ITT501 Chapter 1
ITT501 Chapter 1
(ITT501)
Chapter 1 -
Introduction
Topic Outline
▰ Background and ▰ Mobile and wireless
history of networking computing
and the internet ▰ Network Security
▰ Network Architecture ▰ Networked
and Protocols multimedia system
▰ Client/Server
paradigms
▰ Distributed
Computing 2
Netcentric Computing
▰ CC2001 introduced a Knowledge Area (KA)
entitled “Net-Centric Computing”, which
encompassed a combination of topics
including traditional networking, web
development, and network security.
▰ range of sub-specialities including:
○ computer communication network
concepts and protocols, multimedia
systems, Web standards and technologies,
network security, wireless and mobile 3
Netcentric Principle
▰ Net-Centric Computing (NCC) principle is
based on a distributed environment where
multiple components, possibly across
geographical boundaries, that communicate
and coordinate their actions through
message passing. [2]
▰ To an actor outside this system, it appears as
if a single coherent system.
▰ Example : The Internet
4
The Internet
5
Background
and history of
networking
and the
internet
6
7
NETWORK
▰ Computer network is a collection of
computing devices that are connected in
various ways in order to communicate and
share resources
▰ Usually, the connections between
computers in a network are made using
physical wires or cables
▰ However, some connections are
wireless, using radio waves or infrared signals
8
NETWORK
▰ Computer networks have opened
up an entire frontier in the world of
computing called the client/server
model
9
History of Network
▰ The Advanced Research Projects Agency
Network (ARPANET) is one of the world's first packet
switching networks, the first network to
implement TCP/IP, and was the main progenitor of
what was to become the global Internet. (later DARPA)
▰ ARBA network was initially funded by the Advanced
Research Projects Agency (ARPA, later DARPA) within
the U.S. Department of Defense for use by its projects
at universities and research laboratories in the US.
▰ The packet switching of the ARPANET, together with
TCP/IP, would form the backbone of how the Internet
10
Network and Internet History
Timeline
▰ https://www.computerhope.com/
history/network.htm
11
INTERNET
▰ It is the largest network in the world that
connects hundreds of thousands of individual
networks all over the world.
▰ The popular term for the Internet is the
“information highway”.
▰ Rather than moving through geographical
space, it moves your ideas and information
through cyberspace – the space of electronic
movement of ideas and information
12
13
Internet Ownership
▰ No single person or company owns the
Internet or even controls it entirely. As a
wide-area network, it is made up of many
smaller networks. These smaller networks
are often owned and managed by a person
or organization. The Internet, then, is really
defined by how connections can be made
between these networks.
14
World Wide Web
(WWW)
▰ The Web (World Wide Web) consists of
information organized into Web pages
containing text and graphic images.
▰ It contains hypertext links, or highlighted
keywords and images that lead to related
information.
▰ A collection of linked Web pages that has a
common theme or focus is called a Web site.
15
16
Network
Architecture
and Protocols
17
Network Architecture
▰ Understanding of the relationships
between (architectural) components of the
network.
20
WAN Topologies
1) Peer-to-peer WANs
2) Ring WANs
3) Star WANs
4) Full-mesh WANs
5) Partial-mesh WANs
6) Two-tiered
7) Three-tiered
8) Hybrids
21
Connections
▰ Internet backbone A set of high-speed
networks that carry Internet traffic
22
▰ Internet: LANs, WANs, and
individual devices connected via
TCP/IP software
▰ Intranet: private net accessible to
internal users
▰ Extranet: intranet extended to
include some external users
▰ Virtual private network (VPN): uses
public network as if it is private
23
Ports and Addresses
▰ Ports are destination points within a host
computer.
▰ Processes are attached to the ports, enabling
them to communicate.
▰ Transport layer addresses are composed of
network address of the host computer and a
port number.
▰ In the Internet every host is assigned a unique
IP number which is used in routing.
▰ In an Ethernet each host is responsible for 24
Protocols
▰ The term protocol refers to a well-known set of rules
and formats to be used in order to perform a task. For
example, a task of communicating between processes.
▰ Parts of a protocol:
○ A specification of a sequence of messages that must
be exchanged.
○ A specification of the format of the data in the
messages.
▰ Existence of well-known (standard) protocols enables
the separate components of the distributed systems to
be developed independently in different languages and
25
26
Client/Server
paradigms
27
▰ A simple definition of
Client/Server is
28
▰ Servers
○ Run all the time (i.e. infinite)
○ Provide service to any client
○ Typically specialize in providing a
certain type of service, e.g. Mail.
○ Listen to a well-known port and
passively open connection.
▰ Clients
○ Run when needed, then terminate (i.e.
finite)
○ Actively Open TCP or UDP connection
with Server’s socket.
29
▰ Client/server architecture has many
variations based on tiers.
▰ tier architectures try to separate the
components into different tiers/layers
○ Tier: physical separation
○ Layer: logical separation
▰ tier architectures have the same
components
o Presentation
o Business/Logic
o Data 30
Layers
▰ Presentation Layer
○ Static or dynamically generated content rendered by
the browser (front-end)
▰ Logic Layer
○ A dynamic content processing and generation level
application server, e.g., Java EE, ASP.NET, PHP,
platform (middleware)
▰ Data Layer
○ A database, comprising both data sets and the
database management system or RDBMS software that
manages and provides access to the data (back-end)
31
1-Tier Architecture /
Standalone
▰ All 3 layers are on the same machine
o All code and processing kept on a single
machine. sometimes access by dump
terminal
▰ Presentation, Logic, Data layers are
tightly connected
o Scalability: Single processor means hard
to increase volume of processing
o Portability: Moving to a new machine
may mean rewriting everything
o Maintenance: Changing one layer
32
requires changing other layers
2-Tier Architecture
▰ Database runs on Server
o Separated from client
o Easy to switch to a different database
▰ Presentation and logic layers
still tightly connected (coupled)
o Heavy load on server
o Potential congestion on network
o Presentation still tied to business logic
33
3-Tier Architecture
o Each layer can
potentially run on a
different machine
o Presentation, logic, data
layers disconnected
o Change in platform
affects only the layer
running on that
particular platform
34
Client/Server
Technologies
35
Types of servers
▰ Application Servers ▰ List Servers
▰ Audio/Video Servers ▰ Mail Servers
▰ Chat Servers ▰ News Servers
▰ Fax Servers ▰ Proxy Servers
▰ FTP Servers ▰ Telnet Servers
▰ Groupware Servers ▰ Web Servers
▰ IRC Servers ▰ Database Servers
36
Distributed
Computing
37
Distributed Computing is a field of
computer science that studied
distributed system
38
Distributed Systems
▰ Distributed systems have
autonomous components
▰ Distributed systems may be built
using heterogeneous technology
▰ Distributed system components may
be used exclusively
▰ Distributed systems are executed in
concurrent processes
▰ Distributed systems have multiple
points of failure
39
Centralized Systems
▰ Centralized systems have non-
autonomous components
▰ Centralized systems are often
build using homogeneous
technology
▰ Multiple users share the
resources of a centralized
system at all times
▰ Centralized systems have a
single point of control and of
failure 40
Every application is part of a business model.
▰ They are
developed using
different
platforms, OS
and programming
languages.
▰ must make them
work together.
41
Middleware technologies enables the
components to communicate to coordinate
their activities.
42
Advantages of Distributed
Systems
▰ Collaborative
▰ Expandability
▰ Local autonomy
▰ Improved performance
▰ Improved reliability and availability
▰ Potential cost reductions
43
Disadvantages of Distributed
Systems
▰ Network reliance
▰ Complexities
▰ Security
44
Mobile and
wireless
computing
45
Mobile Computing
▰ Mobile computing is to describe technologies
that
○ enable people to access network services
anyplace, anytime, and anywhere,
○ with portable and wireless computing and
communication devices.
46
▰ Aspects of mobility
○ User mobility
■ Between different geographical locations
■ Between different networks
■ Between different communication devices
■ Between different applications
○ Device portability
■ Between different geographical locations
■ Between different networks
47
Applications of mobile
computing
▰ Vehicles
○ transmission of news, road condition, weather,
music via DAB
○ personal communication using GSM
○ position via GPS
○ local ad-hoc network with vehicles close-by to
prevent accidents, guidance system, redundancy
○ vehicle data (e.g., from busses, high-speed trains)
can be transmitted in advance for maintenance
▰ Medical
○ Nurses/Doctors in Medical offices are now using
Wireless Tablet PCs/WLAN to collect and share
patient information.
48
Applications of mobile
computing
▰ Sales
○ Sales representatives are using Tablet PCs with
Smart phones for presentation,
transmitting/access information among office,
hotel, and customer location.
▰ Emergencies
○ Early transmission of patient data to the hospital,
current status, first diagnosis
○ Provide mobile infrastructure in dealing with
Natural Disaster (earthquake, hurricane, fire),
terrorist attacks, war, ...
▰ Smart Environment
○ Smart home, Smart Car, Smart City
49
Challenges in mobile
computing
▰ Mobility means changes
▰ Hardware
○ Lighter, smaller, energy management, user
interface
▰ Low bandwidth, high bandwidth variability
○ Kbit/s to Mbit/s, bandwidth fluctuation
▰ Security risk
○ Devices more vulnerable, endpoint
authentication harder
▰ Heterogeneous network
○ Different devices, interfaces and protocols
50
Challenges in mobile
computing
▰ Location awareness
○ Locality adaptation
▰ Higher loss-rates, higher delays, more jitter
○ Connection setup time, hand-off
▰ Restrictive regulations of frequencies
○ Frequencies have to be coordinated
51
Wireless Network
▰ A wireless network allows devices to stay
connected to the network but roam
untethered to any wires.
▰ Access points amplify Wi-Fi signals, so a
device can be far from a router but still be
connected to the network.
52
Wireless Network
Elements
53
Wireless Network
Elements
54
Wireless Network
Elements
55
Wireless Network
Elements
56
Wireless Ad Hoc
Network
▰ Wireless Ad Hoc Network (peer to peer)
○ A collection of autonomous nodes that
communicate with each other by forming a
multi-hop radio network in a decentralized
manner.
○ No infrastructure, no default router available
○ “every” node needs to be a router
▰ Mobile Ad Hoc Networks (MANET)
○ Host movement frequent
○ Topology change frequent
▰ 57
Wireless Ad Hoc
Network
▰ Wireless Ad Hoc Sensor Networks
○ A number of sensors spread across a
geographical area.
○ Limited resources on sensors
58
Wireless Ad Hoc
Network
59
Network
Security
60
Network Security Key
Elements
▰ Confidentiality
○ Preserving authorized restrictions on information
access and disclosure, including means for
protecting personal privacy and proprietary
information.
▰ Integrity
○ Guarding against information modifications or
destruction, including ensuring information non-
repudiation and authenticity.
▰ Availability
○ Ensuring timely and reliable access to and use of
61
Security Attacks,
Mechanisms & Services
• Security Attack
– Any action that compromises the security
of information
• Security Mechanism
– A process / device that is designed to
detect, prevent or recover from a security
attack.
• Security Service
– A service intended to counter security
attacks, typically by implementing one or
more mechanisms. 62
Threats & Attacks
64
65
Security Attacks
classification
▰ passive attacks - eavesdropping on, or monitoring of,
transmissions to:
○ obtain message contents, or
○ monitor traffic flows
▰ active attacks – modification of data stream to:
○ masquerade of one entity as some other: man-in-the-
middle
○ replay previous messages
○ modify messages in transit
○ denial of service
66
Causes of network security
threats
▰ Technology weaknesses
▰ Configuration weaknesses
▰ Policy weaknesses
▰ Human weaknesses
67
Networked
multimedia
system
68
Multimedia System
▰ Multimedia system is a computer (machine)
that can transmit and accept information
(multiple media) from the external world.
▰ supports the integrated storage, transmission
and representation of the discrete media types
text, graphics and image and the continuous
media types audio and video on a digital
computer.
69
Media types
Text Hypertext
3D Graphics Games
70
Features of Multimedia
System
▰ Very high processing power
- In the modern multimedia context, movement and
processing of large amounts of data in real-time are
emphasized.
- Include support hardware such as graphics and video
adapters, digital signal processors and etc.
▰ Network support
- To apply client-server paradigm in building
multimedia application, high-speed support from the
network subsystem is needed.
- It should be able to stream the data out of the disk
directly, to minimize delay.
73
Multimedia
Applications
▰ Network application that transmit audio
and video
▰ (“continuous media”)
QoS
network provides
application with level of
performance needed for
application to function.
74
Classes of Multimedia
Applications
▰ Streaming Stored Audio and Video
▰ Streaming Live Audio and Video
▰ Real-Time Interactive Audio and
Video
75
Challenges
▰ TCP/UDP/IP suite provides best-effort, no
guarantees on expectation or variance of
packet delay
77