SlideShare a Scribd company logo
1 of 44
Client Server System and Remote
           Connectivity
Types of Processing – I


              Processing




Centralized                Distributed
Types of Processing – II
• Centralized – In centralized computing, database was stored in a
  server which was generally a powerful mainframe. All resources such
  as data storage, program execution, and data manipulation are done
  at the server end provided by the mainframe
• Distributed – In distributed processing, most of the processing is
  done by the client computer and the file server only stores and
  serves data
Client/Server Model
• Client-server model
   – Combination of centralized processing model and
      distributed processing model
   – Client contacts server for data, formats this data and
      displays it to user
Radio Frequency (RF)
• Wireless communication technology
• Uses electromagnetic waves used in radio
  communication to transmit and receive data
• Provides real-time access to a host computer
• Electromagnetic waves generated by altering current fed
  to an antenna
RF Spectrum – I
• Part of electromagnetic spectrum corresponding to radio
  frequencies
• Consists of different frequency bands:
   –   Extremely Low Frequency (ELF)
   –   Super Low Frequency (SLF)
   –   Ultra Low Frequency (ULF)
   –   Very Low Frequency (VLF)
RF Spectrum – II
–   Low Frequency (LF)
–   Medium Frequency (MF)
–   High Frequency (HF)
–   Very High Frequency (VHF)
–   Ultra High Frequency (UHF)
–   Super High Frequency (SHF)
–   Extremely High Frequency (EHF)
Radio Transmission
• Radio station is a broadcasting service that sends sound
  or audio from transmitter to an antenna and finally to
  receiving device
• Traditionally it broadcasts through air as radio waves
• Stations broadcast these services via cables, local wire
  networks, satellite and Internet
• Network system where programming is distributed to
  multiple stations simultaneously is a radio network
Single Frequency
• Type of radio network that operates several transmitters
  on a single frequency is Single-Frequency Network (SFN)
• Each station usually runs synchronously with others to
  avoid interference
• Two forms of modulations such as FM and AM operate in
  this manner
• When SFN is used in simple form, secondary transmitter
  can be called a booster or on-channel repeater
Spread Spectrum
• Signals from different sources are combined together to
  fit into larger bandwidth
• Information encoded into discrete packages before
  spreading
• Receivers then filter the coded material
• To reassemble the signal, the receiver has to be
  compatible
• Thus, number of simultaneous users within a radio
  frequency band may increase
Frequency Hopping Spread Spectrum
• Modulation technique used in spread spectrum
  transmission
• The frequencies are repeatedly switched between
  predetermined frequencies known as hops
• To transfer data correctly, proper synchronization of
  transmitter and receiver is necessary
Direct Sequence Spread Spectrum
•   Most common modulation technology
•   Data is divided into smaller parts called chips
•   Different frequencies are used to transmit these chips
•   Dividing the data into chips enables the receiver to
    properly reassemble the data by providing information
    about the cycle of frequency changes
Microwave – I
• Electromagnetic waves with wavelengths longer than
  those of infrared light, but shorter than radio waves
• Frequency ranging between 1 and 300 GHz
• High frequency radio waves
• Used for point-to-point and omni directional
  communication of various signals
• Antennas required:
   – Parabolic dish antenna
   – Horn antenna
Unidirectional Antenna
• Microwave requires two types of antenna:
• Parabolic Dish Antenna
• Horn Antenna
Uses of microwave
• In broadcasting transmissions
• Widely used in television news to transmit a signal from
  a remote location to a television station from a specially
  equipped van
• Lower microwave frequencies are used in the cable TV
  and Internet access
• Used to transmit power over long distances
Infrared – I
• Derived from the Latin word infra which means below
  red
• Electromagnetic radiation of wavelength longer than
  that of visible light but shorter than that of radio waves
• Known as heat or heat radiation
• IR light is used by infrared systems to carry data between
  devices
Infrared – II
                                IR




         Unidirectional   Omnidirectional   Reflective


• Unidirectional – Also called point-to-point. Uses focused
  laser.
• Omnidirectional – Also called broadcast. Scattered
  infrared technology used.
• Reflective – Uses optical transceivers.
Applications of IR
• It has an excellent potential for data transmission
• Standards published for using IR signals for
  communication between devices such as
   – Keyboards
   – Mice
   – PCs
   – Printers
• Standards published by Infrared Data Association (IrDA)
Disadvantages of IR
• Does not have penetration ability
• When exposed to light, IR signals goes weak. To resolve
  this problem, they should have very high output
• Very expensive when used over large distances
Electromagnet (EM)
• Energy traveled through a material medium or through
  free space in the form of electromagnetic waves
• Wave properties EM exhibits :
   –   Reflection
   –   Refraction
   –   Interference
   –   Diffraction
Electromagnet (EM) - II
   Types of radiation in EM spectrum:
     Radio

     Microwaves

     Infrared

     Visible Light

     Ultraviolet

     X-rays

     Gamma rays
Lightwave
• Connecting LANs in two buildings using lasers is the most
  modern application of lightwave transmission
• Lasers follow unidirectional path
• Each building should have its own laser and its own
  photo detector
• Advantages are:
   – Cost effective solution
   – Offers very high bandwidth
   – Very easy to install
• Major disadvantage is that laser beams cannot penetrate
  rain or thick fog
Using Remote Access
• Communication established with a distant computer
  system or computer network is called as remote access
• Remote computer becomes a host on the network
• To connect to the network, a computer, a modem or some
  remote access software is needed
Types of Remote Access Connectivity
• Remote access clients can dial in from remote locations and access
  resources as if they are physically attached to the network.
                            Types of
                             Remote
                             Access
                           Connectivity




            Dial-up      VPN         Dial up
                                               Dedicated
            remote     remote        to the
                                               Connection
            access     access       Internet
Dedicated Connection
• A company uses a dedicated connection for
  the following purposes:
• Reduce the telephone bill
• Connect at higher speed
Remote Access Methods

              Remote
              Access
              Methods




  Using
              Using
Phone-lines             Using
              ISDN
   And                  X.25
              Lines
 Modems
Virtual Private Network – I
• A private communication network provided over a
  public network such as Internet
VPN Security – I
• Uses different methods to keep connection and data
  secure
• Methods for security are:
   – Firewalls – A filtering mechanism which checks the
     incoming and outgoing information between the
     local network and the Internet
   – Encryption – Translation of data into secret code. Types of
     encryption are:
      • Symmetric-key – same key is used to encrypt and
        decrypt
      • Public-key – uses a combination of private and public
        key
VPN Security – II
– IPSec – Supports two encryption modes:
   • Transport – Encrypts only the data portion (payload) of
     each packet
   • Tunnel – Encrypts both header and payload. It is more
     secure
– AAA Servers – When dial-up client sends request
  to establish session, request is sent to the AAA
  server which checks:
   • who you are (authentication)
   • what you are allowed to do (authorization)
   • what you actually do (accounting)
Types of VPN
                           VPN


           Remote-Access         Site-to-Site


                    Intranet-based        Extranet-based


   Remote-Access VPN – Is a user-to-LAN connection
    which is also called Virtual Private Dial-up Network
   Site-to-Site VPN – Employs Quality Of Service
    (QOS) for transport reliability and uses tunneling
    and encryption for data privacy
VPN Tunneling
• Also known as port forwarding
• Data intended for use only within a private network can
  be transmitted through public network
• Public network may not be aware that data transmitted
  is part of private network
• Most VPNs rely on tunneling
Types of VPN Tunneling
• Voluntary tunneling – Connection setup is managed by
  the VPN client
• Compulsory tunneling – VPN connection is managed by
  the carrier network provider. Also called the VPN Front
  End Processor (FEP) or Network Access Server (NAS) or
  Point of Presence (POS) servers
VPN Tunneling Protocols – I
• Many network protocols
  have been implemented                VPN
  specifically for use with          Tunneling
                                     Protocols
  VPN tunnels
• These protocols are
  generally incompatible
  with each other
                              PPTP     L2TP      IPSec
VPN Tunneling Protocols – II
• Point-to-Point Tunneling Protocol (PPTP) – Enables users
  to dial to their companies network through the Internet
• Layer Two Tunneling Protocol (L2TP) – Exists at data link
  layer in the OSI model and allows ISPs to operate VPNs
• Internet Protocol Security (IPSec) – Exists at the network
  layer in the OSI model. Multiple related protocols
  combine together to form IPSec
Internet Connection Sharing (ICS)
• Method for connecting multiple computers in a LAN to
  the Internet through a single connection and a single IP
  address
• Works with connection technologies, such as DSL,
  cable modem, ISDN, dial-up and satellite.
Internet Connection Sharing - II
• Comprises of the following:
   – ICS Host – Device which has a modem or broadband
     interface that establishes connection to the Internet
   – ICS clients – Devices that connect to the Internet through
     the network and the ICS hosts
Internetworking
• Creation of Wide Area Networks (WANs) by connecting
  individual Local Area Networks (LANs)
• These WANs may be connected to form even larger WANs
• Minimum two networks are connected
Connectionless Internetworking and Protocol

• In connectionless Internetworking, data can be sent
  without any need to establish a connection first
• Thus, there is no guarantee of delivery of data
• An ISO network layer datagram protocol
• Similar to the Internet Protocol (IP)
• Also named as ISO-IP
Connectionless Internetworking – II
• Internetworking is achieved using the following:
   – Gateways
   – Bridges
   – Routers
Internetwork Routing
• A connection of two or more networks using routers is
  called Internetwork
• A process of forwarding data packets from source to
  destination is called Internetwork routing
Routing Process
• Two processes are involved in routing as follows:
   – Host routing
   – Router routing
Routing Concepts

                 Routing
                Concepts




                                 Static
 Host       Router    Routing     And
routing     routing    table    Dynamic
                                 Router
Routing Problems


           Routing
          Problems




Routing              Black
 Loops               Holes
Routing Infrastructure

                  Routing
                    Infra
                 structure




Single   Multi
                             Flat   Hierarchical
 path    path

More Related Content

What's hot (20)

Basics of Networking
Basics of NetworkingBasics of Networking
Basics of Networking
 
MVA slides lesson 3
MVA slides lesson 3MVA slides lesson 3
MVA slides lesson 3
 
IT8602 Mobile Communication - Unit I Introduction
IT8602 Mobile Communication - Unit I IntroductionIT8602 Mobile Communication - Unit I Introduction
IT8602 Mobile Communication - Unit I Introduction
 
MVA slides lesson 8
MVA slides lesson 8MVA slides lesson 8
MVA slides lesson 8
 
CISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyCISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network Topology
 
MVA slides lesson 7
MVA slides lesson 7MVA slides lesson 7
MVA slides lesson 7
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8
 
98 366 mva slides lesson 6
98 366 mva slides lesson 698 366 mva slides lesson 6
98 366 mva slides lesson 6
 
Technology Products
Technology ProductsTechnology Products
Technology Products
 
IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit III
 
Network devices
Network devicesNetwork devices
Network devices
 
BSNL (SUD)
BSNL (SUD)BSNL (SUD)
BSNL (SUD)
 
Wireless LAN technologies
Wireless LAN technologiesWireless LAN technologies
Wireless LAN technologies
 
MVA slides lesson 1
MVA slides lesson 1MVA slides lesson 1
MVA slides lesson 1
 
MVA slides lesson 5
MVA slides lesson 5MVA slides lesson 5
MVA slides lesson 5
 
Chapter10
Chapter10Chapter10
Chapter10
 
Wireless lan
Wireless lanWireless lan
Wireless lan
 
98 366 mva slides lesson 5
98 366 mva slides lesson 598 366 mva slides lesson 5
98 366 mva slides lesson 5
 
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
MVA slides lesson 2
 
Modem technology
Modem technologyModem technology
Modem technology
 

Viewers also liked

Client and Broker Relationship
Client and Broker RelationshipClient and Broker Relationship
Client and Broker RelationshipRishabh Sharma
 
Client Servicing Executive
Client Servicing ExecutiveClient Servicing Executive
Client Servicing Executivebipinpandit
 
Client server technology
Client server technologyClient server technology
Client server technologyAnwar Kamal
 
Client service & account management - Types of Clients
Client service & account management - Types of ClientsClient service & account management - Types of Clients
Client service & account management - Types of ClientsAamir Abbasi
 
Client agency relationship
Client agency relationshipClient agency relationship
Client agency relationshipVikram Singh
 
Client Server Architecture
Client Server ArchitectureClient Server Architecture
Client Server Architecturesuks_87
 

Viewers also liked (7)

Client and Broker Relationship
Client and Broker RelationshipClient and Broker Relationship
Client and Broker Relationship
 
Client Servicing Executive
Client Servicing ExecutiveClient Servicing Executive
Client Servicing Executive
 
Client server technology
Client server technologyClient server technology
Client server technology
 
Client service & account management - Types of Clients
Client service & account management - Types of ClientsClient service & account management - Types of Clients
Client service & account management - Types of Clients
 
Client agency relationship
Client agency relationshipClient agency relationship
Client agency relationship
 
Client Server Architecture
Client Server ArchitectureClient Server Architecture
Client Server Architecture
 
Client server architecture
Client server architectureClient server architecture
Client server architecture
 

Similar to Client server system and remote connectivity

Wan technologies
Wan technologiesWan technologies
Wan technologiesOnline
 
CISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsCISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsKarthikeyan Dhayalan
 
Computer network and email basic concepts
Computer network and email basic conceptsComputer network and email basic concepts
Computer network and email basic conceptsMd Irfan Ansari
 
Sept 2017 topologies and communication media
Sept 2017   topologies and communication mediaSept 2017   topologies and communication media
Sept 2017 topologies and communication mediashahin raj
 
7 - Telecom, internet & wireless tech
7 - Telecom, internet & wireless tech7 - Telecom, internet & wireless tech
7 - Telecom, internet & wireless techHemant Nagwekar
 
Transmission through various mediums for communication
Transmission through various mediums for communicationTransmission through various mediums for communication
Transmission through various mediums for communicationNeelanshi Rastogi
 
10-Ch17-WirelessLANsTech_IEEE802.11wireless.ppt
10-Ch17-WirelessLANsTech_IEEE802.11wireless.ppt10-Ch17-WirelessLANsTech_IEEE802.11wireless.ppt
10-Ch17-WirelessLANsTech_IEEE802.11wireless.pptraghul805834
 
Network And Its Types
Network And Its TypesNetwork And Its Types
Network And Its TypesRishu Raj
 
Distributed Systems - Information Technology
Distributed Systems - Information TechnologyDistributed Systems - Information Technology
Distributed Systems - Information TechnologySagar Mehta
 
Information Security Lesson 7 - Remote Access - Eric Vanderburg
Information Security Lesson 7 - Remote Access - Eric VanderburgInformation Security Lesson 7 - Remote Access - Eric Vanderburg
Information Security Lesson 7 - Remote Access - Eric VanderburgEric Vanderburg
 
Networking and internetworking devices
Networking and internetworking devicesNetworking and internetworking devices
Networking and internetworking devicesRaveena kumari
 
is chap5.pptx
is chap5.pptxis chap5.pptx
is chap5.pptxTeshome48
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networksArunChokkalingam
 
Networking devices
Networking devicesNetworking devices
Networking devicesRavi KC
 
Computer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxComputer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxVishwaTej10
 

Similar to Client server system and remote connectivity (20)

Wan technologies
Wan technologiesWan technologies
Wan technologies
 
Computer networks
Computer networksComputer networks
Computer networks
 
CISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsCISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranets
 
Computer network and email basic concepts
Computer network and email basic conceptsComputer network and email basic concepts
Computer network and email basic concepts
 
Networking.pptx
Networking.pptxNetworking.pptx
Networking.pptx
 
Sept 2017 topologies and communication media
Sept 2017   topologies and communication mediaSept 2017   topologies and communication media
Sept 2017 topologies and communication media
 
7 - Telecom, internet & wireless tech
7 - Telecom, internet & wireless tech7 - Telecom, internet & wireless tech
7 - Telecom, internet & wireless tech
 
Network
NetworkNetwork
Network
 
Transmission through various mediums for communication
Transmission through various mediums for communicationTransmission through various mediums for communication
Transmission through various mediums for communication
 
10-Ch17-WirelessLANsTech_IEEE802.11wireless.ppt
10-Ch17-WirelessLANsTech_IEEE802.11wireless.ppt10-Ch17-WirelessLANsTech_IEEE802.11wireless.ppt
10-Ch17-WirelessLANsTech_IEEE802.11wireless.ppt
 
Network And Its Types
Network And Its TypesNetwork And Its Types
Network And Its Types
 
09bit046 wlan
09bit046 wlan09bit046 wlan
09bit046 wlan
 
Distributed Systems - Information Technology
Distributed Systems - Information TechnologyDistributed Systems - Information Technology
Distributed Systems - Information Technology
 
Information Security Lesson 7 - Remote Access - Eric Vanderburg
Information Security Lesson 7 - Remote Access - Eric VanderburgInformation Security Lesson 7 - Remote Access - Eric Vanderburg
Information Security Lesson 7 - Remote Access - Eric Vanderburg
 
Networking and internetworking devices
Networking and internetworking devicesNetworking and internetworking devices
Networking and internetworking devices
 
is chap5.pptx
is chap5.pptxis chap5.pptx
is chap5.pptx
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networks
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Unit01
Unit01Unit01
Unit01
 
Computer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxComputer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptx
 

More from Online

Philosophy of early childhood education 3
Philosophy of early childhood education 3Philosophy of early childhood education 3
Philosophy of early childhood education 3Online
 
Philosophy of early childhood education 2
Philosophy of early childhood education 2Philosophy of early childhood education 2
Philosophy of early childhood education 2Online
 
Philosophy of early childhood education 1
Philosophy of early childhood education 1Philosophy of early childhood education 1
Philosophy of early childhood education 1Online
 
Philosophy of early childhood education 4
Philosophy of early childhood education 4Philosophy of early childhood education 4
Philosophy of early childhood education 4Online
 
Operation and expression in c++
Operation and expression in c++Operation and expression in c++
Operation and expression in c++Online
 
Functions
FunctionsFunctions
FunctionsOnline
 
Formatted input and output
Formatted input and outputFormatted input and output
Formatted input and outputOnline
 
Control structures selection
Control structures   selectionControl structures   selection
Control structures selectionOnline
 
Control structures repetition
Control structures   repetitionControl structures   repetition
Control structures repetitionOnline
 
Introduction to problem solving in c++
Introduction to problem solving in c++Introduction to problem solving in c++
Introduction to problem solving in c++Online
 
Optical transmission technique
Optical transmission techniqueOptical transmission technique
Optical transmission techniqueOnline
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Online
 
Lan technologies
Lan technologiesLan technologies
Lan technologiesOnline
 
Introduction to internet technology
Introduction to internet technologyIntroduction to internet technology
Introduction to internet technologyOnline
 
Internet standard routing protocols
Internet standard routing protocolsInternet standard routing protocols
Internet standard routing protocolsOnline
 
Internet protocol
Internet protocolInternet protocol
Internet protocolOnline
 
Application protocols
Application protocolsApplication protocols
Application protocolsOnline
 
Addressing
AddressingAddressing
AddressingOnline
 
Transport protocols
Transport protocolsTransport protocols
Transport protocolsOnline
 
Leadership
LeadershipLeadership
LeadershipOnline
 

More from Online (20)

Philosophy of early childhood education 3
Philosophy of early childhood education 3Philosophy of early childhood education 3
Philosophy of early childhood education 3
 
Philosophy of early childhood education 2
Philosophy of early childhood education 2Philosophy of early childhood education 2
Philosophy of early childhood education 2
 
Philosophy of early childhood education 1
Philosophy of early childhood education 1Philosophy of early childhood education 1
Philosophy of early childhood education 1
 
Philosophy of early childhood education 4
Philosophy of early childhood education 4Philosophy of early childhood education 4
Philosophy of early childhood education 4
 
Operation and expression in c++
Operation and expression in c++Operation and expression in c++
Operation and expression in c++
 
Functions
FunctionsFunctions
Functions
 
Formatted input and output
Formatted input and outputFormatted input and output
Formatted input and output
 
Control structures selection
Control structures   selectionControl structures   selection
Control structures selection
 
Control structures repetition
Control structures   repetitionControl structures   repetition
Control structures repetition
 
Introduction to problem solving in c++
Introduction to problem solving in c++Introduction to problem solving in c++
Introduction to problem solving in c++
 
Optical transmission technique
Optical transmission techniqueOptical transmission technique
Optical transmission technique
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
Introduction to internet technology
Introduction to internet technologyIntroduction to internet technology
Introduction to internet technology
 
Internet standard routing protocols
Internet standard routing protocolsInternet standard routing protocols
Internet standard routing protocols
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
Application protocols
Application protocolsApplication protocols
Application protocols
 
Addressing
AddressingAddressing
Addressing
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
Leadership
LeadershipLeadership
Leadership
 

Recently uploaded

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

Client server system and remote connectivity

  • 1. Client Server System and Remote Connectivity
  • 2. Types of Processing – I Processing Centralized Distributed
  • 3. Types of Processing – II • Centralized – In centralized computing, database was stored in a server which was generally a powerful mainframe. All resources such as data storage, program execution, and data manipulation are done at the server end provided by the mainframe • Distributed – In distributed processing, most of the processing is done by the client computer and the file server only stores and serves data
  • 4. Client/Server Model • Client-server model – Combination of centralized processing model and distributed processing model – Client contacts server for data, formats this data and displays it to user
  • 5. Radio Frequency (RF) • Wireless communication technology • Uses electromagnetic waves used in radio communication to transmit and receive data • Provides real-time access to a host computer • Electromagnetic waves generated by altering current fed to an antenna
  • 6. RF Spectrum – I • Part of electromagnetic spectrum corresponding to radio frequencies • Consists of different frequency bands: – Extremely Low Frequency (ELF) – Super Low Frequency (SLF) – Ultra Low Frequency (ULF) – Very Low Frequency (VLF)
  • 7. RF Spectrum – II – Low Frequency (LF) – Medium Frequency (MF) – High Frequency (HF) – Very High Frequency (VHF) – Ultra High Frequency (UHF) – Super High Frequency (SHF) – Extremely High Frequency (EHF)
  • 8. Radio Transmission • Radio station is a broadcasting service that sends sound or audio from transmitter to an antenna and finally to receiving device • Traditionally it broadcasts through air as radio waves • Stations broadcast these services via cables, local wire networks, satellite and Internet • Network system where programming is distributed to multiple stations simultaneously is a radio network
  • 9. Single Frequency • Type of radio network that operates several transmitters on a single frequency is Single-Frequency Network (SFN) • Each station usually runs synchronously with others to avoid interference • Two forms of modulations such as FM and AM operate in this manner • When SFN is used in simple form, secondary transmitter can be called a booster or on-channel repeater
  • 10. Spread Spectrum • Signals from different sources are combined together to fit into larger bandwidth • Information encoded into discrete packages before spreading • Receivers then filter the coded material • To reassemble the signal, the receiver has to be compatible • Thus, number of simultaneous users within a radio frequency band may increase
  • 11. Frequency Hopping Spread Spectrum • Modulation technique used in spread spectrum transmission • The frequencies are repeatedly switched between predetermined frequencies known as hops • To transfer data correctly, proper synchronization of transmitter and receiver is necessary
  • 12. Direct Sequence Spread Spectrum • Most common modulation technology • Data is divided into smaller parts called chips • Different frequencies are used to transmit these chips • Dividing the data into chips enables the receiver to properly reassemble the data by providing information about the cycle of frequency changes
  • 13. Microwave – I • Electromagnetic waves with wavelengths longer than those of infrared light, but shorter than radio waves • Frequency ranging between 1 and 300 GHz • High frequency radio waves • Used for point-to-point and omni directional communication of various signals • Antennas required: – Parabolic dish antenna – Horn antenna
  • 14. Unidirectional Antenna • Microwave requires two types of antenna: • Parabolic Dish Antenna • Horn Antenna
  • 15. Uses of microwave • In broadcasting transmissions • Widely used in television news to transmit a signal from a remote location to a television station from a specially equipped van • Lower microwave frequencies are used in the cable TV and Internet access • Used to transmit power over long distances
  • 16. Infrared – I • Derived from the Latin word infra which means below red • Electromagnetic radiation of wavelength longer than that of visible light but shorter than that of radio waves • Known as heat or heat radiation • IR light is used by infrared systems to carry data between devices
  • 17. Infrared – II IR Unidirectional Omnidirectional Reflective • Unidirectional – Also called point-to-point. Uses focused laser. • Omnidirectional – Also called broadcast. Scattered infrared technology used. • Reflective – Uses optical transceivers.
  • 18. Applications of IR • It has an excellent potential for data transmission • Standards published for using IR signals for communication between devices such as – Keyboards – Mice – PCs – Printers • Standards published by Infrared Data Association (IrDA)
  • 19. Disadvantages of IR • Does not have penetration ability • When exposed to light, IR signals goes weak. To resolve this problem, they should have very high output • Very expensive when used over large distances
  • 20. Electromagnet (EM) • Energy traveled through a material medium or through free space in the form of electromagnetic waves • Wave properties EM exhibits : – Reflection – Refraction – Interference – Diffraction
  • 21. Electromagnet (EM) - II  Types of radiation in EM spectrum:  Radio  Microwaves  Infrared  Visible Light  Ultraviolet  X-rays  Gamma rays
  • 22. Lightwave • Connecting LANs in two buildings using lasers is the most modern application of lightwave transmission • Lasers follow unidirectional path • Each building should have its own laser and its own photo detector • Advantages are: – Cost effective solution – Offers very high bandwidth – Very easy to install • Major disadvantage is that laser beams cannot penetrate rain or thick fog
  • 23. Using Remote Access • Communication established with a distant computer system or computer network is called as remote access • Remote computer becomes a host on the network • To connect to the network, a computer, a modem or some remote access software is needed
  • 24. Types of Remote Access Connectivity • Remote access clients can dial in from remote locations and access resources as if they are physically attached to the network. Types of Remote Access Connectivity Dial-up VPN Dial up Dedicated remote remote to the Connection access access Internet
  • 25. Dedicated Connection • A company uses a dedicated connection for the following purposes: • Reduce the telephone bill • Connect at higher speed
  • 26. Remote Access Methods Remote Access Methods Using Using Phone-lines Using ISDN And X.25 Lines Modems
  • 27. Virtual Private Network – I • A private communication network provided over a public network such as Internet
  • 28. VPN Security – I • Uses different methods to keep connection and data secure • Methods for security are: – Firewalls – A filtering mechanism which checks the incoming and outgoing information between the local network and the Internet – Encryption – Translation of data into secret code. Types of encryption are: • Symmetric-key – same key is used to encrypt and decrypt • Public-key – uses a combination of private and public key
  • 29. VPN Security – II – IPSec – Supports two encryption modes: • Transport – Encrypts only the data portion (payload) of each packet • Tunnel – Encrypts both header and payload. It is more secure – AAA Servers – When dial-up client sends request to establish session, request is sent to the AAA server which checks: • who you are (authentication) • what you are allowed to do (authorization) • what you actually do (accounting)
  • 30. Types of VPN VPN Remote-Access Site-to-Site Intranet-based Extranet-based  Remote-Access VPN – Is a user-to-LAN connection which is also called Virtual Private Dial-up Network  Site-to-Site VPN – Employs Quality Of Service (QOS) for transport reliability and uses tunneling and encryption for data privacy
  • 31. VPN Tunneling • Also known as port forwarding • Data intended for use only within a private network can be transmitted through public network • Public network may not be aware that data transmitted is part of private network • Most VPNs rely on tunneling
  • 32. Types of VPN Tunneling • Voluntary tunneling – Connection setup is managed by the VPN client • Compulsory tunneling – VPN connection is managed by the carrier network provider. Also called the VPN Front End Processor (FEP) or Network Access Server (NAS) or Point of Presence (POS) servers
  • 33. VPN Tunneling Protocols – I • Many network protocols have been implemented VPN specifically for use with Tunneling Protocols VPN tunnels • These protocols are generally incompatible with each other PPTP L2TP IPSec
  • 34. VPN Tunneling Protocols – II • Point-to-Point Tunneling Protocol (PPTP) – Enables users to dial to their companies network through the Internet • Layer Two Tunneling Protocol (L2TP) – Exists at data link layer in the OSI model and allows ISPs to operate VPNs • Internet Protocol Security (IPSec) – Exists at the network layer in the OSI model. Multiple related protocols combine together to form IPSec
  • 35. Internet Connection Sharing (ICS) • Method for connecting multiple computers in a LAN to the Internet through a single connection and a single IP address • Works with connection technologies, such as DSL, cable modem, ISDN, dial-up and satellite.
  • 36. Internet Connection Sharing - II • Comprises of the following: – ICS Host – Device which has a modem or broadband interface that establishes connection to the Internet – ICS clients – Devices that connect to the Internet through the network and the ICS hosts
  • 37. Internetworking • Creation of Wide Area Networks (WANs) by connecting individual Local Area Networks (LANs) • These WANs may be connected to form even larger WANs • Minimum two networks are connected
  • 38. Connectionless Internetworking and Protocol • In connectionless Internetworking, data can be sent without any need to establish a connection first • Thus, there is no guarantee of delivery of data • An ISO network layer datagram protocol • Similar to the Internet Protocol (IP) • Also named as ISO-IP
  • 39. Connectionless Internetworking – II • Internetworking is achieved using the following: – Gateways – Bridges – Routers
  • 40. Internetwork Routing • A connection of two or more networks using routers is called Internetwork • A process of forwarding data packets from source to destination is called Internetwork routing
  • 41. Routing Process • Two processes are involved in routing as follows: – Host routing – Router routing
  • 42. Routing Concepts Routing Concepts Static Host Router Routing And routing routing table Dynamic Router
  • 43. Routing Problems Routing Problems Routing Black Loops Holes
  • 44. Routing Infrastructure Routing Infra structure Single Multi Flat Hierarchical path path