Networks, Cloud Computing, and IoT - University Slides

Document Details

TopnotchSugilite8584

Uploaded by TopnotchSugilite8584

Universitas Indonesia

2025

Pramitha Dwi Larasati

Tags

cloud computing internet of things computer networks

Summary

These University slides cover networks, cloud computing, and the Internet of Things. Topics include network fundamentals, topologies, communication media, cloud computing approaches (public, private, hybrid), and the Internet of Things. The document is intended for undergraduate students.

Full Transcript

Topic 7 Networks, Cloud Computing, and Internet of Things By: Pramitha Dwi Larasati, Widia Resti Fitriani, Kamila Alifia CSIM601280 - Prinsip Prinsip Sistem Informasi Program Sarjana Sistem Informasi Rev: 17-Mar-2025 Learning Objectives...

Topic 7 Networks, Cloud Computing, and Internet of Things By: Pramitha Dwi Larasati, Widia Resti Fitriani, Kamila Alifia CSIM601280 - Prinsip Prinsip Sistem Informasi Program Sarjana Sistem Informasi Rev: 17-Mar-2025 Learning Objectives Describe network fundamentals, including topologies and types in common use today. Describe communication media and its various materials and technologies. Describe the processes and technologies that facilitate how the Internet and the Web function. Identify three commonly used cloud computing approaches and their applications. Define what is meant by the IoT and its applications in everyday life and business operations. 2 Networks: An Interconnected World 3 Network Fundamentals Computer network The communications media, devices, and software connecting two or more computer systems or devices. Communications medium Any material substance that carries an electronic signal to support communications between a sending and a receiving device. Network topology The shape or structure of a network, including the arrangement of the communication links and hardware devices on the network. The three most common network topologies in use today are the star, bus, and mesh. 4 Network Topologies STAR network BUS network MESH network All network devices All network devices are Uses multiple access points connect to one another connected to a common to link a series of devices through a single central backbone that serves as a that speak to each other to device called the hub shared communications form a network connection node. medium. across a large area. 5 Network Types (1 of 2) Personal Area Networks (PAN) PAN is a wireless network that connects information technology devices close to one person. With a PAN, you can connect a laptop, digital camera, and portable printer without cables. Local Area Networks (LAN) A network that connects computer systems and devices within a small area, such as an office, home, or several floors in a building. Typically, LANs are wired into office buildings and factories. 6 Network Types (2 of 2) Metropolitan Area Networks (MAN) MAN is a network that connects users and their computers in a geographical area that spans a campus or city. Might redefine the many networks within a city into a single larger network or connect several LANs into a single campus MAN. Wide Area Networks (WAN) WAN is a network that connects large geographic regions. Example: making a long-distance phone call or accessing the Internet Might be privately owned or rented and includes public (shared-users) networks. Usually consist of computer equipment owned by the user, together with data communications equipment and network links provided by various carriers and service providers. 7 Communication Media Guided Transmission Media Types Coaxial cable Twisted-pair wire Fiber-optic cable 8 Wireless Communication Media (1 of 4) - Near field communication (NFC): very short-range wireless connectivity technology that enables two devices placed within a few inches of each other to exchange data. - Bluetooth: wireless communications specification that describes how cell phones, computers, faxes, printers, and other electronic devices can be interconnected over distances of 10 to 30 feet at a rate of about 2 Mbps. - Wi-Fi: medium-range wireless communications technology brand owned by the Wi-Fi Alliance. 9 Wireless Communication Media (2 of 4) - Microwave Transmission is a high-frequency (300 MHz to 300 GHz) signal sent through the air. Terrestrial (Earth-bound) microwaves are transmitted by line-of-sight devices, so the line of sight between the transmitter and receiver must be unobstructed. - A communications satellite also operates in the microwave frequency range. - Communications satellites are relay stations that receive signals from one earth station and rebroadcast them to another. 10 Wireless Communication Media (3 of 4) Wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor. - 1G: of wireless communications standards originated in the 1980s and was based on analog communications - 2G: networks were fully digital, superseding 1G networks in the early 1990s. With 2G networks, phone conversations were encrypted, mobile phone usage was expanded, and short message services (SMS) or texting was introduced - 3G: wireless communications supports wireless voice and broadband speed data communications in a mobile environment at speeds of 2 to 4 Mbps. Additional capabilities include mobile video, mobile e-commerce, location-based services, mobile gaming, and the downloading and playing of music. 11 Wireless Communication Media (4 of 4) - 4G: Networks based on the Long Term Evolution (LTE) standard. - LTE = standard for wireless communications for mobile phones based on packet switching, which is an entirely different approach from the circuit-switching approach employed in 3G communications networks. - 5G: Networks will enable several exciting new applications. - Current generation of autonomous cars are self-contained and make driving decisions based on their knowledge of current traffic and road conditions. - Next generation autonomous cars will interact with other vehicles and “smart roads” exchanging information directly with other cars and/or smart devices strategically positioned along the highways. - Augmented reality (AR) adds a virtual layer over the real world opening the door to a wide range of potential applications. 12 Communication Software - Network operating system (NOS) is a Systems software that controls the computer systems & devices on a network and allows them to communicate with each other. - Network-management software (NMS) is a Software that enables a manager on a networked desktop to monitor the use of individual computers & shared hardware (such as printers), scan for viruses, and ensure compliance with software licenses. - Mobile device management (MDM) software is a Software that manages and troubleshoots mobile devices remotely, pushing out applications, data, patches, and settings while enforcing group policies for security. - Software-defined networking (SDN) is an emerging approach to networking that allows network administrators to have programmable central control of the network via a controller without requiring physical access to all the network devices. 13 Internet Development - In 1969, the US DOD (Department of Defense) began implementing the ARPANET (Advance Research Project Agency Network) project - The project built a communication network between computers, between DOD and DOD contractors, including universities that received research funding from DOD - Communication between computers used the Internet Protocol (IP) which could be routed from one network to another. - The project was very successful, where there was extraordinary development in the network between universities. - As a result of this development, the network related to DOD separated into MILNET and the rest was better known as the Internet (late 80s) 14 How the internet works…? (1 of 4) The Internet works by breaking messages into packets of data that are routed through the network until they reach their desired destination. 15 How the internet works…? (2 of 4) TCP/IP is a collection of communication protocols used to interconnect network devices on packet switching networks such as the Internet. - TCP (Transmission Control Protocol) divides the data to be sent into packets called datagrams. Each packet consists of a header containing information about the host address of the computer sending the data, the data being communicated, and data about the packet which is useful for determining whether the packet is complete or corrupted. - IP (Internet Protocol): Each computer connected to the Internet must have a unique address called IP address. IP receives datagrams from TCP and adds a header containing the address of the host computer being sent and its routing address. MAC (Media Access Control) address: A unique tag for each device that connects to the internet. It helps to make sure that when you send data across a network, like sending an email or streaming a video, the data reaches the right device and not someone else’s. 16 How the internet works…? (3 of 4) Network Hardware; - The switch is a network device that keeps a record of the Media Access Control (MAC) address of all the devices connected to it. - It uses this information to determine to which port a packet of data should be directed. - When a switch receives a packet, it knows exactly which port to send it to, with no significant increase in network response times. - The router is a network device that directs data packets to other networks until each packet reaches its destination. - One of the key features of a data packet is that it not only contains data, but also the destination address of where it’s going. - So once the packets arrive at their destination, that device strips off the header and trailer information and reassembles the entire message based on the numbered sequence of the packets (routing). 17 How the internet works…? (4 of 4) Data is transmitted from one host computer to another on the internet. 18 Accessing the Internet via Internet Service Providers - Users in organizations or at home access the Internet through an ISP, an organization that provides Internet access to people. - Thousands of organizations serve as ISPs, ranging from universities to small Internet businesses to major communications giants (e.g. AT&T, Comcast). - ISP selection criteria are reliability, security, availability of enhanced features, and reputation. - Value-added services ISP: Electronic commerce Network to connect employee or business partners Host computer to establish your own Website Network security and administration, etc - Some ISPs provide direct connection services with digital subscriber lines (DSL), cable, and satellite transmission 19 Accessing the Internet with Wireless Connection -In addition to connecting to the Internet through wired systems such as phone lines and fiber optic cables, wireless Internet service over cellular and Wi-Fi networks has become common. -Thousands of public Wi-Fi services are available in coffee shops, airports, hotels, and elsewhere, where Internet access is provided free, for an hourly rate, or for a monthly subscription fee. -Wi-Fi has even made its way into aircraft, allowing business travelers to be productive during air travel by accessing email and corporate networks. 20 The Web The Web is a system with universally accepted standard for storing, retrieving, formatting and displaying information using Client-Server Architecture [Laudon] The World Wide Web was developed by Tim Berners-Lee at CERN (the European Organization for Nuclear Research) in Geneva. He originally conceived of it as an internal document-management system. From this modest beginning, the Web has grown to become a primary source of news and information, an indispensable conduit for commerce, and a popular hub for social interaction, entertainment, and communication. 21 Client/Server Architecture -Client/server architecture, is a networking approach wherein many clients (end-user computing devices) request and receive services from servers (host computers) on the network. -Servers receive client user requests, process them, and obtain the requested data. -The client computers provide an interface to allow the client computer user to request services of the server computers. 22 Internet vs Web While the terms Internet and Web are often used interchangeably, technically, the two are different technologies. 1. The Internet is the infrastructure on which the Web exists. The Internet is made up of computers, network hardware such as switches, routers, communications media, software, and the TCP/IP protocols. 2. The World Wide Web (Web), on the other hand, consists of server and client software, the hypertext transfer protocol (http), standards, and markup languages that combine to deliver information and services over the Internet. 23 Domain Name System (DNS) (1 of 2) - Domain name is a unique word used as an identity or name for a node in the internet network. - The DNS maps the name people use to locate a Web site to the IP address that a computer uses to locate that Web site. - For example, if you type TechTarget.com into a Web browser, a server behind the scenes will map that name to the IP address 206.19.49.149. - A Uniform Resource Locator (URL) is a Web address that specifies the exact location of a Web page using letters and words that map to an IP address and a location on the host. - The URL is a standard method for identifying the locations of Internet resources like documents. 24 Domain Name System (DNS) (2 of 2) Number of Domains in US Top-Level 25 Hypertext Documents - Web content consists of a combination of text, sound, images and hypermedia (full motion video and executable computer programs) → hypertext or hypermedia documents - Hypertext documents are created using HyperText Markup Language (HTML) - HTML uses instructions called tags (a code that tells the Web browser how to format text—as a heading, as a list, or as body text—and whether images, sound, and other elements should be inserted). - To display the contents of hypertext documents, software called a browser is used. 26 XML & CSS - Extensible Markup Language (XML) is a markup language designed to transport and store data on the Web. - A Cascading Style Sheet (CSS) is a file or portion of an HTML file that defines the visual appearance of content in a Web page. - Using CSS is convenient because you only need to define the technical details of the page’s appearance once, rather than in each HTML tag. - XML is extremely useful for organizing Web content and making data easy to find. Many Web sites use CSS to define the design and layout of Web pages, XML to define the content, and HTML to join the design (CSS) with the content (XML). 27 Intranet & Extranet -Intranet, An internal corporate network built using Internet and World Wide Web standards and products. -Extranet, A network built using Web technologies that links selected resources of the intranet of a company with its customers, suppliers, or other business partners. -Virtual private network (VPN), A secure connection between two points on the Internet; VPNs transfer information by encapsulating traffic in IP packets and sending the packets over the Internet. 28 Cloud Computing and the Internet of Things 29 IS in Action As businesses migrate their email, productivity, and collaboration tools to the cloud, Microsoft Office 365 and Google’s G Suite are two leading online solutions often under consideration. Microsoft’s Office 365 suite includes Outlook; OneDrive; and Word, Excel, PowerPoint, and OneNote for productivity. Enterprise users often make use of additional apps, including Teams; Skype for Business, an audio and video conferencing app; Yammer, a corporate social network; and Planner, a project management app. Google’s G Suite includes Gmail and Calendar; Google Drive; Google Docs, Sheets, and Slides for productivity; and Hangouts. Some enterprise users also use Currents for company-wide discussions. Network administrators can use G Suite’s Admin app to add users, manage devices, and configure security settings. Because apps and services are hosted in the cloud, employees can work wherever they are able to get online. A migration to the cloud enables employees to focus on the core tasks of their jobs rather than setting up and maintaining servers or installing software updates on their devices. Why Learn About Cloud Computing and the Internet of Things (IoT)? Workers in many organizations operate in a cloud-computing environment. The services are run on another organization’s computer hardware, and both software and data are easily accessed. Example of public cloud service providers: Amazon Elastic Compute Cloud (EC2), IBM’s Blue Cloud, Google Cloud Platform, and Microsoft Azure. Cloud provide offers several benefits: Cost-saving Scale up or down easily Collaborate easily Cloud Computing A computing environment where software and storage are provided as an Internet service and are accessed with a Web browser. It enables file sharing, data storage and backup, media streaming, web site hosting, information security, and communication services to be delivered via the Web. Three commonly used approaches to cloud computing: 1. Public cloud computing → Cloud service provider offers its cloud-based services to the public. 2. Private cloud computing → Cloud technology is used within the confines of a private network 3. Hybrid cloud computing → Combines elements of both public and private cloud computing, accessed through a private network. Public Cloud Computing (1 of 6) A service provider organization owns and manages the infrastructure (including computing, networking, storage devices, and support personnel). For example: Amazon, Google, and Microsoft Cloud user organizations accessing slices of shared resources via the Internet. Increasing amounts of computing, network, and storage capacity can be delivered on demand, without capital investment from the cloud users. Great solution for organizations whose computing needs vary greatly depending on changes in demand. Public Cloud Computing (2 of 6) Three main types of services: 1. Infrastructure as a Service (IaaS) 2. Platform as a Service (PaaS) 3. Software as a Service (SaaS) Public Cloud Computing (3 of 6) Infrastructure as a Service An organization outsources the equipment used to support its data processing operations including servers, storage devices, and networking components. The service provider owns the equipment and is responsible for housing, running, and maintaining it. The outsourcing organization may pay on a per-use or monthly basis. Public Cloud Computing (4 of 6) Platform as a Service Users are provided with a computing platform Typically including operating system, programming language execution environment, database services, and a Web server. Also including the networks, servers, storage, and other services. The user can control software deployment and configuration settings. The user can develop, test, and run their software solutions on a cloud platform without the cost and complexity of buying and managing the underlying hardware and software. Public Cloud Computing (5 of 6) Software as a Service Provides users with access to software remotely as a Web-based service. Pricing is based on a monthly fee per user and typically results in lower costs than a licensed application. Because the software is hosted remotely, users do not need to purchase additional hardware to provide increased capacity. The service provider handles necessary software maintenance and upgrades. Public Cloud Computing (6 of 6) Key benefits to organizations: Issues: 1. Reduced costs 1. Complex pricing 2. Flexible computing arrangements capacity 2. Wide variations in 3. Increased redundancy in performance over time the event of disaster 3. Inadequate data security 4. Vendor lock-in Private Cloud Computing (1 of 2) A single-tenant cloud For organizations that are concerned with the security of their data in a public cloud. An organization might establish several private clouds for each department. Each private cloud has a defined set of available resources, users, and quotas that limit how much capacity users of that cloud can consume. Private Cloud Computing (2 of 2) Two distinct type: On-premise private cloud Built by the organization itself Virtual private cloud A service provider build and manage the organization’s private cloud For example: Pfizer uses Amazon’s VPC (Virtual Private Cloud) solution to handle computing needs at peak times securely. Disadvantage: Deep technical skills and sophisticated software are needed to successfully build and manage a private cloud. Hybrid Cloud Computing (1 of 2) Composed of both private and public clouds integrated through networking. The public cloud is used to run applications with less sensitive security requirements and highly fluctuating capacity needs. The private cloud is used to run more critical applications. Network security is a critical point. Hybrid Cloud Computing (2 of 2) Hybrid cloud computing provides flexibility, scalability, and cost efficiency with low security risks. Data and applications can be shared between the two clouds. Businesses can scale their in-house computing infrastructure to the public cloud to handle any additional demand for resources. Companies pay only for the additional resources they use during peak times. When moving to a multi-cloud environment, organizations must consider the performance, security, regulatory compliance, availability requirements, and total cost savings. Autonomic Computing The ability of IT systems to manage themselves and adapt to changes in the computing environment, business policies, and operating objectives. Goal: to create complex systems that run themselves, while keeping the system’s complexity invisible to the end user. Four key functions: self-configuring, self-healing, self-optimizing, self-protecting. The Internet of Things (IoT) (1 of 2) A network of physical objects or “things” embedded with sensors, processors, software, and network connectivity capability to enable them to exchange data with the manufacturer of the device, device operators, and other connected devices. The Internet of Things (IoT) (2 of 2) A sensor is a device that is capable of sensing something about its surroundings E.g.: pressure, humidity, pH level, temperature, motion, vibration. An operational historical database contains data from many sensors that connected to the public Internet. The IoT takes automation to a deep, broad level—enables interconnectivity between Estimated number of devices connected to various devices the IoT worldwide Examples of IoT Home Wearable Smart City Autonomous Vehicle Automation Devices Business Benefits and Potential Issues of IoT Business Benefits Potential Issues 1. Reduce costs to achieve a 1. A faulty sensor or bad network competitive advantage connection results in missing data 2. Deepen the organization’s and lacks a time stamp understanding of consumer 2. Security risk from exposing preferences and behaviors company information and internal 3. Improve customer service systems to hacking, viruses, and experience destructive malware through the Internet, and wreck critical 4. Improve workplace safety physical infrastructure Types of IoT Applications The End