Download as pdf or txt
Download as pdf or txt
You are on page 1of 69

CSC 415

NET-CENTRIC
COMPUTING
CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA
INTRODUCTION
 Modern technology have paved the way for multi-functional
devices like the smartwatch, smarthome, smartphone, and other
embedded systems that are highly net-centric based

 These revolutions and changes in the computing and networking


environment has call for a dynamic paradigm that can provide the
technological capability and flexibility to meet future computing
challenges. This is what Net-centric Computing (NCC) stands to
bridge.

 The area of net-centric computing encompasses distributed


and embedded systems in a larger scope.
CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA
COURSE CONTENTS

• Overview of Basic Network Concepts


• Introduction to Net-centric Computing
• Definition of Net-Centric Computing
• Distributed Computing Concepts
• Embedded Systems
• Mobile & Wireless computing
• Mobile Protocols
• Fault Tolerance and
• Security issues in Distributed Computing

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE ONE:
1.0 BASIC NETWORKING CONCEPTS

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE TWO:
INTRODUCTION TO NET-CENTRIC COMPUTING
1.1: Major Trends in Computing- How did we get to this place?

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


1.2: Major NETWORKING Trends

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE ONE:
1.3: Background of Network Computing:

Centralized System: Distributed System:


Partition tasks between Partition tasks or workloads
providers and requesters between peers.

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


1.4: INTER-NETWORK BEFORE AND NOW

CSC 401- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE TWO:
2.1: NET-CENTRIC COMPUTING (NCC) CONCEPTS

 By description, Net-Centric Computing is an interconnection of


communications network or simply described as connected
computing.
 NCC is a paradigm for distributed computing environment: where
many hardware devices are interconnected in large and highly
dynamic distributed systems, using specific communication
protocols on standard physical links such as Bluetooth, Ethernet or X-10,
exchanging applications and data with peers across network.
 There is a projection that in the nearest future computers will only be
thought of in the context of their ubiquitous connectivity.

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE TWO:
INTRODUCTION TO NET-CENTRIC COMPUTING
2.2: KEY DRIVERS/MOTIVATORS FOR INNOVATIVE USE OF NET-CENTRIC
COMPUTING
As highlighted by Daniel (1921), they are:

i. The emergence of non-traditional


computing devices and mobile
computing devices,

ii. The ever-increasing networking


capabilities and computing power

iii. The need for a more sophisticated


network management and
administration.

CSC 401- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE TWO

2.3: DEFINITION
 By definition, Net-Centric Computing is
described as interconnection of communications
network or simply as a connected computing.

 The area of net-centric computing encompasses


embedded systems and in much larger in scope.

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE TWO:
2.4: Embedded System

 Embedded system are portable devices often based


on microcontrollers, (i.e. microprocessors with
integrated memory and peripheral interfaces).

Some examples of embedded systems are: MP3


players, digital watches, mobile phones, video game
consoles, digital cameras, DVD players, and GPS.
Household appliances, such as microwave ovens,
washing machines and dishwashers.

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE TWO:
2.5: Characteristics of Embedded System

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE TWO:

A system on a chip
(SoC) is essentially an
integrated circuit or
an IC that takes a
single platform and
integrates an entire
electronic or
computer system
onto it. It is, exactly
as its name suggests,
an entire system on a
single chip.

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE THREE

DISTRIBUTED SYSTEMS
3.1: What is a Distributed System?

 A Distributed System is a model in


which components located on
networked computers communicate
and coordinate their actions by passing
messages.

• The ultimate goal ofdistributed computing is to maximize performance by connecting


users and IT resources in a cost-effective, transparent and reliable manner.

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE THREE
3.2 : GENERAL CONCEPT OF DISTRIBUTED COMPUTING SYSTEMS
 Distributed computing concept is based:

• On multiple computer systems working on a single


problem/application, divided into many parts, and each part is
solved/handle by different computers/components.
• Communication between each devices connected to solve a
problem. If done properly, the computers perform like a single
entity.
• The components interact with each other in order to achieve a
common goal.
CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA
MODULE THREE:
3.3: Basic Characteristics of an Ideal Distributed Systems

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE THREE:
3.3.1: Other Basic Characteristics of Distributed Systems

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE THREE:
3.4 Major Distributed Systems Challenges & Design Goals

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE THREE:
3.5 : EXAMPLES OF DISTRIBUTED SYSTEMS APPLICATIONS

(a). Telecommunication Networks System:


• Telephone networks and mobile/cellular networks, (MTN, Glo etc)
• Computer networks: (the Internet),
• Wireless sensor networks,
(b). Network Applications System:
• World Wide Web and peer-to-peer networks,
• Massively multiplayer online games and virtual reality communities – Wikis, BLMS
• Distributed databases and distributed database management systems,
• Network file systems - Cloud
• Distributed information processing systems such as banking systems and airline reservation
systems;
(c). Real-Time Process Control Systems:
• Aircraft control systems, Industrial Control Systems;
(d). Parallel Computation Systems: - Scientific Computing

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE THREE

3.6

Group Assignment [A] – CSC Major

Group Assignment [B-N] – CSC Major

Group Assignments – Education A-N


Group Assignments – Education (O-Z)
Group Assignment [O-Z] – CSC Major

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE THREE:
Types of Distributed Computing System CONTD….
3.6.1 Clustering & Grid Computing
Cluster computing is the process of sharing the
computation tasks among multiple computers and those
computers or machines form the cluster. It works on the
distributed system with the networks. Several types of
cluster computing are used based upon the business
implementations, performance optimization, and
architectural preference such as load balancing clusters,
high availability (HA) clusters, high performance (HP)
clusters. Some of the advantages are processing speed, cost
efficiency, scalability, high availability of resources. Some of
the popular implementations of cluster computing are
Google search engine, Earthquake Simulation, Petroleum
Reservoir Simulation, and Weather Forecasting system.

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


Cluster computing is a type of
computing where a group of several
computers are linked together, allowing
the entire group of computers to behave as
if it were a single entity.

Unlike grid computers, computer clusters


have each node set to perform the same
task, controlled and scheduled by
software.

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


Grid computing is a group of networked
computers which work together as a virtual
supercomputer to perform large tasks, such as
analyzing huge sets of data or weather modeling.

A simple example of grid computing in action is


that of corporation that allocates a set of
computer nodes running in a cluster to jointly
perform a given task.
Currently grid computing is being used in
various institutions to solve a lot of
mathematical, analytical and physics problems.
Advantages of Grid Computing: It is not
centralized, as there are no servers required,
except the control node which is just used for
controlling and not for processing.

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE THREE:
Types of Distributed Computing System CONTD….
3.6.1 Clustering & Grid Computing

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE THREE:
Types of Distributed Computing System CONTD….
3.6.1 Clustering & Grid Computing
The distinction between Grid
Computing vs Cluster Computing is
that grid computing is a heterogeneous
network whose devices have diverse
hardware segments and diverse OS
connected in a grid, while cluster
computing is a homogenous network
whose devices have similar hardware
parts and a similar OS connected in a
cluster

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE THREE
Types of Distributed Computing System CONTD…..

3.6.2: Cloud computing is a type of


internet based, on-demand computing
service that lets users share resources
and data with other devices anytime
and anywhere. In a cloud computing
environment, services, applications,
storage and servers are usually
managed by third party data centres.
This allows for easy access to services
and applications with minimal
management effort.

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE THREE

Cont’d……

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE THREE
Cloud Computing Environment

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE THREE
CLOUD COMPUTING VULNERABILITIES
Cloud computing has its advantages and disadvantages. When deciding to
migrate to the cloud, you need to consider some of the possible cloud service
vulnerabilities:
1. Session Hijacking – when an attacker intercepts or steals a user’s cookie in
order to use the application. The stolen cookie allows the attacker to impersonate
the user, and log in using the user’s authenticated credentials.
2. Service Reliability – as with on premise services and private clouds, you can
expect the occasional downtime and unavailability of services. Cloud Service
Providers have uninterrupted power supplies, but they may sometimes fail. So,
100% uptime should not be expected.
3. Reliance on the Internet – the availability of cloud services is highly
dependent upon Internet connectivity. If the Internet connection fails or is
temporarily unavailable, users will not be able to use the required cloud services.
This may cause loss of revenue for the company. This would also greatly affect
services that need to run 24/7 such as in a hospital, where lives are at stake.

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE THREE
CLOUD COMPUTING THREATS
• Data Control – a big concern of companies moving to the cloud is Data Control. Putting a
company’s sensitive and confidential data on a cloud service provider’s servers is a risk some
companies are not willing to take. There is concern about the security of their data and
whether it could fall into the wrong hands.
• Denial of Service - Due to a fairly simple and sometimes anonymous registration process
for some cloud services, cloud services may be used for malicious purposes such as
spamming, botnets, Distributed Denial of Service (DDoS) or for distribution of malicious
software.
• Potential Loss of Privacy – since cloud services are accessible from anywhere on the
Internet, there is a concern about privacy of data. When data is transferred from the clients
to the cloud, an attacker may be able to intercept the communication.
• Malicious Insiders – employees working for the cloud service provided could access your
data and steal confidential information.
• Loss of Data – this could occur if the Cloud Service Provider’s hard drive fails proper data
backup was not implemented. A CSP could also accidentally delete your data.

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE THREE

3.7: Distributed Systems Models

• Architectural Models
• Interaction Models
• Fault Tolerant Models

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE THREE
3.7.1: Architectural Models

Architectural model describes responsibilities distributed between system


components and how these components are placed.
 Client-server model
• The system is structured as a set of processes, called servers, that offer services
to the users, called clients.
• The client-server model is usually based on a simple request/reply protocol,
implemented with send/receive primitives or using remote procedure calls (RPC)
or remote method invocation (RMI):
• The client sends a request (invocation) message to the server asking for some
service;

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE THREE
3.7.1: Architectural Models contd..

• The server does the work and


returns a result (e.g. the data
requested) or an error code if the
work could not be performed.

• A server can itself request services


from other servers; thus, in this new
relation, the server itself acts like a
client.

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE THREE
3.7.1: Architectural Models contd..

 Peer to Peer model: This is the most general


and flexible model.

• All processes (objects) play similar role.

• Processes (objects) interact without particular


distinction between clients and servers.

• The pattern of communication depends on


the particular application.

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE THREE
3.7.1: Architectural Models contd..

 Peer to Peer model:


• A large number of data objects are shared; any individual computer holds only
a small part of the application database.

• Processing and communication loads for access to objects are distributed


across many computers and access links.

 Problems with peer-to-peer model:

• High complexity due to


o Maintaining potentially large number of replicas.

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE THREE:
3.7.2: Interaction Model

 Interaction model is about the process execution in time of


time handling time i. e. message delivery, clock drifts etc.

• Major Classifications
• Synchronous distributed systems
• Asynchronous Distributed Systems

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE THREE:
3.7.2: Interaction Model
Classification of Interactive Models
 Synchronous Distributed System: This is a type of Distributed Systems with
(Parallel processes running using the same clock)
• In a synchronous distributed system, there is a notion of global physical time
(with a known relative precision depending on the drift rate).

• Synchronous distributed systems have a predictable behavior in terms of


timing. Only such systems can be used for hard real-time applications.

• In a synchronous distributed system it is possible and safe to use timeouts in


order to detect failures of a process or communication link.

• It may be difficult and costly to implement synchronous distributed systems.

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE THREE

 Asynchronous Distributed Systems


(Each process has its own independent clock)
Many distributed systems (including those on the Internet) are asynchronous.

• In an asynchronous distributed system there is no global physical time. Reasoning can be only in terms of
logical time .

• Asynchronous systems are widely and successfully used in practice.

• Asynchronous distributed systems are unpredictable in terms of timing.

• In practice timeouts are used with asynchronous systems for failure detection.

• However, additional measures can be applied in order to avoid duplicated messages, duplicated execution
of operations, etc.

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE THREE
3.7.3: Fault Tolerant Model

 Fault Tolerant Models are needed in order to build systems with


predictable behavior in case of faults (systems which are fault
tolerant).

 Meanwhile, failures can occur during processes or through


communication channels. The reason can be both software and
hardware faults

 Fault tolerant system functions according to the predictions, only


as long as the real faults behave as defined by the “fault model”.

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE FOUR

MOBILE COMPUTING
(Underlining principles, communication properties & issues, protocols, concrete tech)

4.1 What is Mobile Computing


By description, Mobile
Computing is a technology that
allows transmission of data,
voice and video via a computer
or any other wireless enabled
device based on Mobile IP
without having to be connected
to a fixed physical link.

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE FOUR
4.2 BASIC MOBILE COMPUTING
COMPONENTS
Mobile computing involves mobile communication, mobile
hardware, and mobile software.

Communication issues include ad hoc networks and


infrastructure networks as well as communication
properties, protocols, data formats and concrete
technologies.

Typical examples include mobile devices: smartphones,


tablets, laptop computers, smart watches, e-readers, and
handheld gaming consoles.

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


WHY MOBILE COMPUTING ?
People are mobile

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


WHY MOBILE COMPUTING ?
Devices are mobile

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE FOUR

4.3 MOBILE COMMUNICATION NETWORK MODES:

4.3.1 Mobile ad hoc network is a decentralized type of wireless


network. In the Windows operating system, ad-hoc is a
communication mode (setting) that allows computers to
directly communicate with each other without a router. Ad-hoc
networks can be wired or wireless.

They are also known as P2P networks because the devices


communicate directly and do not rely on servers, e.g Bluetooth
CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA
MODULE FOUR

4.3.2 Network infrastructure


Is the hardware and software resources of an entire network that
enable network connectivity, communication, operations and
management of an enterprise network.

It provides the communication path and services between users,


processes, applications, services and external networks/the internet.

Its devices include routers, firewalls, switches, servers, load-balancers,


intrusion detection systems, domain name systems, and storage area
networks

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE FOUR
4.4: CHARACTERISTICS OF MOBILE COMPUTING

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE FOUR
CHARACTERISTICS OF MOBILE COMPUTING…….

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE FOUR
CHARACTERISTICS OF MOBILE COMPUTING…….

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE FOUR
CHARACTERISTICS OF MOBILE COMPUTING…..

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE FOUR
CHARACTERISTICS OF MOBILE COMPUTING……..

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE FOUR
CHARACTERISTICS OF MOBILE COMPUTING………

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE FOUR
CHARACTERISTICS OF MOBILE COMPUTING…….

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE FIVE
MIDDLEWARE TECHNOLOGY
5.1 DEFINITION
Different devices with varying processing power, bandwidth
capabilities, & designed separately etc needs a platform called
Middleware to communicate with each other.

By definition, Middleware refers to any software that sits between


and links two separate applications.

It lies between an operating system and the applications running


on it.
CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA
MODULE FIVE
MIDDLEWARE TECHNOLOGY….
There are usually two levels on any device.
The first one is the operating system, which is
the low level software whose main role is to
manage the device’s resources and control the
device’s basic functions.

The second level is the applications that are


meant to run on top of the operating system.

These applications expand the functions of the


device beyond what is offered by the operating
system.

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE FIVE
5.2: MIDDLEWARE FUNCTIONS

 It provides a unified means for all these system to communicate and


interact with each other.
 Middleware often enables interoperability between applications that
run on different operating systems, by supplying services so the
application can exchange data in a standards-based way.
 In the context of distributed applications is software that provides
services beyond those provided by the operating system to enable
the various components of a distributed system to communicate and
manage data.

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE FIVE
MIDDLEWARE FUNCTION…….

 Middleware utilizes different communication


frameworks such as:
Representational State Transfer (REST), Web
services, JavaScript Object Notation (JSON), Simple
Object Access Protocol (SOAP), and so on, to enable
communication between different applications.

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE FIVE
MIDDLEWARE TECHNOLOGY AND MOBILE COMPUTING
5.3 MIDDLEWARE ARCHITECTURE

Middleware Architecture

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE FIVE
5.4: MIDDLEWARE TYPES– GROUP ASSIGNMENTS

Group 1: Remote Procedure Calls (RPC) - Group [A]

Group 2: Remote Method Invocation (RMI) – Group [B – N]

Group 3: Common Object Request Broker Architecture (CORBA) – Group [0-Z]

Group 4: Cloud Computing – Group A- Education

Group 5: Web Services/Message Oriented Middleware-Group B-Z- Education

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE FIVE
5.5 MOBILE PROTOCOL

Mobile Protocol is a standard


communication protocol (created
by extending Internet Protocol, IP)
that allows the users to move from
one network to another with the
same IP address. It ensures that
the communication will continue
without user's sessions or
connections being dropped

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE FIVE
5.6: MOBILE PROTOCOLS FOR MOBILE/WIRELESS NETWORK

5.6.1 Major Mobile Protocols


(Z-Wave and ZigBee)
They are wireless protocols designed essentially for
smart home applications. They share some qualities,
such as low-power and high reliability.

In terms of connection power Zigbee is a bit stronger


than Z wave.
CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA
MODULE FIVE
MOBILE PROTOCOLS FOR MOBILE/WIRELESS NETWORK

(i). Z-Wave Protocol is a wireless


communications protocol used primarily for home
automation. It provides the application layer
interoperability between home control systems of
different manufacturers that are a part of its alliance.

Z-Wave network is limited to 232 total devices.


While a ZigBee network theoretically could have some
65k devices connected to it.

However, you would definitely run into bandwidth


problems long before you got close to that number.

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE FIVE
MOBILE PROTOCOLS FOR MOBILE/WIRELESS NETWORK

(ii). The ZigBee Protocol : ZigBee is primarily


used for two-way communication between a
sensor and a control system. It is the first open
standard for an IPv6-based full wireless mesh
networking solution.

ZigBee/IEEE 802.15. 4 protocol is a specification


created for wireless networking. It includes
hardware and software standard design for WSN
Wireless sensor network.

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE FIVE
MOBILE PROTOCOLS FOR MOBILE/WIRELESS NETWORK

ZigBee technology supports the transfer of data


coming from the sensors at a rate of about 250
kbps.
Like Bluetooth and Wi-Fi, it is a short-
range communication that offers connectivity up
to 100 meters.

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE SIX
SECURITY ISSUES IN DISTRIBUTED SYSTEM/MOBILE COMPUTING
6.1 General Security Aspects

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE SIX
6.2 SECURITY VULNERABILITY OF MOBILE COMPUTING

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


MODULE SIX
6.3 GENERAL SECURITY ISSUES AND APPROACHES

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


SOME OF THE EMERGING TECHNOLOGIES

Emerging technologies,
such as industrial robots,
artificial intelligence, and
machine learning,
are advancing at a rapid
pace. These
developments can
improve the speed,
quality, and cost of goods
and services, but they
also displace large
numbers of workers

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA


POTENTIAL APPLICATIONS OF THE TECHNOLOGIES

Technology Potential applications

Artistic uses, advertising, agriculture In the future, drones could be used as personal
Drone display
assistants, security patrollers and even emergency responders

Electronic nose Detecting spoiled food, chemical weapons and cancer


Creating intelligent devices and robots; AI can counsel (or even take charge) in
Artificial general intelligence scientific projects, government, army, corporate governance, film and books
creation, inventions etc.

Blockchain or distributed ledger Eliminating or lowering transaction costs; distributed, open and transparent record
technology keeping; non-hierarchical networked systems; cryptography
Virtual Reality Entertainment, education

category of technology devices that can be worn by users. Examples include:


Wearable technology CommBadge:Bluetooth personal communicator for iPhone and Android.
Google Goggles: a downloadable image recognition application

CSC 415- NET-CENTRIC COMPUTING - DR FOLA ARANUWA

You might also like