You are on page 1of 60

Client Server System and

Remote Connectivity

Chapter 17

Release 16/7/2009
Chapter Objectives – I

 Differentiate between Centralized and Distributed


Processing
 Understand Radio Frequency (RF)
 Explain Microwave
 Explain Infrared (IR)
 Differentiate between Radio – Single Frequency and
Spread Spectrum
 Understand Electromagnet (EM)

Release 16/7/2009
Chapter Objectives – II

 Understand Lightwave
 Explain Remote Access
 Explain VPN
 Explain Internet Connection Sharing (ICS)
 Understand Connectionless Internetworking
 Explain Internetworking Routing

Release 16/7/2009
Recall – I
 Different types of switching are:
 Circuit switching
 Message switching
 Packet switching
 Telephone services carried by the Public Switched
Telephone Network are called Plain Old Telephone
Service (POTS). Services offered by POTS are:
 Signal to carry the sound of the human voice both ways at
once called as bi-directional
 Ringing signals and dial-tone

Release 16/7/2009
Recall – II

 X.25 is a connection-oriented packet-switching protocol


which defines the way in which connections between the
user devices and network devices are established and
maintained
 Different frame relay devices are:
 Data Terminal Equipment (DTE)
 Data Circuit-terminating Equipment (DCE)
 Services provided by ATM are:
 Permanent virtual circuits (PVC)
 Switched virtual circuits (SVC)
 Connectionless service

Release 16/7/2009
Recall – III

 Polling is a communication technique which determines


when a terminal is ready to send data
 Communications scheme in which each transmitter or
source in a network sends data whenever there is a
frame to send is called ALOHA

Release 16/7/2009
Types of Processing – I

Processing

Centralized Distributed

Release 16/7/2009
Types of Processing – II
 Centralized – In centralized computing, database was stored in
a server which was generally a powerful mainframe. All
resources such as data storage, program execution, and data
manipulation are done at the server end provided by the
mainframe
 Distributed – In distributed processing, most of the processing is
done by the client computer and the file server only stores and
serves data

Release 16/7/2009
Client/Server Model
 Client-server model
 Combination of centralized processing model and
distributed processing model
 Client contacts server for data, formats this data and
displays it to user

Release 16/7/2009
Radio Frequency (RF)

 Wireless communication technology


 Uses electromagnetic waves used in radio
communication to transmit and receive data
 Provides real-time access to a host computer
 Electromagnetic waves generated by altering
current fed to an antenna

Release 16/7/2009
RF Spectrum – I

 Part of electromagnetic spectrum corresponding to


radio frequencies
 Consists of different frequency bands:
 Extremely Low Frequency (ELF)
 Super Low Frequency (SLF)
 Ultra Low Frequency (ULF)
 Very Low Frequency (VLF)

Release 16/7/2009
RF Spectrum – II

 Low Frequency (LF)


 Medium Frequency (MF)
 High Frequency (HF)
 Very High Frequency (VHF)
 Ultra High Frequency (UHF)
 Super High Frequency (SHF)
 Extremely High Frequency (EHF)

Release 16/7/2009
Radio Transmission
 Radio station is a broadcasting service that sends
sound or audio from transmitter to an antenna and
finally to receiving device
 Traditionally it broadcasts through air as radio
waves
 Stations broadcast these services via cables, local
wire networks, satellite and Internet
 Network system where programming is distributed to
multiple stations simultaneously is a radio network

Release 16/7/2009
Single Frequency
 Type of radio network that operates several
transmitters on a single frequency is Single-
Frequency Network (SFN)
 Each station usually runs synchronously with others
to avoid interference
 Two forms of modulations such as FM and AM
operate in this manner
 When SFN is used in simple form, secondary
transmitter can be called a booster or on-channel
repeater

Release 16/7/2009
Spread Spectrum
 Signals from different sources are combined
together to fit into larger bandwidth
 Information encoded into discrete packages before
spreading
 Receivers then filter the coded material
 To reassemble the signal, the receiver has to be
compatible
 Thus, number of simultaneous users within a radio
frequency band may increase

Release 16/7/2009
Frequency Hopping Spread Spectrum

 Modulation technique used in spread spectrum


transmission
 The frequencies are repeatedly switched between
predetermined frequencies known as hops
 To transfer data correctly, proper synchronization of
transmitter and receiver is necessary

Release 16/7/2009
Direct Sequence Spread Spectrum

 Most common modulation technology


 Data is divided into smaller parts called chips
 Different frequencies are used to transmit these
chips
 Dividing the data into chips enables the receiver to
properly reassemble the data by providing
information about the cycle of frequency changes

Release 16/7/2009
Microwave – I

 Electromagnetic waves with wavelengths longer


than those of infrared light, but shorter than radio
waves
 Frequency ranging between 1 and 300 GHz
 High frequency radio waves
 Used for point-to-point and omni directional
communication of various signals
 Antennas required:
 Parabolic dish antenna
 Horn antenna

Release 16/7/2009
Unidirectional Antenna

 Microwave requires two types of antenna:


 Parabolic Dish Antenna
 Horn Antenna

Release 16/7/2009
Uses of microwave

 In broadcasting transmissions
 Widely used in television news to transmit a signal
from a remote location to a television station from a
specially equipped van
 Lower microwave frequencies are used in the cable
TV and Internet access
 Used to transmit power over long distances

Release 16/7/2009
Infrared – I

 Derived from the Latin word infra which means


below red
 Electromagnetic radiation of wavelength longer than
that of visible light but shorter than that of radio
waves
 Known as heat or heat radiation
 IR light is used by infrared systems to carry data
between devices

Release 16/7/2009
Infrared – II

IR

Unidirectional Omnidirectional Reflective

 Unidirectional – Also called point-to-point. Uses


focused laser.
 Omnidirectional – Also called broadcast. Scattered
infrared technology used.
 Reflective – Uses optical transceivers.

Release 16/7/2009
Applications of IR
 It has an excellent potential for data transmission
 Standards published for using IR signals for
communication between devices such as
 Keyboards

 Mice

 PCs

 Printers

 Standards published by Infrared Data Association


(IrDA)

Release 16/7/2009
Disadvantages of IR

 Does not have penetration ability


 When exposed to light, IR signals goes weak. To
resolve this problem, they should have very high
output
 Very expensive when used over large distances

Release 16/7/2009
Electromagnet (EM)

 Energy traveled through a material medium or


through free space in the form of electromagnetic
waves
 Wave properties EM exhibits :
 Reflection
 Refraction
 Interference
 Diffraction

Release 16/7/2009
Electromagnet (EM) - II

 Types of radiation in EM spectrum:


 Radio

 Microwaves

 Infrared

 Visible Light

 Ultraviolet

 X-rays

 Gamma rays

Release 16/7/2009
Lightwave

 Connecting LANs in two buildings using lasers is the


most modern application of lightwave transmission
 Lasers follow unidirectional path
 Each building should have its own laser and its own
photo detector
 Advantages are:
 Cost effective solution
 Offers very high bandwidth
 Very easy to install
 Major disadvantage is that laser beams cannot
penetrate rain or thick fog

Release 16/7/2009
Using Remote Access
 Communication established with a distant computer
system or computer network is called as remote
access
 Remote computer becomes a host on the network
 To connect to the network, a computer, a modem or
some remote access software is needed

Release 16/7/2009
Types of Remote Access Connectivity
 Remote access clients can dial in from remote locations and
access resources as if they are physically attached to the
network. Types of
Remote
Access
Connectivity

Dial-up VPN Dial up


Dedicated
remote remote to the
Connection
access access Internet

Release 16/7/2009
Show how to create VPN and dial up
connection at client end

Release 16/7/2009
Dedicated Connection

 A company uses a dedicated connection for


the following purposes:
 Reduce the telephone bill
 Connect at higher speed

Release 16/7/2009
Remote Access Methods

Remote
Access
Methods

Using
Using
Phone-lines Using
ISDN
And X.25
Lines
Modems

Release 16/7/2009
Troubleshooting Remote Access

Release 16/7/2009
Virtual Private Network – I
 A private communication network provided over a
public network such as Internet

Release 16/7/2009
VPN Security – I

 Uses different methods to keep connection and data


secure
 Methods for security are:
 Firewalls – A filtering mechanism which checks the
incoming and outgoing information between the
local network and the Internet
 Encryption – Translation of data into secret code.
Types of encryption are:
 Symmetric-key – same key is used to encrypt and
decrypt
 Public-key – uses a combination of private and public
key

Release 16/7/2009
VPN Security – II

 IPSec – Supports two encryption modes:


 Transport – Encrypts only the data portion
(payload) of each packet
 Tunnel – Encrypts both header and payload. It is
more secure
 AAA Servers – When dial-up client sends request
to establish session, request is sent to the AAA
server which checks:
 who you are (authentication)
 what you are allowed to do (authorization)
 what you actually do (accounting)

Release 16/7/2009
Types of VPN
VPN

Remote-Access Site-to-Site

Intranet-based Extranet-based

 Remote-Access VPN – Is a user-to-LAN connection


which is also called Virtual Private Dial-up Network
 Site-to-Site VPN – Employs Quality Of Service
(QOS) for transport reliability and uses tunneling
and encryption for data privacy

Release 16/7/2009
VPN Tunneling

 Also known as port forwarding


 Data intended for use only within a private network
can be transmitted through public network
 Public network may not be aware that data
transmitted is part of private network
 Most VPNs rely on tunneling

Release 16/7/2009
Types of VPN Tunneling

 Voluntary tunneling – Connection setup is managed


by the VPN client
 Compulsory tunneling – VPN connection is
managed by the carrier network provider. Also
called the VPN Front End Processor (FEP) or
Network Access Server (NAS) or Point of Presence
(POS) servers

Release 16/7/2009
VPN Tunneling Protocols – I

 Many network protocols


have been VPN
implemented Tunneling
Protocols
specifically for use with
VPN tunnels
 These protocols are
generally incompatible
with each other PPTP L2TP IPSec

Release 16/7/2009
VPN Tunneling Protocols – II
 Point-to-Point Tunneling Protocol (PPTP) – Enables
users to dial to their companies network through the
Internet
 Layer Two Tunneling Protocol (L2TP) – Exists at
data link layer in the OSI model and allows ISPs to
operate VPNs
 Internet Protocol Security (IPSec) – Exists at the
network layer in the OSI model. Multiple related
protocols combine together to form IPSec

Release 16/7/2009
Internet Connection Sharing (ICS)

 Method for connecting multiple computers in a


LAN to the Internet through a single connection
and a single IP address
 Works with connection technologies, such as DSL,
cable modem, ISDN, dial-up and satellite.

Release 16/7/2009
Internet Connection Sharing - II
 Comprises of the following:
 ICS Host – Device which has a modem or broadband
interface that establishes connection to the Internet
 ICS clients – Devices that connect to the Internet
through the network and the ICS hosts

Release 16/7/2009
Show how to configure ICS

Release 16/7/2009
Case Study

The network administrator John of the Mumbai


branch of MoneyMaker bank has configured ICS in
the branch. Whenever the client computers
connected to the ICS host use an Internet program
an error message appears which says the mail
server cannot be located

Release 16/7/2009
Problem

The client side browser is set to use a proxy server

Release 16/7/2009
Suggested Solution

The administrator should verify that the client


computer is not configured to use a proxy server

Release 16/7/2009
Advantages and disadvantages of ICS

Release 16/7/2009
Internetworking
 Creation of Wide Area Networks (WANs) by
connecting individual Local Area Networks (LANs)
 These WANs may be connected to form even larger
WANs
 Minimum two networks are connected

Release 16/7/2009
Connectionless Internetworking and
Protocol
 In connectionless Internetworking, data can be
sent without any need to establish a connection
first
 Thus, there is no guarantee of delivery of data
 An ISO network layer datagram protocol
 Similar to the Internet Protocol (IP)
 Also named as ISO-IP

Release 16/7/2009
Connectionless Internetworking – II

 Internetworking is achieved using the following:


 Gateways
 Bridges
 Routers

Release 16/7/2009
Use CBT Internetwork Routing
 A connection of two or more networks using routers
is called Internetwork
 A process of forwarding data packets from source to
destination is called Internetwork routing

Release 16/7/2009
Use CBT Routing Process

 Two processes are involved in routing as follows:


 Host routing

 Router routing

Release 16/7/2009
Routing Concepts

Routing
Concepts

Static
Host Router Routing And
routing routing table Dynamic
Router

Release 16/7/2009
Routing Problems

Routing
Problems

Routing Black
Loops Holes

Release 16/7/2009
Routing Infrastructure

Routing
Infra
structure

Single Multi
Flat Hierarchical
path path

Release 16/7/2009
Summary – I

 A network connected to the Internet but isolated from the


Internet is called as a private network
 Centralized processing is performed in one computer or
in a cluster of computers in a single location
 When more than one computer or processor is used to
execute an application it is called as a distributed
processing
 The combination of centralized processing model and
distributed processing model is called the client-server
model

Release 16/7/2009
Summary – II

 Radio Frequency (RF) is the wireless communication


technology which uses electromagnetic waves used in
radio communication to transmit and receive data
 The part of the electromagnetic spectrum corresponding
to radio frequencies is called as the radio frequency
spectrum
 Electromagnetic waves with wavelengths longer than
those of infrared light, but shorter than those radio waves
are called microwaves

Release 16/7/2009
Summary – III

 A type of radio network that operates several


transmitters on a single frequency is called as a Single-
Frequency Network (SFN)
 When the information been sent is transmitted over a
frequency band which is much wider than the minimum
bandwidth needed to send that information then it is
called as a spread spectrum
 Communication established with a distant computer
system or computer network is called as remote access

Release 16/7/2009
Summary – IV

 A method for connecting multiple computers in a LAN to


the Internet through a single connection and a single IP
address is called as Internet Connection Sharing (ICS)
 The creation of Wide Area Networks (WANs) by
connecting individual Local Area Networks (LANs) is
called as Internetworking
 A computer networking device that forwards data
packets towards its destination is called as a router
 The process of transferring data across an Internetwork
from a source host to a destination host is called as
routing

Release 16/7/2009

You might also like