Internet Concepts and Infrastructure
Internet Concepts and Infrastructure
CARE
https://www.investopedia.com/terms/b/broadband.asp
Broadband Components
• The backbone: Large fiber optic pipes, often buried deep underground, crossing
state and national boundaries, that are the main data routes on the internet and
the primary path for internet traffic between and within countries.
• The middle mile (aka “backhaul”): The part of a broadband network that connects
the backbone to the last mile.
• The last mile: The segment of a broadband network that connects a local internet
service provider to a customer, such as via a cable line to the home
How do broadband networks affect user experience?
The slowest link in this system—usually the last mile—determines how quickly
content loads on your screen.
https://www.pewtrusts.org/en/research-and-analysis/fact-sheets/2023/08/broadband-basics-how-it-works-why-its-important-and-what-comes-
next
Think of the relationship between these two metrics as
a road. Bandwidth is the number of lanes, and
throughput is the amount of traffic. The wider the road,
the more traffic it can carry at full speed before
becoming congested and slowing down.
The last mile is more like a neighbourhood street. It’s the narrowest stretch, and therefore
the one most likely to be congested.
Some individual homes may require a line extension—a connection to
existing wired broadband infrastructure along the road or to a
neighbourhood fiber node. This final segment is like a home’s
driveway, which links the house to the network of roads.
https://www.verizon.com/about/blog/isp-meaning
How do you access the internet
• The content on computers, phones, tablets, and other devices is largely generated
by edge providers—large retail, social media, technology, or video streaming
companies (such as Google, Netflix, and Facebook) or individuals who offer
content, such as blogs or websites.
• Their data reaches users via content delivery networks (CDNs), systems of servers
typically owned by large technology firms such as Amazon CloudFront and Akamai.
• CDNs function as data warehouses, storing copies of web content in various
locations to shorten the distance between users and the content they want.
• This arrangement cuts the time it takes for data to load after the user clicks a link.
Types of Broadband
• Wi-Fi is modern technology and it uses radio waves in order to supply network connectivity.
• This kind of connection gets established by using a wireless adapter to craft hotspots.
• Once, it gets configured, Wi-Fi offers wireless connectivity to the devices.
Broadband gives-
• Comparatively low cost
• Less downtime
• Less network congestion
• Less portability but you can manage that if you get a Wi-Fi router
Wi-Fi offers-
• Amazing portability
• Comparatively expensive
• Greater network congestion
• Good downtime
Digital subscriber line (DSL)
• DSL transmits data over copper wires that already exist in homes and businesses
from telephone lines.
• The speed of DSL broadband ranges from several hundred Kbps to millions of bits
per second (Mbps).
• ADSL has faster speeds for the incoming stream than for the outgoing stream.
Symmetrical Digital Subscriber Line
(SDSL)
• SDSL is primarily used by businesses that require fast speeds for both sending and
receiving data.
• Business Internet needs exceed the typical Internet needs of home residences and
require sending large amounts of data, such as for videoconferencing.
Cable modem
• Cable modems allow for data transmission on the same coaxial cables used by
cable companies to send pictures and sound to your television.
• Cable modems are external devices that provide speeds of 1.5 Mbps or more.
• Speeds vary depending on the option selected from your cable provider, the cable
modem, and traffic.
Fiber
• Fiber broadband uses fiber optic technology that converts electrical signals to
light.
• The electrical signals carry data. When converted to light, the light is sent through
transparent glass fibers.
• The speed at which fiber transmits data is significantly greater than that of DSL and
cable modems, usually by tens or hundreds of Mbps.
• Fiber connections can also deliver voice and video and act as an alternative to
traditional cable connections.
Wireless
• Wireless broadband is either mobile or fixed and transmits data via radio
signals from the service provider's facility to the customer's location.
• Wireless helps provide long-range transmissions to areas that are remote
and do not have access to DSL, cable, or fiber.
• The speed of wireless is similar to the speeds of DSL and cable.
Satellite
• Satellite broadband speeds vary depending on many factors but are generally 25
and 150 Mbps.
Broadband over powerlines (BPL)
• BPL transmits data over existing powerlines, can be set up via a building's existing
electrical system, and offers speeds similar to DSL and cable.
• However, there is a lot of buzz surrounding it mainly because its use of powerlines,
which are installed everywhere, reduces the need to build new costly
infrastructure to serve each broadband customer.
IoT in Healthcare
• The Internet of Medical Things (IoMT) is transforming the healthcare industry by
improving patient health while connecting doctors and patients virtually.
• The Internet of Medical Things (IoMT) is a network of connected devices that
collect data in real-time.
• It is one of the key applications of IoT for healthcare, positively impacting the
industry, and can potentially solve medical issues.
• The technology has been implemented into wearables so patient health can be
monitored easily.
Segments
• On-body Segment – This focuses on customer health wearables and other medical-grade
wearables. Some products used in this segment are Fitbit, Apple Watch, Amazfit Smartwatches, etc.
• In-Home Segment – This aims at an individual’s personal health tracker solutions. This segment
includes personal emergency response systems (PERS), telehealth virtual visits, and remote patient
monitoring (RPM).
• Community Segment – It consists of five components: Kiosks that dispense products and provide
services, mobility services to patients’ vehicles, emergency response intelligence, point-of-care
devices that act like medical camps, and logistics that keep a record of all the medical equipment
and goods.
• In-Clinic Segment – This segment includes IoMT devices that can be used inside a clinic to provide
healthcare services. The medical IoT solutions of the in-clinic segment also provide point-of-care
devices.
• In-Hospital Segment – This includes various IoT healthcare solutions for several management areas.
Asset management monitors, personnel management, patient flow management, inventory
management, and environment and energy monitoring are some of the devices in this segment.
How Does the Internet of Healthcare
Things (IoHT) Work?
• IoT products typically function by going through a four-stage process that is carried
pragmatically by the medical IoT companies. Each stage is further tightly integrated
in terms of data capture and processing.
https://appinventiv.com/blog/iot-in-healthcare/
• Stage 1: Deployment of Interconnected Devices – This involves sensors, actuators,
monitors, detectors, and camera systems that collect data.
• Stage 2: Data Digitization – The analog data received from sensors and other
devices is then aggregated and converted into a digital form.
• Stage 3: Cloud Migration – The data is transferred to a cloud data center after the
pre-processing and standardization process.
• Stage 4: Insight Extraction – Advanced analytics are applied to this processed data
after management and analysis, producing actionable insights.
Benefits of IoT in Healthcare
https://appinventiv.com/blog/iot-in-healthcare/
Examples of the IoT Medical Devices
https://appinventiv.com/blog/iot-in-healthcare/
Local Area Network
https://www.cisco.com/c/en/us/products/switches/what-is-a-lan-local-area-network.html#~what-it-is
LAN
• The advantages of a LAN are the same as those for any group of
devices networked together.
• The devices can use a single Internet connection, share files with one
another, print to shared printers, and be accessed and even controlled
by one another.
• LANs were developed in the 1960s for use by colleges, universities, and
research facilities (such as NASA), primarily to connect computers to
other computers.
• It wasn't until the development of Ethernet technology (1973, at Xerox
PARC), its commercialization (1980), and its standardization (1983) that
LANs started to be used widely.
• While the benefits of having devices connected to a network have always been
well understood, it wasn't until the wide deployment of Wi-Fi technology that
LANs became commonplace in nearly every type of environment.
• Today, not only do businesses and schools use LANs, but also restaurants, coffee
shops, stores, and homes.
What equipment is needed to set up a LAN?
• The simplest Internet-connected LANs require only a router and a way for
computing devices to connect to the router, such as via Ethernet cables or a WiFi
hotspot.
• LANs without an Internet connection need a switch for exchanging data. Large
LANs, such as those in a large office building, may need additional routers or
switches to more efficiently forward data to the right devices.
How do LANs work?
• Most LANs connect to the Internet at a central point: a router.
• Home LANs often use a single router, while LANs in larger
spaces may additionally use network switches for more
efficient packet delivery.
• LANs almost always use Ethernet, WiFi, or both in order to
connect devices within the network.
• Ethernet is a protocol for physical network connections that
requires the use of Ethernet cables.
• WiFi is a protocol for connecting to a network via radio waves.
• A variety of devices can connect to LANs, including servers, desktop
computers, laptops, printers, IoT devices, and even game consoles. In
offices, LANs are often used to provide shared access to internal
employees to connected printers or servers.
• Early LANs had data rates in the 4 to 16 Mbps range. Today, speeds are
normally 100 or 1000 Mbps. Propagation delay is very short in a LAN.
• The smallest LAN may only use two computers, while larger LANs can
accommodate thousands of computers. LAN has a range up to 2km.
• A LAN typically relies mostly on wired connections for increased speed and
security, but wireless connections can also be part of a LAN.
• The fault tolerance of a LAN is more and there is less congestion in this
network.
• A bunch of students playing Counter-Strike in the same room (without
internet).
Advantages:
• Provides fast data transfer rates and high-speed communication.
• Easy to set up and manage.
• Can be used to share peripheral devices such as printers and
scanners.
• Provides increased security and fault tolerance compared to WANs.
Disadvantages:
• Limited geographical coverage.
• Limited scalability and may require significant infrastructure
upgrades to accommodate growth.
• May experience congestion and network performance issues with
increased usage.
Wide Area Network
• WAN or Wide Area Network is a computer network that extends over a large
geographical area, although it might be confined within the bounds of a state or
country.
• WAN has a range of above 50 km. A WAN could be a connection of LAN connecting
to other LANs via telephone lines and radio waves and may be limited to an
enterprise (a corporation or an organization) or accessible to the public. The
technology is high-speed and relatively expensive.
• There are two types of WAN: Switched WAN and Point-to-Point WAN. WAN is
difficult to design and maintain.
• The fault tolerance of a WAN is less and there is more congestion in the network. A
Communication medium used for WAN is PSTN (Public Switched Telephone
Network)or Satellite Link.
• Due to long-distance transmission, the noise and error tend to be more in WAN.
• WAN’s data rate is slow about a 10th LAN’s speed since it involves increased
distance and increased number of servers and terminals etc.
• The speed of WAN ranges from a few kilobits per second (Kbps) to megabits per
second (Mbps). Propagation delay is one of the biggest problems faced here.
• Devices used for the transmission of data through WAN are Optic wires,
Microwaves, and Satellites.
• An example of a Switched WAN is the asynchronous transfer mode (ATM) network
and Point-to-Point WAN is a dial-up line that connects a home computer to the
Internet.
Advantages:
• Covers large geographical areas and can connect remote locations.
• Provides connectivity to the internet.
• Offers remote access to resources and applications.
• Can be used to support multiple users and applications
simultaneously.
Disadvantages:
• Can be expensive to set up and maintain.
• Offers slower data transfer rates than LAN or MAN.
• May experience higher latency and longer propagation delays due
to longer distances and multiple network hops.
• May have lower fault tolerance and security compared to LANs.
Difference between LAN & WAN
Open Interconnection Standards
• The Open Systems Interconnection (OSI) Model is a conceptual model created by
the International Organization for Standardization that allows various
communication systems to communicate using standard protocols.
• The OSI provides a standard for different computer systems to be able to
communicate with each other. The OSI Model can be seen as a universal language
for computer networking.
• It’s based on the concept of splitting up a communication system into seven
different layers, each one stacked upon the last.
• Each layer of the OSI Model handles a specific job and communicates with the
layers above and below itself.
• The OSI model is designed to be robust, error correcting, and efficient. However,
sometimes hackers attempt to break individual communications at various layers
of the OSI Model.
• Often they attempt this with a DDoS attacks which target specific layers of a
network connection; application-layer attacks target layer 7 and protocol layer
attacks target layers 3 and 4.
https://cyberhoot.com/cybrary/open-systems-interconnection-osi-model/
Characteristics of OSI Model
• A layer should only be created where the definite levels of abstraction are needed.
• The number of layers should be large so that separate functions should not be put
in the same layer. At the same time, it should be small enough so that architecture
doesn’t become very complicated.
• In the OSI model, each layer relies on the next lower layer to perform primitive
functions. Every level should able to provide services to the next higher layer.
• Changes made in one layer should not need changes in other lavers.
Why of OSI Model?
• The highest is closest to the end system user. In this layer, communication from one
end-user to another begins by using the interaction between the application layer. It
will process all the way to end-user.
The Lower Layers: These layers handle activities related to data transport. The physical
layer and datalink layers also implemented in software and hardware.
• Upper and Lower layers further divide network architecture into seven different
layers as below
• Application
• Presentation
• Session
• Transport
• Network, Data-link
• Physical layers
The File Transfer Protocol is a standard
communication protocol used for the transfer
of computer files from a server to a client on
a computer network.
SSL : Secure Sockets Layer (SSL) certificates, sometimes called digital certificates, are
used to establish an encrypted connection between a browser or user's.
TLS :Transport Layer Security (TLS) encrypts data sent over the Internet to ensure that
eavesdroppers and hackers are unable to see what you transmit
POP3 : Post Office Protocol 3, or POP3, is the most commonly used protocol for receiving email over the internet.
SNMP : Simple Network Management Protocol (SNMP) is an internet standard protocol used to monitor and
manage network devices connected over an IP. SNMP is used for communication between routers, switches,
firewalls, load balancers, servers, CCTV cameras, and wireless devices.
NetBIOS: NetBIOS (Network Basic Input/Output System) is a network service that enables applications on different
computers to communicate with each other across a local area network (LAN).
SAP: A Service Access Point (SAP) is an identifying label for network endpoints used in Open Systems
Interconnection (OSI) networking.
TCP : Transmission Control Protocol (TCP) is a communications standard that enables application programs and
computing devices to exchange messages over a network. It is designed to send packets across the internet and
ensure the successful delivery of data and messages over networks.
UDP: The full form of UDP is User Datagram Protocol. UDP is a communication protocol that makes messaging
easy between various computing devices in a network. This message-oriented protocol works for data paths and
communication channels.
IPV5 : The IPv5 was the 5th version of the Internet protocol that was developed to stream voice data and video.
IPV6: IPv6 or Internet Protocol Version 6 is a network layer protocol that allows communication to take place over
the network.
ICMP: The Internet Control Message Protocol (ICMP) is a protocol that devices within a network use to
communicate problems with data transmission.
IPSEC: IPSec is a set of communication rules or protocols for setting up secure connections over a network.
ARP: Address Resolution Protocol (ARP) is a communication protocol used to find the MAC (Media Access
MPLS : Multiprotocol label switching (MPLS) is a method for setting up dedicated paths across networks
without relying on the typical routing process.
Point-to-Point Protocol (PPP) is a TCP/IP protocol that is used to connect one computer system to another.
Computers use PPP to communicate over the telephone network or the Internet.
Frame relay is a protocol that defines how frames are routed through a fast-packet network based on the
address field in the frame.
ATM: The acronym ATM stands for Asynchronous Transfer Mode and refers to a communication protocol
which can be used to transfer data, videos and speech.
RS-232 is capable of operating at data rates up to 20 Kbps and can transmit data about 15 meters (50 ft).
100BASE-TX is the most common Fast Ethernet physical layer, transmitting data through two twisted wire-
pairs (one for each direction), which provide full duplex operation with 100 Mbit/s of throughput in each
direction.
ISDN : Integrated Services Digital Network (ISDN) is a set of communication standards for simultaneous
digital transmission of voice, video, data, and other network services over the digitalised circuits of the
public switched telephone network.
Advantages of the OSI Model
• It helps you to standardize router, switch, motherboard, and other
hardware
• Reduces complexity and standardizes interfaces
• Facilitates modular engineering
• Helps you to ensure interoperable technology
• Helps you to accelerate the evolution
• Protocols can be replaced by new protocols when technology
changes.
• Provide support for connection-oriented services as well as
connectionless service.
• It is a standard model in computer networking.
• Supports connectionless and connection-oriented services.
• Offers flexibility to adapt to various types of protocols
Disadvantages of the OSI Model
• Fitting of protocols is a tedious task.
• You can only use it as a reference model.
• Doesn’t define any specific protocol.
• In the OSI network layer model, some services are duplicated in many layers such
as the transport and data link layers
• Layers can’t work in parallel as each layer need to wait to obtain data from the
previous layer.
Network Management
Network Management
• According to the International Standards Organization (ISO), there are five types of
network management to look after the entire spectrum of network-related
processes.
• These types are fault, configuration, accounting, performance, and security
management, commonly referred to as FCAPS
Network fault management:
• You can have a designated network fault management team to anticipate, detect,
and resolve network faults to minimize downtime. In addition to fault resolution,
this function is responsible for logging fault information, maintaining records,
conducting analysis, and aiding in regular audits.
• There needs to be clear channels so that the network fault management team can
report back to the network administrator to maintain transparency. It will also
work closely with the end-user in case they report faults.
• For example, the network performance management team might want to map
network response times 24/7 to avoid impacting the end-user experience.
FCAPS
Network security management:
• As most enterprise processes move online, network security is vital for resilience,
risk management, and success.
• For example, 68% of enterprises as surveyed by Telia Carrier in 2020 faced a
distributed denial of service (DDoS) attack last year.
• In a DDOS attack, multiple connected online devices target an enterprise website
with fake traffic to block legitimate traffic.
• Network security management involves protecting a system against these and
other issues.
• An enterprise network also generates a regular stream of logs analyzed by the
network security management team to find any threat fingerprints.
DDoS Attack means "Distributed Denial-of-Service (DDoS) Attack" and it is a cybercrime in which the
attacker floods a server with internet traffic to prevent users from accessing connected online services
and sites.
6 Key Components of Network Management
LENNSS
Endpoint connectivity
• A primary purpose of your network infrastructure is connecting enterprise
endpoints.
• This could be on-premise workstations, lobby kiosks, and conference room
systems.
• It could also involve a distributed landscape that helps connect remote employees
and multiple branch organizations.
• The endpoint type also varies depending on the business need. Network
management helps ensure that the necessary endpoint nodes are connected at all
times, and network admins have real-time visibility into the performance of each
node.
• IT teams may also use centralized network monitoring tools to supervise a single
interface’s endpoint connectivity for distributed locations.
Logging systems
• Logging systems are an essential component of network management as
they help monitor network performance as per industry-standard KPIs and
maintain exhaustive records.
• Logging systems are attached to both network hardware appliances and
software components.
• As these hardware and software tools are used, the logging system will
record all activity for future reference.
• Network security is a set of technologies that protects the usability and integrity
of a company’s infrastructure by preventing the entry or proliferation within a
network of a wide variety of potential threats.
• Aims at securing the confidentiality and accessibility of the data and network.
Every company or organization that handles a large amount of data, has a degree
of solutions against many cyber threats.
• The most basic example of Network Security is password protection which the user
of the network oneself chooses.
• In recent times, Network Security has become the central topic of cyber
security with many organizations inviting applications from people who have skills
in this area. The network security solutions protect various vulnerabilities of the
computer systems such as:
Users
Locations
Data
Devices
Applications
How does network security work?
• Network security combines multiple layers of defenses at the edge and in the
network. Each network security layer implements policies and controls.
• Authorized users gain access to network resources, but malicious actors are
blocked from carrying out exploits and threats.
Benefits of Network Security
• Network Security helps in protecting clients’ information and data which
ensures reliable access and helps in protecting the data from cyber threats.
• Network Security protects the organization from heavy losses that may have
occurred from data loss or any security incident.
• It overall protects the reputation of the organization as it protects the data
and confidential items.
Types of network security
• Firewalls
• Email security
• Anti-virus and anti-malware software
• Network segmentation
• Access control
• Application security
• Behavioral analytics
• Data loss prevention
• Intrusion prevention systems
• Mobile device security
• Security information and event management
• VPN
• Web security
• Wireless security
Firewalls
• Firewalls put up a barrier between your trusted internal network and untrusted
outside networks, such as the Internet.
• They use a set of defined rules to allow or block traffic. A firewall can be hardware,
software, or both. Cisco offers unified threat management (UTM) devices and
threat-focused next-generation firewalls.
Email security
• Email gateways are the number one threat vector for a security breach. Attackers
use personal information and social engineering tactics to build sophisticated
phishing campaigns to deceive recipients and send them to sites serving up
malware.
• An email security application blocks incoming attacks and controls outbound
messages to prevent the loss of sensitive data.
Anti-virus and anti-malware software
Network segmentation
• Software-defined segmentation puts network traffic into different classifications
and makes enforcing security policies easier.
• Ideally, the classifications are based on endpoint identity, not mere IP addresses.
You can assign access rights based on role, location, and more so that the right
level of access is given to the right people and suspicious devices are contained
and remediated.
Access control
• Not every user should have access to your network. To keep out potential
attackers, you need to recognize each user and each device.
• One can enforce security policies. Block noncompliant endpoint devices or give
them only limited access.
• This process is network access control (NAC).
Application security
• Any software you use to run your business needs to be protected, whether your IT
staff builds it or whether you buy it.
• Unfortunately, any application may contain holes, or vulnerabilities, that attackers
can use to infiltrate your network.
• Application security encompasses the hardware, software, and processes you use
to close those holes.
Behavioral analytics
• To detect abnormal network behavior, you must know what normal behavior looks
like. Behavioral analytics tools automatically discern activities that deviate from
the norm.
• Security team can then better identify indicators of compromise that pose a
potential problem and quickly remediate threats.
Data loss prevention
• Organizations must make sure that their staff does not send sensitive
information outside the network.
• Data loss prevention, or DLP, technologies can stop people from
uploading, forwarding, or even printing critical information in an unsafe
manner.
VPN
• A virtual private network encrypts the connection from an endpoint to a
network, often over the Internet.
• Typically, a remote-access VPN uses IPsec or Secure Sockets Layer to
authenticate the communication between device and network.
Web security
• A web security solution will control your staff’s web use, block web-based
threats, and deny access to malicious websites.
• It will protect your web gateway on site or in the cloud. "Web security"
also refers to the steps you take to protect your own website.
Wireless security
• Active attacks are a type of cyber security attack in which an attacker attempts to
alter, destroy, or disrupt the normal operation of a system or network.
• Active attacks involve the attacker taking direct action against the target system or
network, and can be more dangerous than passive attacks, which involve simply
monitoring or eavesdropping on a system or network.
Masquerade
Modification of messages
Repudiation
Replay
Denial of Service
Masquerade –
• Masquerade is a type of cyber security attack in which an attacker pretends to be
someone else in order to gain access to systems or data.
• This can involve impersonating a legitimate user or system to trick other users or
systems into providing sensitive information or granting access to restricted areas.
Modification of messages
It means that some portion of a message is altered or that message is delayed or
reordered to produce an unauthorized effect.
Repudiation –
• Repudiation attacks are a type of cybersecurity attack in which an attacker
attempts to deny or repudiate actions that they have taken, such as making a
transaction or sending a message.
• These attacks can be a serious problem because they can make it difficult to track
down the source of the attack or determine who is responsible for a particular
action.
Replay
• It involves the passive capture of a message and its subsequent transmission to
produce an authorized effect.
• In this attack, the basic aim of the attacker is to save a copy of the data originally
present on that particular network and later on use this data for personal uses.
Once the data is corrupted or leaked it is insecure and unsafe for the users.
• Denial of Service
HP clusters use computer clusters and supercomputers to solve advance computational problems. They
are used to performing functions that need nodes to communicate as they perform their jobs. They are
designed to take benefit of the parallel processing power of several nodes.
Load-balancing clusters
Incoming requests are distributed for resources among several nodes running similar programs or
having similar content. This prevents any single node from receiving a disproportionate amount of task.
This type of distribution is generally used in a web-hosting environment.
HA clusters are designed to maintain redundant nodes that can act as backup systems in case any failure
occurs. Consistent computing services like business activities, complicated databases, customer services
like e-websites and network file distribution are provided. They are designed to give uninterrupted data
availability to the customers.
Classification of Cluster
Open Cluster :
IPs are needed by every node and those are accessed only through the
internet or web. This type of cluster causes enhanced security concerns.
Close Cluster :
The nodes are hidden behind the gateway node, and they provide increased
protection. They need fewer IP addresses and are good for computational
tasks.
Cluster Computing Architecture
• It is designed with an array of interconnected individual computers and
the computer systems operating collectively as a single standalone system.
• It is a group of workstations or computers working together as a single,
integrated computing resource connected via high speed interconnects.
• A node – Either a single or a multiprocessor network having memory,
input and output functions and an operating system.
• Two or more nodes are connected on a single line or every node might be
connected individually through a LAN connection.
Components of a Cluster Computer : OSCAR - Open Source Cluster Application
• Cluster Nodes Resources is a Linux-based software
installation for high-performance cluster
• Cluster Operating System computing.
• The switch or node interconnect
Scyld ClusterWare is a Linux-based high-
• Network switching hardware performance computing system.
• High Performance :
The systems offer better and enhanced performance than that of mainframe computer networks.
• Easy to manage :
Cluster Computing is manageable and easy to implement.
• Scalable :
Resources can be added to the clusters accordingly.
• Expandability :
Computer clusters can be expanded easily by adding additional computers to the network.
Cluster computing is capable of combining several additional resources or the networks to the
existing computer system.
• Availability :
The other nodes will be active when one node gets failed and will function as a proxy for the
failed node. This makes sure for enhanced availability.
• Flexibility :
It can be upgraded to the superior specification or additional nodes can be added.
Disadvantages of Cluster Computing
• High cost :
It is not so much cost-effective due to its high hardware and its design.
• Problem in finding fault :
It is difficult to find which component has a fault.
• More space is needed :
Infrastructure may increase as more servers are needed to manage and
monitor.
Applications of Cluster Computing
• Various complex computational problems can be solved.
• It can be used in the applications of aerodynamics, astrophysics and in
data mining.
• Weather forecasting.
• Image Rendering.
• Various e-commerce applications.
• Earthquake Simulation.
• Petroleum reservoir simulation.