Presentation is loading. Please wait.

Presentation is loading. Please wait.

IT ARCHITECTURES CHAPTER 5

Similar presentations


Presentation on theme: "IT ARCHITECTURES CHAPTER 5"— Presentation transcript:

1 IT ARCHITECTURES CHAPTER 5
Technical architecture refers to the structured process of designing and building software architecture, with focus on interaction with software and hardware developers. Technical architecture is a part of software architecture, which focuses on how to deal with certain aspects of the software engineering process. It allows us to design better systems by: Meeting system requirements and objectives: Both functional and non-functional requirements can be prioritized as "must have", "should have" or "want", where "must have" identifies properties that the system must have in order to be acceptable. An architecture allows us to evaluate and make tradeoffs among requirements of differing priority. Though system qualities (also known as non-functional requirements) can be compromised later in the development process, many will not be met if not explicitly taken into account at the architectural level. Enabling flexible partitioning of the system: A good architecture enables flexible distribution of the system by allowing the system and its constituent applications to be partitioned among processors in many different ways without having to redesign the distributable component parts. This requires careful attention to the distribution potential of components early in the architectural design process. Reducing cost of maintenance and evolution: Architecture can help minimize the costs of maintaining and evolving a given system over its entire lifetime by anticipating the main kinds of changes that will occur in the system, ensuring that the system's overall design will facilitate such changes, and localizing as far as possible the effects of such changes on design documents, code, and other system work products. This can be achieved by the minimization and control of subsystem interdependencies. Increasing reuse and integration with legacy and third party software: An architecture may be designed to enable and facilitate the (re)use of certain existing components, frameworks, class libraries, legacy or third-party applications, etc..

2 Chapter Five Overview SECTION 5.1 - HARDWARE AND SOFTWARE BASICS
Hardware Basics Computer Categories Software Basics SECTION 5.2 – MANAGING ENTERPRISE ARCHITECTURES Enterprise Architectures Information Architecture Infrastructure Architecture Application Architecture

3 SECTION 5.1 HARDWARE AND SOFTWARE

4 LEARNING OUTCOMES Describe the six major categories of hardware and provide an example of each Identify the different computer categories and explain their potential business uses Explain the difference between primary and secondary storage 5.1. Describe the six major categories of hardware and provide an example of each Hardware consists of the physical devices associated with a computer system. The six major categories of hardware include: Central processing unit (CPU) The actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together (e.g., Intel processor) Primary storage The computer’s main memory, which consists of the random access memory (RAM), cache memory, and the read-only memory (ROM) that is directly accessible to the central processing unit (CPU) (e.g., RAM) Secondary storage Equipment designed to store large volumes of data for long-term storage (e.g., diskette, hard drive, memory card, CD). Input devices Equipment used to capture information and commands (e.g., keyboard, scanner). Output devices Equipment used to see, hear, or otherwise accept the results of information processing requests (e.g., monitor, printer). Communication devices Equipment used to send information and receive it from one location to another (e.g., modem). 5.2. Identify the different computer categories and explain their potential business uses Personal digital assistant (PDA), Laptop, Tablet, Desktop, Workstation, Minicomputer (midrange computer), Mainframe computer, Supercomputer 5.3. Explain the difference between primary and secondary storage. Primary storage - The computer’s main memory, which consists of the random access memory (RAM), cache memory, and the read-only memory (ROM) that is directly accessible to the central processing unit (CPU) Secondary storage - Equipment designed to store large volumes of data for long-term storage (e.g., diskette, hard drive, memory card, CD)

5 LEARNING OUTCOMES List the common input, output, storage, and communication devices Describe the eight categories of computers by size Define the relationship between operating system software and utility software 5.4. List the common input, output, storage, and communication devices Input devices - Equipment used to capture information and commands (e.g., keyboard, scanner) Output devices - Equipment used to see, hear, or otherwise accept the results of information processing requests (e.g., monitor, printer). Primary storage - The computer’s main memory, which consists of the random access memory (RAM), cache memory, and the read-only memory (ROM) that is directly accessible to the central processing unit (CPU). Secondary storage - Equipment designed to store large volumes of data for long-term storage (e.g., diskette, hard drive, memory card, CD). Communication devices - Equipment used to send information and receive it from one location to another (e.g., modem). 5.5. Describe the eight categories of computers by size Personal digital assistant (PDA) – a small hand-held computer that performs simple tasks such as taking notes, scheduling appointments, and maintaining an address book and a calendar. Laptop computer – a fully functional computer designed to be carried around and run on battery power. Tablet computer - a pen-based computer that provides the screen capabilities of a PDA with the functional capabilities of a notebook or desktop computer. Desktop computer – the most popular choice for personal computing needs. Workstation computer – Has more mathematical and graphics power than a desktop Minicomputer (sometimes called a mid-range computer) – designed to meet the computing needs of several people simultaneously in a small to medium-size business environment. Mainframe computer (sometimes just called a mainframe) – a computer designed to meet the computing needs of hundreds of people in a large business environment. Supercomputer – the fastest, most powerful, and most expensive type of computer. 5.6. Define the relationship between operating system software and utility software Operating system software controls the application software and manages how the hardware devices work together, whereas utility software provides additional functionality to the operating system. Utility software includes antivirus software, screen savers, disk optimization software, and anti-spam software

6 INTRODUCTION Information technology (IT) - any computer-based tool that people use to work with information and support the information and information-processing needs of an organization Hardware - consists of the physical devices associated with a computer system Software - the set of instructions that the hardware executes to carry out specific tasks CLASSROOM EXERCISE Web-Enabled Cell Phones and Web Computers When categorizing computers by size for personal needs, the focus is typically on PDAs, tablet computers, notebook computers, and desktop computers. There are several other variations including smartphones (or Web-enabled cell phones) that include instant text messaging and Web browsing capabilities. Split students into groups of four people and have them research smartphone capabilities and costs. Have each group make a purchase recommendation based on their research. Ask students what their vision of the future is for cell phone telephony. Will we ever get rid of notebooks and clunky desktops in favor of more portable and cheaper devices such as smartphones? Why or why not?

7 HARDWARE BASICS Computer - an electronic device operating under the control of instructions stored in its own memory that can accept, manipulate, and store data Hardware components include: Central processing unit (CPU) Primary storage Secondary storage Input device Output device Communication device Six Hardware Components Central processing unit (CPU) The actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together. Primary storage The computer’s main memory, which consists of the random access memory (RAM), cache memory, and the read-only memory (ROM) that is directly accessible to the central processing unit (CPU). Secondary storage Equipment designed to store large volumes of data for long-term storage (e.g., diskette, hard drive, memory card, CD). Input devices Equipment used to capture information and commands (e.g., keyboard, scanner). Output devices Equipment used to see, hear, or otherwise accept the results of information processing requests (e.g., monitor, printer). Communication devices Equipment used to send information and receive it from one location to another (e.g., modem).

8 HARDWARE BASICS Apple’s 1984 video (and others) Makes for an excellent discussion on how far we have come with hardware and software

9 Central Processing Unit
Central processing unit (CPU) (or microprocessor) - the actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together Control unit - interprets software instructions and literally tells the other hardware devices what to do, based on the software instructions Arithmetic-logic unit (ALU) - performs all arithmetic operations (for example, addition and subtraction) and all logic operations (such as sorting and comparing numbers) Which component listed above is the most important for a computer? Which component listed above is the least important for a computer?

10 Central Processing Unit
The number of CPU cycles per second determines the speed of a CPU Megahertz (MHz) - the number of millions of CPU cycles per second Gigahertz (GHz) - the number of billions of CPU cycles per second Do you know how fast your computer operates? How can you tell? Right click on MyComputer and click on properties

11 Central Processing Unit
CPU speed factors Clock speed Word length Bus width Chip line width Binary digit (bit) - the smallest unit of information that a computer can process Byte - a group of eight bits representing one natural language character CPU Speed Factors Clock speed—the speed of the internal clock of a CPU that sets the pace at which operations proceed within the computer’s internal processing circuitry. Clock speed is measured in megahertz (MHz) and gigahertz (GHz). Faster clock speeds bring noticeable gains in microprocessor-intensive tasks, such as recalculating a spreadsheet. Word length—number of bits (0s and 1s) that can be processed by the CPU at any one time. Computers work in terms of bits and bytes using electrical pulses that have two states: on and off. A binary digit (bit) is the smallest unit of information that a computer can process. A bit can be either a 1 (on) or a 0 (off). A group of eight bits represents one natural language character and is called a byte. Bus width—the size of the internal electrical pathway along which signals are sent from one part of the computer to another. A wider bus can move more data, hence faster processing. Chip line width—the distance between transistors on a chip. The shorter the chip line width the faster the chip since more transistors can be placed on a chip and the data and instructions travel short distances during processing.

12 Advances in CPU Design Complex instruction set computer (CISC) chip - type of CPU that can recognize as many as 100 or more instructions, enough to carry out most computations directly Reduced instruction set computer (RISC) chip - limit the number of instructions the CPU can execute to increase processing speed Virtualization - a protected memory space created by the CPU allowing the computer to create virtual machines What kind of chip is located in your computer? How can virtualization help a business? A business can save money because it can purchase one machine that can operate as many instead of having to incur the cost of many machines

13 Primary Storage Primary storage - the computer’s main memory, which consists of the random access memory (RAM), cache memory, and the read-only memory (ROM) that is directly accessible to the CPU Do you use primary storage? If so, when and how?

14 Random Access Memory (RAM)
Random access memory (RAM) - the computer’s primary working memory, in which program instructions and data are stored so that they can be accessed directly by the CPU via the processor’s high-speed external data bus Volatility Cache memory Volatility - refers to RAM’s complete loss of stored information if power is interrupted Cache memory - a small unit of ultra-fast memory that is used to store recently accessed or frequently accessed data so that the CPU does not have to retrieve this data from slower memory circuits such as RAM What types of files are typically stored in cache memory? Internet sites

15 Random Access Memory (RAM)
CLASSROOM EXERCISE WHAT IS NEW Research the Internet to find out the latest in the chip wars Who is the current leader? What are some of the new features? Who has the largest sales?

16 Read-Only Memory (ROM)
Read-only memory (ROM) - the portion of a computer’s primary storage that does not lose its contents when one switches off the power Flash memory: rewritable read-only memory Memory card: high capacity storage, removable (used in digital camera, PDA, cell phone) Memory stick: nonvolatile memory Flash memory - a special type of rewriteable read-only memory (ROM) that is compact and portable Memory card - contain high-capacity storage that holds data such as captured images, music, or text files Memory stick - provide nonvolatile memory for a range of portable devices including computers, digital cameras, MP3 players, and PDAs Memory sticks are extremely useful devices for storing and transferring files For students who have not yet been introduced to a memory stick demonstrate to the classroom how you store and transfer files to and from the device

17 Secondary Storage Secondary storage - consists of equipment designed to store large volumes of data for long-term storage Megabyte (MB or M or Meg) - roughly 1 million bytes Gigabyte (GB) - roughly 1 billion bytes Terabyte (TB) - roughly 1 trillion bytes A computer with 256 MB of RAM translates into the RAM being able to hold roughly 256 million characters of data and software instructions Do you know the storage size on your computer?

18 Secondary Storage CLASSROOM EXERCISE HARD DRIVE TIME LINE
When will computers be available with petabyte hard drives? Ask your students to compile a time line of hard drive sizes and predict when petabyte and exabyte computers will be available This is a good exercise to discuss Moore’s Law

19 Magnetic Medium Magnetic medium - a secondary storage medium that uses magnetic techniques to store and retrieve data on disks or tapes coated with magnetically sensitive materials Magnetic tape - an older secondary storage medium that uses a strip of thin plastic coated with a magnetically sensitive recording medium Hard drive - a secondary storage medium that uses several rigid disks coated with a magnetically sensitive material and housed together with the recording heads in a hermetically sealed mechanism CLASSROOM EXERCISE 50 Years of Hard Drives Great article for students to read prior to class

20 Optical Medium Optical medium types include:
Compact disk-read-only memory (CD-ROM) Compact disk-read-write (CD-RW) drive Digital video disk (DVD) DVD-ROM drive Digital video disk-read/write (DVD-RW) Optical medium types include: Compact disk-read-only memory (CD-ROM) drive—an optical drive designed to read the data encoded on CD-ROMs and to transfer this data to a computer Compact disk-read-write (CD-RW) drive—an optical drive that enables users to erase existing data and to write new data repeatedly to a CD-RW Digital video disk (DVD)—a CD-ROM format capable of storing up to a maximum of 17 GB of data; enough for a full-length feature movie DVD-ROM drive—a read-only drive designed to read the data encoded on a DVD and transfer the data to a computer Digital video disk-read/write (DVD-RW)—a standard for DVD discs and player/recorder mechanisms that enables users to record in the DVD format

21 Input Devices Input device - equipment used to capture information and commands Manual input devices Joystick Keyboard Microphone Automated input devices Bar code scanner Digital camera Magnetic ink character reader CLASSROOM EXERCISE INVENTION OF THE MOUSE Douglas C. Engelbart, inventor of the mouse, gives a demo in 1968 Check out clips 2 and 3 (2 minutes each) Can you name a few additional input devices not shown in the above slide? Manual Input Devices Joystick—widely used as an alternative to the keyboard for computer games and some professional applications, such as computer-aided design Keyboard—provides a set of alphabetic, numeric, punctuation, symbol, and control keys Microphone—captures sounds such as a voice for voice recognition software Mouse—one or more control buttons housed in a palm-sized case and designed so that one can move it about on the table next to the keyboard Pointing stick—causes the pointer to move on the screen by applying directional pressure (popular on notebooks and PDAs) Touch screen—allows the use of a finger to point at and touch a particular function to perform Touchpad—a form of a stationary mouse on which the movement of a finger causes the pointer on the screen to move Automated Input Devices Bar code scanner—captures information that exists in the form of vertical bars whose width and distance apart determine a number Digital camera—captures still images or video as a series of 1s and 0s Magnetic ink character reader—reads magnetic ink numbers printed on checks that identify the bank, checking account, and check number Optical-character recognition—converts text into digital format for computer input Optical-mark recognition (OMR)—detects the presence or absence of a mark in a predetermined place (popular for multiple-choice exams). Point-of-sale (POS)—captures information at the point of a transaction, typically in a retail environment Radio frequency identification (RFID)—uses active or passive tags in the form of chips or smart labels that can store unique identifiers and relay this information to electronic readers

22 Output Devices Output device - equipment used to see, hear, or otherwise accept the results of information processing requests Cathode-ray tube (CRT) Liquid crystal display (LCD) Laser printer Ink-jet printer Plotter Which types of output devices do you use most frequently? Output Devices Cathode-ray tube (CRT)—a vacuum tube that uses an electron gun (cathode) to emit a beam of electrons that illuminates phosphors on a screen as the beam sweeps across the screen repeatedly. A monitor is often called a CRT. Liquid crystal display (LCDs)—a low-powered display technology used in laptop computers where rod-shaped crystal molecules change their orientation when an electrical current flows through them. Laser printer—a printer that forms images using an electrostatic process, the same way a photocopier works. Ink-jet printer—a printer that makes images by forcing ink droplets through nozzles. Plotter—a printer that uses computer-directed pens for creating high-quality images, blueprints, schematics, etc

23 Communication Devices
Communication device - equipment used to send information and receive it from one location to another Dial-up access Cable Digital subscriber line Wireless Satellite Which type of communication device do you use most frequently? Different forms of communication devices include: Dial-up Access - On demand access using a modem and regular telephone line (POT). Cable - Special cable modem and cable line required. DSL Digital Subscriber Line - This technology uses the unused digital portion of a regular copper telephone line to transmit and receive information. A special modem and adapter card are required. Wireless (LMCS) - Access is gained by connection to a high-speed cellular like local multipoint communications system (LMCS) network via wireless transmitter/receiver. Satellite - Newer versions have two-way satellite access, removing need for phone line.

24 COMPUTER CATEGORIES For the past 20 years, federally funded supercomputing research has given birth to some of the computer industry’s most significant technology breakthroughs including: Clustering Parallel processing Mosaic browser Clustering - allows companies to chain together thousands of PCs to build mass-market systems Parallel processing - provides the ability to run two or more tasks simultaneously and is viewed as the chip industry’s future Mosaic browser - which morphed into Netscape and made the Web a household name Why is parallel processing significant for the computer industry?

25 COMPUTER CATEGORIES Computer categories include:
Personal digital assistant (PDA) Laptop Tablet Desktop Workstation Minicomputer Mainframe computer Supercomputer Personal digital assistant (PDA) A small hand-held computer that performs simple tasks such as taking notes, scheduling appointments, and maintaining an address book and a calendar. The PDA screen is touch-sensitive, allowing a user to write directly on the screen, capturing what is written. Laptop A fully functional computer designed to be carried around and run on battery power. Laptops come equipped with all of the technology that a personal desktop computer has, yet weigh as little as two pounds. Tablet A pen-based computer that provides the screen capabilities of a PDA with the functional capabilities of a laptop or desktop computer. Similar to PDAs, tablet PCs use a writing pen or stylus to write notes on the screen and touch the screen to perform functions such as clicking on a link while visiting a Web site. Desktop Available with a horizontal system box (the box is where the CPU, RAM, and storage devices are held) with a monitor on top, or a vertical system box (called a tower) usually placed on the floor within a work area. Workstation Similar to a desktop but has more powerful mathematical and graphics processing capabilities and can perform more complicated tasks in less time. Typically used for software development, Web development, engineering, and e-business tools. Minicomputer (midrange computer) - Designed to meet the computing needs of several people simultaneously in a small to medium-size business environment. A common type of minicomputer is a server and is used for managing internal company networks and Web sites. Minicomputers are more powerful than desktop computers but also cost more, ranging in price from $5,000 to several hundred thousand dollars Mainframe computer Designed to meet the computing needs of hundreds of people in a large business environment. Mainframe computers are a step up in size, power, capability, and cost from minicomputers. Mainframes can cost in excess of $1 million. With processing speeds greater than 1 trillion instructions per second (compared to a typical desktop that can process about 2.5 billion instructions per second), mainframes can easily handle the processing requests of hundreds of people simultaneously. Supercomputer The fastest, most powerful, and most expensive type of computer. Organizations such as NASA that are heavily involved in research and number crunching employ supercomputers because of the speed with which they can process information.

26 SOFTWARE BASICS System software - controls how the various technology tools work together along with the application software Operating system software Utility software Application software Can you rank the above in order of importance to a computer? Operating system Application Utility Operating system software - controls the application software and manages how the hardware devices work together Utility software - provides additional functionality to the operating system Application software - used for specific information processing needs, including payroll, customer relationship management, project management, training, and many others

27 Utility Software Types of utility software Crash-proof Disk image
Disk optimization Encrypt data File and data recovery Text protect Preventative security Spyware Uninstaller Types of Utility Software Crash-proof - Helps save information if a computer crashes Disk image for data recovery - Relieves the burden of reinstalling and tweaking scores of applications if a hard drive crashes or becomes irretrievably corrupted Disk optimization - Organizes information on a hard disk in the most efficient way Encrypt data - Protects confidential information from unauthorized eyes. Programs such as BestCrypt simply and effectively apply one of several powerful encryption schemes to hard drive information. Users unlock the information by entering a password in the BestCrypt control panel. The program can also secure information on rewritable optical disks or any other storage media that is assigned a drive letter. File and data recovery - Retrieves accidental deletion of photos or documents in Windows XP by utilities such as Free Undelete, which searches designated hard drive deletion areas for recognizable data. Text protect - In Microsoft Word, prevents users from typing over existing text after accidentally hitting the Insert key. Launch the Insert Toggle Key program, and the PC will beep whenever a user presses the Insert key. Preventative security - Through programs such as Window Washer, erases file histories, browser cookies, cache contents, and other crumbs that applications and Windows leave on a hard drive. Spyware - Removes any software that employs a user’s Internet connection in the background without the user’s knowledge or explicit permission. Uninstaller - Can remove software that is no longer needed.

28 Application Software Types of application software Bowser
Communication Data management Desktop publishing Groupware Presentation graphics Programming Spreadsheet Word processing Types of Application Software Browser - Enables the user to navigate the World Wide Web. The two leading browsers are Netscape Navigator and Microsoft Internet Explorer Communication - Turns a computer into a terminal for transmitting data to and receiving data from distant computers through the telephone system Data management - Provides the tools for data retrieval, modification, deletion, and insertion; for example, Access, MySQL, and Oracle Desktop publishing - Transforms a computer into a desktop publishing workstation. Leading packages include Adobe FrameMaker, Adobe PageMaker, and QuarkXpress - Provides services for computer users, including receiving mail, sending mail, and storing messages. Leading software includes Microsoft Outlook, Microsoft Outlook Express, and Eudora Groupware - Increases the cooperation and joint productivity of small groups of co-workers Presentation graphics - Creates and enhances charts and graphs so that they are visually appealing and easily understood by an audience. A full-features presentation graphics package such as Lotus Freelance Graphics or Microsoft PowerPoint includes facilities for making a wide variety of charts and graphs and for adding titles, legends, and explanatory text anywhere in the chart of graph Programming - Possesses an artificial language consisting of a fixed vocabulary and a set of rules (called syntax) that programmers use to write computer programs. Leading programming languages include Java, C++, C#, and .NET Spreadsheet - Simulates an accountant’s worksheet onscreen and lets users embed hidden formulas that perform calculations on the visible data. Many spreadsheet programs also include powerful graphics and presentation capabilities to create attractive products. The leading spreadsheet application is Microsoft Excel Word processing - Transforms a computer into a tool for creating, editing, proofreading, formatting, and printing documents. Leading word processing applications include Microsoft Word and WordPerfect

29 OPENING CASE QUESTIONS Electronic Breaking Points
Identify six hardware categories and place each product listed in the case in its appropriate category Describe the CPU and identify which products would use a CPU Describe the relationship between memory sticks and laptops. How can a user employ one to help protect information loss from the other? What different types of software might each of the products listed in the case use? 1. Identify six hardware categories and place each product listed in the case in its appropriate category Central processing unit (CPU) The actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together (e.g., Intel processor) (Laptop, Smart Phone, MP3 Player) Primary storage The computer’s main memory, which consists of the random access memory (RAM), cache memory, and the read-only memory (ROM) that is directly accessible to the central processing unit (CPU) (e.g., RAM) (Laptop, Smart Phone, MP3 Player) Secondary storage Equipment designed to store large volumes of data for long-term storage (e.g., diskette, hard drive, memory card, CD). (Laptop, Smart Phone, MP3 Player, Memory Stick, Memory Card) Input devices Equipment used to capture information and commands (e.g., keyboard, scanner). (Laptop, Smart Phone, MP3 Player) Output devices Equipment used to see, hear, or otherwise accept the results of information processing requests (e.g., monitor, printer). (Laptop, Smart Phone, MP3 Player) Communication devices Equipment used to send information and receive it from one location to another (e.g., modem). (Smart Phone) 2. Describe the CPU and identify which products would use a CPU. Central processing unit (CPU) - The actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together. A laptop, smart p hone, and MP3 Player would use a CPU. 3. Describe the relationship between memory sticks and laptops. How can a user employ one to help protect information loss from the other? Memory sticks offer another form of memory for a laptop. A user can use a memory stick to store information from his/her laptop. 4. What different types of software might each of the products listed in the case use? Operating system software controls the application software and manages how the hardware devices work together, whereas utility software provides additional functionality to the operating system. (Laptop, Smart Phone, MP3 Player, Memory Stick, Memory Card) Utility software includes antivirus software, screen savers, disk optimization software, and anti-spam software. (Laptop, Smart Phone, MP3 Player) Application software is used for specific information processing needs, including payroll, customer relationship management, project management, training, and many others. (Laptop, Smart Phone, MP3 Player)

30 Enterprise Architecture
SECTION 5.2 Enterprise Architecture

31 LEARNING OUTCOMES Explain the three components of an enterprise architecture Describe how an organization can implement a solid information architecture List and describe the five ilities of an infrastructure architecture Compare Web services and open systems 5.7. Explain the three components of an enterprise architecture Basic enterprise architectures contain three components Information architecture identifies where and how important information, like customer records, is maintained and secured. Infrastructure architecture includes the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization’s goals. Application architecture determines how applications integrate and relate to each other. 5.8 Describe how an organization can implement a solid information architecture An information architecture identifies where and how important information, like customer records, is maintained and secured. Three primary areas an enterprise information architecture should focus on are: Backup and recovery Disaster recovery Information security 5.9 List and describe the five qualities of an infrastructure architecture Infrastructure architecture includes the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization’s goals. The following are the five primary characteristics of a solid infrastructure architecture: Flexibility, Scalability, Reliability, Availability, Performance 5.10 Compare Web services and open systems Web services contain a repertoire of Web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services. Interoperability is the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers. An open system is a broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them.

32 ENTERPRISE ARCHITECTURES
Enterprise architecture - includes the plans for how an organization will build, deploy, use, and share its data, processes, and IT assets Enterprise architect (EA) - a person grounded in technology, fluent in business, a patient diplomat, and provides the important bridge between IT and the business CLASSROOM OPENER Top Ten Data Failure Stories 10. PhD Almost an F -- A PhD candidate lost his entire dissertation when a bad power supply suddenly zapped his computer and damaged the USB Flash drive that stored the document. Had the data not been recovered, the student would not have graduated. 9. Suffering from Art -- While rearranging her home office, a woman accidentally dropped a five pound piece of clay pottery on her laptop, directly onto the hard drive area that contained a book she'd been working on for five years and 150 year-old genealogy pictures that had not yet been printed. 8. Domestic Dilemma -- A husband deleted all of his child's baby pictures when he accidentally hit the wrong button on his computer. His wife hinted at divorce if he did not get the pictures back. 7. Bite Worse than Bark -- A customer left his memory stick lying out and his dog mistook it for a chew toy. 6. Don't Try this at Home -- A man attempting to recover data from his computer on his own found the job too challenging mid-way through and ended up sending Ontrack his completely disassembled drive -- with each of its parts in a separate baggie. 5. Out of Time -- A clockmaker suffered a system meltdown, losing the digital designs for all of its clocks. Ontrack literally beat the clock recovering all their data just in time for an important international tradeshow. 4. Drilling for Data -- During a multi-drive RAID recovery, engineers discovered one drive belonging in the set was missing. The customer found the missing drive in a dumpster, but in compliance with company policy for disposing of old drives, it had a hole drilled through it. 3. Safe at Home -- After one of their executives experienced a laptop crash, the Minnesota Twins professional baseball team called on Ontrack to rescue crucial scouting information about their latest prospects. The team now relies on Ontrack for all data recoveries within its scouting and coaching ranks. 2. Hardware Problems -- A frustrated writer attacked her computer with a hammer. When the engineers received the computer, the hammer imprint was clearly visible on the top cover. 1. La Cucaracha -- In hopes of rescuing valuable company information, a customer pulled an old laptop out of a warehouse where it had been sitting unused for 10 years. When engineers opened the computer, it contained hundreds of husks of dead and decaying cockroaches.

33 ENTERPRISE ARCHITECTURES
Primary goals of enterprise architectures

34 ENTERPRISE ARCHITECTURES
Information architecture identifies where and how important information, like customer records, is maintained and secured Infrastructure architecture includes the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization’s goals Application architecture determines how applications integrate and relate to each other

35 INFORMATION ARCHITECTURE
The three primary components of an information architecture include: Backup and recovery Disaster recovery Information security

36 Backup and Recovery Backup - an exact copy of a system’s information
Recovery - the ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup Fault tolerance Failover A single backup or restore failure can cost an organization more than time and money; some data cannot be re-created, and the BI lost from that data can be tremendous Chief information officers should have enough confidence that they could walk around and randomly pull out cables to prove that the systems are safe. The CIO should also be secure enough to perform this test during peak business hours. If the thought of this test makes the CIO cringe then the organization's customers should also cringe. Fault tolerance - a computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service Failover - a backup operational mode in which the functions of a computer component (such as a processor, server, network, or database) is assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time. CLASSROOM EXERCISE Backup and Recovery Ask your students to answer the following questions: Do you have a backup strategy for your computer? How often do you backup? What do you backup? What type of format do you use for your backup? Where do you save the backup? How long do you save the backup? Now ask your students that if you stole their computer or spilled a hot cup of coffee on their computer right now how much information would they lose? Encourage your students to create a backup strategy.

37 Disaster Recovery Disaster recovery best practices include:
Mind the enterprise architectures Monitor the quality of computer networks that provide data on power suppliers and demand Make sure the networks can be restored quickly in the case of downtime Set up disaster recovery plans Provide adequate staff training, including verbal communication protocols “so that operators are aware of any IT-related problems Organizations should choose a backup and recovery strategy that is in line with its business goals. If the organization deals with large volumes of critical information, it will require daily backups, perhaps even hourly backups, to storage servers. If the organization deals with small amounts of noncritical information, then it might require only weekly backups to tapes, CDs, or DVDs. Deciding how often to back up information and what media to use is a critical business decision. If an organization decides to back up on a weekly basis, then it is taking the risk that, if a total system crash occurs, it could lose a week’s worth of work. If this risk is acceptable, then a weekly backup strategy will work. If this risk is unacceptable, then the organization needs to move to a daily backup strategy. Some organizations find the risk of losing a day’s worth of work too high and move to an hourly backup strategy.

38 Disaster Recovery Financial Institutions Worldwide Spending on Disaster Recovery Be sure to explain to your students that an organization's backup strategy must fit the organization’s needs If the organization only needs to backup its information daily, then there is no need to backup the information hourly Ask your students how many of them backup the information on their computers Ask your students what would happen if their computer crashed right now and they couldn’t recovery any of their information Would they lose days, weeks, or months of information? Encourage your students to research the Internet for PC backup information and create a personal information backup plan is a great place to store important information

39 Disaster Recovery Disaster recovery plan - a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood Disaster recovery cost curve - charts (1) the cost to the organization of the unavailability of information and technology and (2) the cost to the organization of recovering from a disaster over time Hot site Cold site Hurricanes, floods, fires, and many other types of natural disasters can have devastating effects on businesses One of the most common types of hardware failures occurs from rats, mice, and squirrels chewing on cords, cables, and devices Hot site - a separate and fully equipped facility where the company can move immediately after a disaster and resume business Cold site - a separate facility that does not have any computer equipment, but is a place where employees can move after a disaster

40 Disaster Recovery Cost Curve
Explain to your students that the optimal recovery plan in terms of costs and time is where the two lines intersect

41 Information Security A good information architecture includes:
A strong information security plan Managing user access Up-to-date antivirus software and patches Passwords may still be the weakest link in the security chain. There is little doubt that security is a top priority for business managers, regardless of the size of their company. Among Fortune 500 companies, more than 80 percent of those surveyed described updating security procedures, tools, and services as a key business priority. That desire holds true for small, midsize, or large companies and for IT managers and corporate managers.

42 INFRASTRUCTURE ARCHITECTURE
Five characteristics of adaptable systems: Flexibility – systems must meet all types of business changes Scalability – refers to how well a system can adapt to increased demands Reliability – ensures all systems are functioning correctly and providing accurate information Availability – addresses when systems can be accessed by employees, customers, and partners Performance – measures how quickly a system performs a certain process or transaction in terms of efficiency IT metrics of both speed and throughput

43 INFRASTRUCTURE ARCHITECTURE
Five primary characteristics of a solid infrastructure architecture: Flexibility Scalability Reliability Availability Performance These are commonly known as the ilities Flexibility – a flexible system is designed to include the ability to handle multiple currencies and languages, even if the company is not yet operating abroad Scalability refers to how well a system can adapt to increased demands Capacity planning determines the future IT infrastructure requirements for new equipment and additional network capacity Reliability ensures all systems are functioning correctly and providing accurate information Availability (an efficiency IT metric) addresses when systems can be accessed by employees, customers, and partners High availability refers to a system or component that is continuously operational for a desirably long length of time Performance measures how quickly a system performs a certain process or transaction in terms of efficiency IT metrics of both speed and throughput

44 APPLICATION ARCHITECTURE
Application architecture - determines how applications integrate and relate to each other

45 Web Services Web service - contains a repertoire of Web-based data and procedural resources that use shared protocols and standards permitting different applications to share data and services Interoperability - the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers Events and services are the key elements of Web services

46 Web Services Event - detect threats and opportunities and alert those who can act on the information Service - more like software products than they are coding projects, and must appeal to a broad audience, and they need to be reusable if they are going to have an impact on productivity Events Events are the eyes and ears of the business expressed in technology—they detect threats and opportunities and alert those who can act on the information. Pioneered by telecommunication and financial services companies, this involves using IT systems to monitor a business process for events that matter—a stock-out in the warehouse or an especially large charge on a consumer’s credit card—and automatically alert the people best equipped to handle the issue. For example, a credit monitoring system automatically alerts a credit supervisor and shuts down an account when the system processes a $7,000 charge on a credit card with a $6,000 limit. Services Services are more like software products than they are coding projects. They must appeal to a broad audience, and they need to be reusable if they are going to have an impact on productivity. Early forms of services were defined at too low a level in the architecture to interest the business, such as simple “Print” and “Save” services. The new services are being defined at a higher level; they describe such things as “Credit Check,” “Customer Information,” and “Process Payment.” These services describe a valuable business process. For example, “Credit Check” has value not just for programmers who want to use that code in another application, but also for businesspeople who want to use it across multiple products—say, auto loans and mortgages—or across multiple business.

47 Open Systems Open system - a broad, general term that describes nonproprietary IT hardware and software made available by the standards and procedures by which their products work, making it easier to integrate them Allow systems to seamlessly share information Capitalize on enterprise architectures Eliminate proprietary systems and promote competitive pricing Can you name any open systems? Linux Mozilla Firefox

48 OPENING CASE QUESTIONS Electronic Breaking Points
How can an organization use an information architecture to protect its IT investment in electronic devices outlined in the case? How can an organization use the devices mentioned in the case to protect information security? Identify the five ilites and rank them in order of importance for a laptop (1 highest, 5 lowest) Describe how a “Customer Phone Number” Web service could be used by one of the products outlined in the case 5. How can an organization use an information architecture to protect its IT investment in electronic devices outlined in the case? An information architecture identifies where and how important information, like customer records, is maintained and secured. Three primary areas an enterprise information architecture should focus on are: Backup and recovery Disaster recovery Information security Information architecture identifies where and how important information, like customer records, is maintained and secured. A single backup or restore failure can cost an organization more than time and money; some data cannot be re-created, and the business intelligence lost from that data can be tremendous. A backup is an exact copy of a system’s information. Recovery is the ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup. Using a proper backup and recovery and disaster recovery strategy will safe guard a company from losing any of the devices mentioned in the case – especially a laptop. 6. How can an organization use the devices mentioned in the case to protect information security? Memory sticks are great devices for storing (backing up) small amounts of information. If a employee is traveling or working remotely they can quickly backup their information to a memory stick for safe keeping. Backing up corporate data onto a laptop can be useful if the company is small and wants to keep information offsite. This is also dangerous, because of the security surrounding the information on the laptop. 7. Identify the five ilites and rank them in order of importance for a laptop (1 highest, 5 lowest). The following are the five primary characteristics of a solid infrastructure architecture: Flexibility Scalability Reliability Availability Performance Student rankings will vary. The important part of the answer is their justification for the ranking. Makes for an excellent classroom debate. 8. Describe how a “Customer Phone Number” Web service could be used by one of the products outlined in the case. A customer phone number Web service could track the phone number of any incoming call and place it in a CRM database. For example, if the customer calls my smart phone or my laptop over VoIP, the web service could automatically make an entry in a CRM system logging the incoming phone number, the time, and the duration of the call.

49 CLOSING CASE ONE Chicago Tribune
Review the five characteristics of infrastructure architecture and rank them in order of their potential impact on the Tribune Co.’s business What is the disaster recovery cost curve? Where should the Tribune Co. operate on the curve? Define backups and recovery. What are the risks to the Tribune’s business if it fails to implement an adequate backup plan? 1. Review the five characteristics of infrastructure architecture and rank them in order of their potential impact on the Tribune Co.’s business. The following are the five primary characteristics of a solid infrastructure architecture: Flexibility Scalability Reliability Availability Performance Student rankings will vary. The important part of the answer is their justification for the ranking. Makes for an excellent classroom debate. 2. What is the disaster recovery cost curve? Where should the Tribune Co. operate on the curve? A disaster recovery cost curve charts (1) the cost to the organization of the unavailability of information and technology and (2) the cost to the organization of recovering from a disaster over time. The disaster recovery cost curve shows where the two lines intersect is the best recovery plan in terms of cost and time. Creating an organization’s disaster recovery cost curve is no small task. It must consider the cost of losing information and technology within each department or functional area, and the cost of losing information and technology across the whole enterprise. During the first few hours of a disaster, those costs will be low but become increasingly higher over time. With those costs in hand, an organization must then determine the costs of recovery. Cost of recovery during the first few hours of a disaster is exceedingly high and diminishes over time. 3. Define backups and recovery. What are the risks to the Tribune’s business if it fails to implement an adequate backup plan? A backup is an exact copy of a system’s information. Recovery is the ability to get a system up and running in the event of a system crash or failure and includes restoring the information backup. If the Tribune failed to backup and it lost all of its servers it would be devastating for its business.

50 CLOSING CASE ONE Chicago Tribune
Why is a scalable and highly available enterprise architecture critical to the Tribune Co.’s current operations and future growth? Identify the need for information security at the Tribune Co. How could the Tribune Co. use a classified ad Web service across its different businesses? 4. Why is a scalable and highly available enterprise architecture critical to the Tribune Co.’s current operations and future growth? Scalability refers to how well a system can adapt to increased demands. Availability (an efficiency IT metric) addresses when systems can be accessed by employees, customers, and partners. High availability refers to a system or component that is continuously operational for a desirably long length of time. 5. Identify the need for information security at the Tribune Co. Information security is important for everyone and every organization. The Tribune needs to keep its sensitive information secure and ensure it is protected against hackers and viruses. 6. How could the Tribune Co. use a classified ad Web service across its different businesses? The Tribune could write a Web service ad that it could then use across all of its different businesses. That is the advantage of Web services, you write the code once and can reuse it as many times as you need.

51 CLOSING CASE TWO UPS in the Computer Repair Business
Do you think UPS’s entrance into the laptop repair business was a good business decision? Why or why not? Identify the different types of hardware UPS technicians might be working on when fixing laptops Assume you are a technician working at UPS. Explain to a customer the different types of memory and why only certain types of data are lost during a computer failure. Also identify a potential backup strategy you can suggest to the customer Assume you are a technician working at UPS. Explain to a customer the different types of software found in a typical laptop 1. Do you think UPS’s entrance into the laptop repair business was a good business decision? Why or why not? Yes. UPS is now entering many businesses where it is taking over the logistics of the company including Papa John’s pizza and Nike. Outsourcing logistics to UPS is a highly successful business and has provided UPS with a new revenue stream. 2. Identify the different types of hardware UPS technicians might be working on when fixing laptops. Hardware consists of the physical devices associated with a computer system. The six major categories of hardware include: Central processing unit (CPU) The actual hardware that interprets and executes the program (software) instructions and coordinates how all the other hardware devices work together (e.g., Intel processor) Primary storage The computer’s main memory, which consists of the random access memory (RAM), cache memory, and the read-only memory (ROM) that is directly accessible to the central processing unit (CPU) (e.g., RAM) Secondary storage Equipment designed to store large volumes of data for long-term storage (e.g., diskette, hard drive, memory card, CD). Input devices Equipment used to capture information and commands (e.g., keyboard, scanner). Output devices Equipment used to see, hear, or otherwise accept the results of information processing requests (e.g., monitor, printer). Communication devices Equipment used to send information and receive it from one location to another (e.g., modem). 3. Assume you are a technician working at UPS. Explain to a customer the different types of memory and why only certain types of data are lost during a computer failure. Also identify a potential backup strategy you can suggest to the customer. Primary storage - The computer’s main memory, which consists of the random access memory (RAM), cache memory, and the read-only memory (ROM) that is directly accessible to the central processing unit (CPU). Secondary storage - Equipment designed to store large volumes of data for long-term storage (e.g., diskette, hard drive, memory card, CD). Many different things can occur during a computer crash. The first type of memory to be erased is the primary storage. If your computer shuts down or crashes without saving you will have lost all of your work that is stored in primary storage. The secondary storage can usually be saved if there is not any damage to the hard disk. Removing the hard disk and placing it in a working computer can allow you to access all of your hard disk information. If your entire laptop is stolen the you will have lost all primary and secondary storage. Backing up your hard disk to a CD, DVD, alternate hard drive, online storage, etc. is a good idea to prevent data loss. 4. Assume you are a technician working at UPS. Explain to a customer the different types of software found in a typical laptop. Laptops contain three types of software – operating system software, utility software, and application software. Operating system software controls the application software and manages how the hardware devices work together, whereas utility software provides additional functionality to the operating system. Utility software includes antivirus software, screen savers, disk optimization software, and anti-spam software Application software is used for specific information processing needs, including payroll, customer relationship management, project management, training, and many others. Application software is used to solve specific problems or perform specific tasks. From an organizational perspective, payroll software, collaborative software such as videoconferencing (within groupware), and inventory management software are all examples of application software.

52 CLOSING CASE THREE Fear the Penguin
How does Linux differ from traditional software? Should Microsoft consider Linux a threat? Why or why not? How is open source software a potential trend shaping organizations? 1. How does Linux differ from traditional software? Linux is developed using incremental phases or a type of agile methodology. Programmers from all over the world can write changes to Linux. Traditional software development, such as the waterfall approach, only allows changes during the development phase which is generally in the middle of the project. Allowing changes at anytime during the SDLC would not happen in a traditional software development project. 2. Should Microsoft consider Linux a threat? Why or why not? Answers to this question will also vary. Some students will agree with Microsoft stating that Linux is not a threat since the market that uses Linux typically would not use Microsoft, but would probably use UNIX. Linux offers very little support, and most organizations that use Microsoft require the security of knowing that their software is supported and that they can get help from professionals 24x7. Other students will argue that Linux is a threat since it is an operating system and Microsoft’s main business in operating systems. 3. How is open source software a potential trend shaping organizations? More and more customers are demanding that open-source software be available for all systems. Many customers find themselves in the position of having to pay enormous sums of money to customize software. If the software was open-source, they could customize it themselves. In the future, more and more software vendors will open up their proprietary systems and offer open-source systems.

53 CLOSING CASE THREE Fear the Penguin
How can you use Linux as an emerging technology to gain a competitive advantage? Research the Internet and discover potential ways that Linux might revolutionize business in the future 4. How can you use Linux as an emerging technology to gain a competitive advantage? Answers to this question will vary. One of the biggest advantages of Linux is cost. Any organization that deploys Linux will save money by not having to pay for operating systems and applications. Linux offers a competitor to Microsoft Office that is compatible with Microsoft Office and free. The biggest competitive advantage for Linux is currently cost. 5. Research the Internet and discover potential ways that Linux might revolutionize business in the future. Answers to this question will vary. The important part of your students’ answers will be their justification for how and why Linux might revolutionize business in the 21st century.


Download ppt "IT ARCHITECTURES CHAPTER 5"

Similar presentations


Ads by Google