Chapter 5 It Architecture

Post on 29-Nov-2014

907 views 1 download

description

 

Transcript of Chapter 5 It Architecture

Chapter 5: IT Architecture

Hardware & Software Basics

Information Technology

• Is any computer-based tool that people use to work with information and support the information and information-processing needs of an organization

• Hardware: consists of the physical devices associated with a computer system

• Software: is a set of instructions that the hardware executes to carry out specific tasks

Two basic categories of ITTwo basic categories of IT

3

Input, Process, Output, and Storage Hardware

Major hardware Components

• Central Processing Unit (CPU): hardware that interprets & executes program software (Instructions) and coordinates how all the other hardware works together

• Central Processing Unit (CPU): hardware that interprets & executes program software (Instructions) and coordinates how all the other hardware works together

• Made up of two parts;

1. Control Unit: interprets software instructions & tells hardware devices what to do.

2. Arithmetic Logic Unit: performs all arithmetic and logical operations

Essentially acts as the Brains of the ComputerEssentially acts as the Brains of the Computer

Computer Performance: Megahertz and Gigahertz

• The number of CPU cycles per second determines how fast a CPU carries out software instructions

• Speed is measured in in Megahertz & Gigahertz

• MHz: millions of CPU cycles per second

• GHz: billions of CPU cycles per second

• Clock Speed: speed of internal clock of a CPU that sets the pace of operations

• Word Length: number of bits that can be processed by the CPU at any giving time

• Bus Width: Size of internal electrical pathway along which signals are send from one part of the computer to another. Wider bus moves more data

• Chip line width: the distance between transistors on a chip

• Clock Speed: speed of internal clock of a CPU that sets the pace of operations

• Word Length: number of bits that can be processed by the CPU at any giving time

• Bus Width: Size of internal electrical pathway along which signals are send from one part of the computer to another. Wider bus moves more data

• Chip line width: the distance between transistors on a chip

What do I need to know when purchasing a computer?

• Depends on the job functions of your employees.

• Employees engaging in word-processing or spreadsheet management activities generally require no more than

• Functions demanding like AutoCAD require more and faster processing power;

• Microsoft Office Basic 2007

• Component Requirement Computer and processor

• 500 megahertz (MHz) processor or higher Memory

• AutoCAD System Requirements

For AutoCAD 2009: • Intel® Pentium® 4 processor or

AMD Athlon®, 2.2 GHz or greater orIntel or AMD Dual Core processor, 1.6 GHz or greater

• Microsoft Office Basic 2007

• Component Requirement Computer and processor

• 500 megahertz (MHz) processor or higher Memory

• AutoCAD System Requirements

For AutoCAD 2009: • Intel® Pentium® 4 processor or

AMD Athlon®, 2.2 GHz or greater orIntel or AMD Dual Core processor, 1.6 GHz or greater

Faster processing means higher costs for Computer systems

Virtualization

• Virtualization is a protected memory space created by the CPU that allows the computer to create virtual machines

• Essentially it is a computer within a computer!

• lets a single desktop computer simultaneously run several copies of operating systems like Microsoft's XP as processes on the desktop machine.

• This turns a single physical machine into a number of different computers, increasing hardware utilization and system flexibility.

• lets a single desktop computer simultaneously run several copies of operating systems like Microsoft's XP as processes on the desktop machine.

• This turns a single physical machine into a number of different computers, increasing hardware utilization and system flexibility.

Why Virtualize?

• Virtualization is a good idea because it helps manage computer complexity.

• Rather than try to juggle multiple installations of subtly different software, a computer user can now experiment with beta software within the safe confines of a virtual machine.

Primary Storage: RAM

• Primary storage is the computers main memory

• Made up of random access memory and read-only memory

• Primary storage is the computers main memory

• Made up of random access memory and read-only memory

• Random Access Memory: acts as the computers primary working memory

• Program instructions and data are stored in RAM so that they can be accessed directly by the CPU via the processors data bus

The term random is used to indicate that the computer does not need to access memory cells in sequence; rather, they can be referenced in any order.

RAM: Volatile• Often referred to as

Read/Write memory

• Allows you to work with programs (excel for example) and modify it (rewrite) as needed until the data is ready for printing or storage on secondary storage media

• Memory Swapping: Memory swapping occurs when there is a request to the operating system to store data in memory and the data will not fit because there is not enough free memory to store the requested data.

• Memory Swapping: Memory swapping occurs when there is a request to the operating system to store data in memory and the data will not fit because there is not enough free memory to store the requested data.

In this case, the operating system will have to remove something to make space.In this case, the operating system will have to remove something to make space.

RAM… So what? How does it effect me?Little swapping occurs

when:

Your computer has a very large main memory.

You use only one or a few programs at a time.

You use small files.

Little swapping occurs when:

Your computer has a very large main memory.

You use only one or a few programs at a time.

You use small files.

• You may have a serious problem if:

– You need to use many programs or process many large data files.

– Your computer has a small memory capacity.

What can businesses do?What can businesses do?

• Optimize applications to utilize memory more efficiently Or;

• Add more RAM

• Its important again then from a business perspective to understand your system requirements…… for example;

• Users need computers that will allow then to work with word processing, accounting software, and have constant access to a customer database….

• They will also be communicating via MS Outlook with co-workers and business partners…..

• Its important again then from a business perspective to understand your system requirements…… for example;

• Users need computers that will allow then to work with word processing, accounting software, and have constant access to a customer database….

• They will also be communicating via MS Outlook with co-workers and business partners…..

System Requirements• QuickBooks Enterprise requires at

least 1.8 GHz processor and 512 MB RAM for a multiuser environment

• MS Office requires at least 500 megahertz (MHz) processor or higher Memory 512 MB RAM

• CRM is handled by the QuickBooks software…..

• Outlook part of MS Office Suite….

IS Dept offers these PC’s

◦ Intel Pentium 4 Processor at 2.8 GHz with 533MHz Data Bus and 512K cache, 256MB RAM

◦ Intel Pentium 4 Processor at 2.8 GHz with 533MHz Data Bus and 512K cache, 512 MB RAM

◦ Intel Pentium 4 Processor at 2.8 GHz with 533MHz Data Bus and 512K cache, 256MB RAM

◦ Intel Pentium 4 Processor at 2.8 GHz with 533MHz Data Bus and 512K cache, 512 MB RAM

Intel Pentium 4 Processor at 3.6 GHz with 533MHz Data Bus and 1MB cache, 512 MB RAM

Cache Memory & ROM

Cache Memory• Is a small unit of ultra-fast

memory that is used to store recently accessed or frequently accessed data so that the CPU does not have to retrieve this data from slower memory circuits as RAM.

• Cache resides on or is close to the CPU

• Is a small unit of ultra-fast memory that is used to store recently accessed or frequently accessed data so that the CPU does not have to retrieve this data from slower memory circuits as RAM.

• Cache resides on or is close to the CPU

ROM: Read-Only Memory• Is the portion of primary storage

that does not lose its contents when the power goes off.

• Contains essential system programs that neither the user nor the computer can erase

• Start-up instructions are stored in ROM

Secondary Storage Devices

• Flash Memory & Memory Cards

• USB Drives• Flash Drives• Memory Cards

Like ROM it is not volatile

Magnetic Medium: Your hard drive– Uses several rigid disks

coated with a magnetic material housed together with a recording heads in a sealed mechanism

Optical DrivesCD-ROM, CD-RW, DVD, DVD-RW

Magnetic Medium: Your hard drive– Uses several rigid disks

coated with a magnetic material housed together with a recording heads in a sealed mechanism

Optical DrivesCD-ROM, CD-RW, DVD, DVD-RW

CD-ROMs & DVDs are an economical solution for storing data and programs. Provides increased capacity and portabilityCD-ROMs & DVDs are an economical solution for storing data and programs. Provides increased capacity and portability

Input & Output Devices already covered….

Input Devices & Output DevicesInput Devices & Output Devices

• Keyboards• Joysticks• Mouse• Touch screen• Monitors• Printers

Hardware also includes Communication DevicesHardware also includes Communication Devices

• Modems and routers are a few examples….

• We’ll cover these in more detail in later chapters…..

Opening QuestionsOpening Questions

• What is the relationship between memory sticks and laptops?

• How can a user employ one to help protect information loss from the other?

• How can an organization use technologies discussed to protect intellectual capital?

Computer Categories and Software Basics

• Supercomputers today are advancing some of the countries most dynamic industries including;

– advanced manufacturing, – gene research in life sciences

and – real-time financial marketing

modeling

• How? Because supercomputers are hitting processing power of well over 200 teraflops—the equivalent of everyone on earth performing 35,000 calculations per second!

• How? Because supercomputers are hitting processing power of well over 200 teraflops—the equivalent of everyone on earth performing 35,000 calculations per second!

Supercomputing

• Clustering: companies chaining together thousands of PCs to build mass-market systems

• See the Super Computing example in YouTube

• Clustering: companies chaining together thousands of PCs to build mass-market systems

• See the Super Computing example in YouTube

• Parallel processing: provides the ability to run two or more tasks simultaneously and is viewed as the chip industries future

Software Basics

• Hardware is only as good as the software that runs it.

• System software: controls how various technology tools work together along with the application software

• Firmware falls in between!

• BIOS of a PCs system software falls into this category but is more commonly understood as the application software that runs mobile device technology

• Firmware falls in between!

• BIOS of a PCs system software falls into this category but is more commonly understood as the application software that runs mobile device technology

System software includes both operating system software and utility softwareSystem software includes both operating system software and utility software

Operating System & Utility Software

Operating System & Utility Software

• Operating system software control the activities of managing a software application like Excel and ensuring that a graph is sent to the printer

• Utility software provides additional functionality to the operating system.

examples include;

– Antivirus software– Screen savers

Application Software

• Used for specific information processing needs, including payroll, CRM, project management, etc…

• Application software is used to solve specific problems or to perform specific tasks

• Used for specific information processing needs, including payroll, CRM, project management, etc…

• Application software is used to solve specific problems or to perform specific tasks

• Examples include:• MS Office• QuickBooks

Enterprise Architecture

• Includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT resources

• Unified and solid enterprise architecture standardizes hardware and software systems that adds these benefits to the organization;

– Decreased costs– Promotes the reuse of IT

assets– Speeds up the

development and delivery of new systems

– Decreased costs– Promotes the reuse of IT

assets– Speeds up the

development and delivery of new systems

Enterprise ArchitectureEnterprise Architecture

Information Architecture

• Identifies where and how important information like customer records is maintained and secured.

• Why do you suppose a data backup schedule is important to an organization?

• Some data cannot be recreated!

• BI lost from that data could be tremendous

• Securing against this type of loss is a major component!

• Some data cannot be recreated!

• BI lost from that data could be tremendous

• Securing against this type of loss is a major component!

Three Primary Areas of Information Architecture

1. Backup and Recovery2. Disaster Recovery3. Information Security

Money is lost anytime an organization experiences down time.

1. Backup and Recovery2. Disaster Recovery3. Information Security

Money is lost anytime an organization experiences down time.

• A backup is an exact copy of a system’s information

• Recovery is the ability to get a system up and running in the event of a system crash or failure

Network Administration

• From a network admin perspective; backup & restoration of data is the backing up of critical data files to a secure storage area & then restoring /retrieving data if original files are lost or deleted

• From a network admin perspective; backup & restoration of data is the backing up of critical data files to a secure storage area & then restoring /retrieving data if original files are lost or deleted

• Several techniques exist to backup and recover data;– Redundant storage

servers– Tapes– Disks– Even CD’s and DVD’s

Redundant Array of Independent or Inexpensive Disks (RAID)• Is a collection of disks that

provide fault tolerance shared and applications

• A group of hard disks is called a disk array or Drive

• The group of RAID disks is recognized as a single logical drive to the system.

• Because of this, if a single disk failure occurs it will not cause a catastrophic loss of data

• Provides fault tolerance!

• Another benefit of RAID is increased storage capacity and potentially better disk performance

• Because of this, if a single disk failure occurs it will not cause a catastrophic loss of data

• Provides fault tolerance!

• Another benefit of RAID is increased storage capacity and potentially better disk performance

Fault tolerance and Failover

• Fault tolerance is a computer system that is designed to ensure business continuity and backup should a component fail.

• Fault tolerance is a computer system that is designed to ensure business continuity and backup should a component fail.

• Failover: is a backup operational mode in which the functions of a computer component are assumed by secondary system components when primary components go off line

Disaster Recovery

• Disasters occur! – Power outages– Floods– Attacks on the system

• The question is what do we do to prepare for such occurrences?

• Disaster Recovery Plan– A detailed process for

recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood

• Disaster Recovery Plan– A detailed process for

recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood

Implement & Enforce security & disaster recovery plans• Having plans in place is not

enough

• They have to be enforced!

• Everyone in the organization should know what he or she is allowed to do on the network!

• Having plans in place is not enough

• They have to be enforced!

• Everyone in the organization should know what he or she is allowed to do on the network!

• Enforcing policy also means controlling how the system is used.

• Restrict users ability to create or change files (such as executable files)

• Limit users ability to download files

Disaster Planning: Offsite storage

• A comprehensive disaster plan includes ensuring that information is back-upped at a remote location

• Employees also need to be considered when protecting company assets!

• Hot Site: a separate and fully equipped facility where a company can move to and resume business

• Cold Site: no computer resources but is a place employees can move to after a disaster

• Hot Site: a separate and fully equipped facility where a company can move to and resume business

• Cold Site: no computer resources but is a place employees can move to after a disaster

Information SecurityInformation Security

• Demands of Information Security is growing!

– Workers want remote access to the network,

– Customers want remote access to authorized info,

– We are using increasingly available mobile devices and still want access

• Managing user Access is a critical piece of information architecture!

• Creating password policy that secures workstations and meets the requirements of legislation is part of this

Infrastructure Architecture

• Solid infrastructure include these five primary characteristics

1. Flexibility2. Scalability3. Reliability4. Availability5. Performance

• Solid infrastructure include these five primary characteristics

1. Flexibility2. Scalability3. Reliability4. Availability5. Performance

• Areas to focus on relate to integrity and availability

– Scalability – Reliability– Availability

• Areas to focus on relate to integrity and availability

– Scalability – Reliability– Availability

• Scalability: refers to how well a system can adapt to increased demands

• If disk space is not sufficient it can limit growth of information (customers) and can slow down transaction speed

• Reliability: ensures that all systems are functioning and providing accurate information

System DowntimeSystem Downtime

• Availability: addresses when systems can be accessed by users

• Systems have to go down occasionally » Maintenance » Upgrades» Fixes

• Scheduled downtime then should be coordinated to not interfere with business activities

IT Strategies for Ensuring Availability

IT Strategies for Ensuring Availability

• Allow only network admins to create or modify NOS and application system files

• Monitor network for unauthorized access or changes

• Utilize a change management system

• Install redundant components

• Perform regular health checks on system

• Check system performance, error logs, and system logs regularly

These steps used as part of a plan can

help ensure network integrity & availability

These steps used as part of a plan can

help ensure network integrity & availability

Application Architecture

• Determines how applications integrate and relate to each other

• Advances in integration technology –web services and open systems are providing organizations with more responsive enterprise architecture

• Web Services: contains a repertoire of web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services

• Think of a SCM system or Intranet

• Open systems: a term we will continue to heart a lot about!

• A broad general term that describes nonproprietary IT hardware and software

Linux operating systems is an example…

• Open systems: a term we will continue to heart a lot about!

• A broad general term that describes nonproprietary IT hardware and software

Linux operating systems is an example…