wide web.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 24

CHAPTER 4

Networks and
Cloud Computing

03/29/2024 1
Contents
Network Fundamentals
The Internet and World Wide Web
The Internet of Things
Cloud Computing

03/29/2024 2
Network Fundamentals
 Network: is a collection of two or more
computers or network devices , which are
connected together to share information and
resources.
 A network can be as few as several personal
computers on a small network or as large as the
internet, a worldwide network of computers.
 Classification Based on Coverage Area
• LAN
• MAN
• WAN
 Classification Based on Security and Access
• Peer – to – Peer
• Client/Server

03/29/2024 3
Local Area Network
 Local Area Network (LAN): a computer network that spans
only a small geographical area, such as an office, building or
campus.
 It connects computers & other devices within a limited
physical area such as an office, classroom, building etc.
 To communicate each PC has a circuit board called a network
interface card (NIC)
 NIC is simply a circuit board or card that is installed in a
computer so that it can be connected to a network.

03/29/2024 4
Metropolitan Area Network
 Metropolitan Area Network (MAN): are large computer
networks usually spanning a campus or a city.
 They typically use wireless infrastructure or optical fiber
connections to link their sites.
 For instance a university or college may have a MAN that
joins together many of their local area networks (LANs)
situated around site of a fraction of a square kilometre.
 It may cover a group of nearby corporate offices or a city
and could either be private or public.
 It can support both data & voice, and might even be related
to the local cable television network. It is a city based
network

03/29/2024 5
Wide Area Network
 Wide Area Network (WAN): A computer network that spans a
relatively large geographical area.
 Typically, a WAN consists of two or more LANs. Computers
connected to a wide-area network are often connected through
public networks, such as the telephone system.
 They can also be connected through leased lines or satellites. The
largest WAN in existence is the internet.
WANS differ from LANS in the following ways:
 WANs cover greater distance. But not LAN
 WAN speeds are slower. But LAN speed is faster
 WANs can be connected on demand or be permanently connected. But
LANs have permanent connections between stations.
 WANs can use public or private network transports. But LANs typically
use private transports.
 WANs can use either full- or half-duplex communications. But LANs
typically use half-duplex communications.
03/29/2024 6
Classification Based on Security and Access
Based on security and access, we may classify networks into peer-to-peer
and client/server networks technologies.
Peer-to-peer networks
 Peer-to-peer networks – all computers are equal - they are peers. Each
computer can be a client that requests resources and a server that provides
resources upon request. They are characterized by the following:
 Security is not centralized; each computer is responsible to check access
rights for its resources.
 Network is not scalable; it is good only for a few number of computers
(10).
 Each user is responsible for local backup.
 No specialized operating system is required; the operating systems used
in standalone computers like Windows NT 4.0 Workstation, Windows
95/98, Windows 2000 Pro, etc. are sufficient.

03/29/2024 7
Client/server networks
Client/server networks – there exist dedicated servers which only
provide resources/services when requested. They characterized by the
following:
 Security is centralized and tighter. All user accounts are stored in
the same database on the server.
 The network is highly scalable; you can have tens of thousands of
workstations in the network.
 Backup is centralized and is done by a person responsible for the
job (backup operator).
 Specialized networking operating systems are required, such as
Windows NT 4.0 server, Windows 2000 server, Novell NetWare,
etc.

03/29/2024 8
Advantages and Disadvantages of Installing a
Network
Advantages: installing a network has its own great advantages
from those:-
Speed: Networks provide a very rapid method for sharing
and transferring files.
 Without a network, files are shared by copying them to
floppy disks, then carrying or sending the disks from one
computer to another.
 This method of transferring files (referred to as sneaker-
net) is very time-consuming.
Cost: Networkable versions of many popular software
programs are available at considerable savings when
compared to buying individually licensed copies.
 Besides monetary savings, sharing a program on a network
allows for easier upgrading of the program.
 The changes have to be done only once, on the file server,
instead of on all the individual workstations. 03/29/2024 9
Continued…
 Security: Files and programs on a network can be designated as
"copy inhibit,“
 so that you do not have to worry about illegal copying of
programs.
 Also, passwords can be established for specific directories to
restrict access to authorized users.
 Centralized Software Management: One of the greatest benefits
of installing a network at a school is the fact that all of the
software can be loaded on one computer (the file server).
 This eliminates that need to spend time and energy installing
updates and tracking files on independent computers throughout
the building.
 Resource Sharing: Sharing resources is another area in which a
network exceeds stand-alone computers.
 Most organizations cannot afford enough laser printers, fax
machines, modems, scanners, and CD-ROM players for each
computer.
 However, if these or similar peripherals are added to a network,
03/29/2024 10
they can be shared by many users.
 Electronic Mail: The presence of a network provides the hardware
necessary to install an e-mail system.
 E-mail aids in personal and professional communication for all school
personnel, and it facilitates the dissemination of general information to
the entire school staff.
 Electronic mail on a LAN can enable students to communicate with
teachers and peers at their own school.
 If the LAN is connected to the Internet, students can communicate with
others throughout the world.
 Flexible Access: If you take School networks as example, allow students
to access their files from computers throughout the school.
 Students can begin an assignment in their classroom, save part of it on a
public access area of the network, then go to the media center after
school to finish their work.
 Students can also work cooperatively through the network.
 Workgroup Computing: Workgroup software (such as Microsoft
BackOffice) allows many users to work on a document or project
concurrently.
 For E.g, educators located at various schools within a county could
simultaneously contribute their ideas about new curriculum standards to
the same document. 03/29/2024 11
Disadvantages: there are some disadvantages while installing a
network from those:
 Expensive to Install: Although a network will generally save
money over time, the initial costs of installation can be
prohibitive.
Cables, network cards, and software are expensive, and the
installation may require the services of a technician.
 Requires Administrative Time: Proper maintenance of a network
requires considerable time and expertise
 File Server May Fail: Although a file server is no more
susceptible to failure than any other computer, when the files
server "goes down," the entire network may come to a halt. When
this happens, the entire may lose access to necessary programs and
files.
 Cables May Break: The Topology chapter presents information
about the various configurations of cables.
 Some of the configurations are designed to minimize
inconvenience of a broken cable; with other configurations, one
broken cable can stop entire network. 03/29/2024 12
The Internet and World Wide Web
What is Internet?
 World wide connection of network devices

 It is a huge collection of computer networks that can communicate with each other

 Or a network of networks.

 It is an umbrella under which many different networks freely exchange


information.
 How does the Internet work? In order to make the Internet work, it requires:
 a physical connection between the computers
 A common language (called TCP/IP - Transmission Control Protocol/Internet
Protocol) for the computers to communicate over the Internet. By using TCP/IP
Protocol, all kinds of computers with different operating systems run on the Internet.
 Inter = international Net = networking => an international network in w/c huge
amount of computers /network devices are connected each other world widely
 The owner of internet is unknown which is not controlled by a single
organization.

03/29/2024 13
Getting connected to Internet:
 we can connect to the Internet in one of two basic ways,

 dialing into an Internet service provider's (ISP) computer called dial-up


internet connection.
 To establish a conventional dial-up connection to the Internet, you will need: an
account with an ISP, a telephone connection and Modem (external/internal).
 Advantages of dial-up connection: Is not costly, It is movable, Less monthly
payment
 Disadvantages of dial-up connection: Not faster
 with a direct connection to an Internet service provider called broad band or
leased line internet connection.
 You can also get a direct connection to your ISP, where you have a fixed cable
or a dedicated phone line to the ISP.
 Advantages of broad band connection: Faster and Fixed monthly payment

 Disadvantages of broad band connection: Costly and Not Flexible

03/29/2024 14
Internet Applications and Services
Internet gives diffident types of services from those the main and commonly
used services are

World wide web,

Electronic mail,

File Transfer Protocol (FTP),

Telnet,

Internet Relay Chat (IRC),

Internet Telephony,

Video conferencing etc.

03/29/2024 15
World Wide Web (WWW)
The World Wide Web (WWW) is a vast collection of documents
stored on Internet computers.
WWW uses Hypertext Mark-up language (HTML) to design a web
document.
The information on the www/Internet contains or the web
documents on the internet contains
 links when clicked that lead to other web pages and they contain
graphics, sound and so :
The web is not linear - a user can click on any of the links and
jump to the related document.
The web is rich in multi-media elements – it includes text, voice,
video, pictures, etc.
The web is interactive - A web user can fill in forms on-line, run
programs, select options
03/29/2024 16
The Internet of Things (IoT)
The Internet of Things consists of devices connected to the Internet that
aren’t what we would generally think of as computers (or even mobile
computers).
Let’s take a look at examples in a few different realms.
 Devices within the Internet of Things found in a “Smart Home” might
include:
 Smart Lightbulbs,
 Sensors (which might be used to track which rooms have people in
them),
 Thermostats,
 Smart Speakers (which allow your music to follow you from room to
room).
 Dorms
 One of the better uses of IoT that we have seen is that the Stanford
03/29/2024 17
dormitories have laundry machines and dryers on the Internet.
 There are quite a few devices in Cars and Transportation
Infrastructure that could count as IoT.
 The car itself contains multiple devices that could use the IoT to
communicate, including navigation systems, entertainment
systems, heating a/c, or even engine sensors and actuators.
 Cars can pass information to one another on road conditions.
 Sensors can be embedded within roads or at traffic lights.
 Parking meters can be integrated into the Internet, letting
someone see where parking spaces are available or how much
time is left on their meter.
 Sensors can be used to allow engineers to keep track of
the health of infrastructure such as bridges.

03/29/2024 18
 Industrial use of the Internet of Things is often distinguished as
forming its own category.
 This is sometimes referred to as IIoT (Industrial Internet of
Things).
 Usage scenarios for IIoT include:
 Instrumenting an industrial process and including sensors and
Internet actuated
controllers.
 Inventory management potentially done
with RFID tags (more on this below).
 Fleet (taskforce) Monitoring.
 Security such as motion sensors, cameras,
and lights.
 Radio Frequency IDs (RFIDs) are particularly
useful for IIoT applications.
 An RFID is similar to the ubiquitous bar codes
found on all products sold in
grocery stores and many other types of stores.
03/29/2024 19
 An RFID allows us to give different items an ID
 Let’s take a look at some issues that arise with IoT.
 IoT devices obviously need to connect to the Internet.
 While some connect using WiFi, this takes a fair amount of electric
power.
 One common choice is Bluetooth Low Energy.
 Once we start putting all manner of devices on the Internet, our
usage of Internet numbers will go up astronomically.
 Use of IPv6 is important for widespread adoption of IoT.
 Security is a particular concern with IoT
 IoT devices may be particularly vulnerable for a variety of reasons.
 IoT devices are consumer devices that are often cost sensitive,
keeping costs down may result in less attention to security than may
be warranted.
 They are often developed by startups with innovative ideas, but
perhaps lacking in specialized security skills.
 They may not be updated when vulnerabilities are found – after all,
who thinks about keeping their lightbulbs updated with security
patches.
03/29/2024 20
IoT enabling technologies
The technologies which are cooperative with IoT those are as
follows.
 Wireless sensor networks: Wireless sensor network comprises of
distributed devices, wireless sensors.
 Cloud computing: It is an emerging technology which enables
on-demand network access to computing resources like network
servers, storage, applications and services that can be rapidly
provisioned and released.
 Big Data analytics: various type of data are generated from
different IoT domain
 Embedded systems: An embedded system is a computer system
that has hardware and software embedded to perform specific
task.
03/29/2024 21
Cloud Computing
 The basic concept of cloud computing is that instead of
limiting ourselves to what’s on our own personal computer, we
instead access computing resources available via the network.
 Under this basic definition, anything we access out on the
network could be considered cloud computing.
 Providing Virtual Computing Devices for Business
 Often however, when we hear the term “Cloud Computing,”
particularly in a business context, what’s being discussed is
replacing direct physical installation, storage, and maintenance
of computers on premise with remote resources partly
managed by a third party.
 There are lots of different models for how this might work, and
we’ll explore some of the most common.

03/29/2024 22
Keep in mind when we look at these models, the
comparison point is the traditional (non- Cloud) approach
where:
The company manages and stores its own computers.
It is responsible for making sure that the computers are
secure, that they have sufficient electricity, that they stay
connected to the network.
It is responsible for buying more computers as needed,
and installing those computers.
It is responsible for maintaining the computers, making
sure that they are patched.
03/29/2024 23
Cloud Computing Models
 Let’s take a look at some common cloud computing models in use
today.
Infrastructure as a Service (IaaS)
 With IaaS, the company is providing basic computing infrastructure
on the cloud.
 It’s up to the customer to organize and arrange that infrastructure as
needed.
 Amazon Web Services (AWS) Virtual Private Cloud (VPC) is an
example of IaaS.
Platform as a Service (PaaS)
 With this model, a computing platform is provided for users.
 Users are not responsible for configuring it or maintaining it.
 Users only responsible for the application software running on it.
Software as a Service (SaaS)
 SaaS is a bit different from the other Cloud Computing models.
 In those models, my company is creating some sort of unique
03/29/2024 24
computing application.

You might also like