Presentation is loading. Please wait.

Presentation is loading. Please wait.

See:

Similar presentations


Presentation on theme: "See:"— Presentation transcript:

1 See: http://en.wikipedia.org/wiki/Configuration_managementhttp://en.wikipedia.org/wiki/Configuration_management

2  http://www.chambers.com.au/glossary/confi guration_identification.php http://www.chambers.com.au/glossary/confi guration_identification.php ◦ Read  How Embarrassing Is This  Scenario 4

3  Systems engineering process ◦ Establishes and maintains consistency of a product's performance  Functional and physical attributes with its requirements  Design and operational information ◦ Throughout its life  CM process is widely used by military engineering organizations to manage complex systems, such as ◦ Weapon systems ◦ Vehicles ◦ Information systems

4 From: http://en.wikipedia.org/wiki/ Configuration_management http://en.wikipedia.org/wiki/ Configuration_management

5  Practice of handling changes systematically so that a system maintains its integrity over time  As the system changes, it implements the policies, procedures, techniques, and tools required to: ◦ Manage ◦ Evaluate proposed changes ◦ Track the status of changes ◦ Maintain an inventory of the system ◦ Update support documents

6  Programs and plans that provide technical and administrative direction to the development and implementation of: ◦ Procedures ◦ Functions ◦ Services ◦ Tools ◦ Processes ◦ Resources  Required to successfully develop and support a complex system

7  During system development, CM allows program management to track requirements throughout the life cycle during: ◦ Acceptance ◦ Operations ◦ Maintenance

8  Changes are inevitably made to the requirements and design ◦ They must be approved and documented  Provide an accurate record of the current system status  Ideally the CM process is applied throughout the system lifecycle

9  CM Planning and Management: ◦ A formal document and plan to guide the CM program that includes items such as:  Personnel  Responsibilities and Resources  Training requirements  Administrative meeting guidelines  Including a definition of procedures and tools  Baselining processes  Configuration control and Configuration status accounting  Naming conventions  Audits and Reviews  Subcontractor/Vendor CM requirements

10  Configuration Identification (CI): ◦ Consists of setting and maintaining baselines  Defines the system or subsystem architecture, components, and any developments at any point in time ◦ Basis by which changes to any part of an information system are identified, documented, and later tracked  Throughout design, development, testing, and final delivery ◦ CI incrementally establishes and maintains the definitive current basis for Configuration Status Accounting (CSA) of a system and its configuration items (CIs) throughout their lifecycle until disposal  development, production, deployment, and operational support

11  Configuration Control: ◦ Evaluation of all change requests and change proposals  Tracks subsequent approval or disapproval ◦ Process of controlling modifications to the system's:  Design  Hardware  Firmware  Software  Documentation

12  Configuration Status Accounting: ◦ Process of recording and reporting configuration item descriptions  Including all departures from the baseline during design and production  e.g. all hardware, software, firmware, etc. ◦ Verification of baseline configuration and approved modifications can be quickly determined  In case of suspected problems

13  Configuration Verification and Audit: ◦ Independent review of hardware and software  Assesses compliance with established:  Performance requirements  Commercial and appropriate military standards  Functional, allocated, and product baselines  Configuration audits ◦ Verify the system and subsystem configuration documentation complies with their functional and physical performance characteristics before acceptance into an architectural baseline

14 Wikipedia

15  Traditional software configuration management (SCM) process ◦ Practitioners see it as the best solution to handling changes in software projects ◦ Identifies the functional and physical attributes of software at various points in time  Performs systematic control of changes to the identified attributes  Maintains software integrity and traceability  Throughout the software development life cycle

16  SCM process further defines the need to trace changes ◦ Ability to verify that the final delivered software has all of the planned enhancements that are supposed to be included in the release ◦ Identifies four procedures that must be defined for each software project to ensure that a sound SCM process is implemented:  Configuration identification  Configuration control  Configuration status accounting  Configuration audits

17  Terms and definitions may change from standard to standard, but are essentially the same: ◦ Configuration identification  Process of identifying the attributes that define every aspect of a configuration item  Configuration item is a product that has an end-user purpose  Hardware and/or software  These attributes are recorded in configuration documentation and baselined.  Baselining an attribute forces formal configuration change control processes to be effected in the event that these attributes are changed ◦ Configuration change control  A set of processes and approval stages required to change a configuration item's attributes and to re-baseline them.

18  Terms and definitions (cont.) ◦ Configuration status accounting  Ability to record and report on the configuration baselines associated with each configuration item at any moment of time ◦ Configuration audits  Broken into functional and physical configuration audits  Occur either at delivery or at the moment of effecting the change  Functional configuration audits  Ensure that functional and performance attributes of a configuration item are achieved  Physical configuration audits  Ensure a configuration item is installed in accordance with the requirements of its detailed design documentation

19

20  Information Assurance CM ◦ Management of security features and assurances through control of changes made to  Hardware  Software  Firmware  Documentation  Test  Test fixtures  Test documentation ◦ Throughout the life cycle of an information system

21  Information Assurance CM ◦ CM for information assurance relies upon  performance, functional, and physical attributes of IT platforms and products and their environments  Determines the appropriate security features and assurances that are used to measure a system configuration state ◦ Sometimes referred to as Secure Configuration Management ◦ For example, configuration requirements may be different for a network firewall that functions as part of an organization's Internet boundary versus one that functions as an internal local network firewall

22

23  CM is used to maintain an understanding of the status of complex assets with a view to maintaining the highest level of serviceability for the lowest cost ◦ Aims to ensure that operations are not disrupted due to the overrunning limits of planned lifespan or below quality levels  E.g. the systems have gotten old and unreliable or obsolete

24  In the military, this type of activity is often classed as "mission readiness" ◦ Seeks to define which assets are available and for which type of mission ◦ A classic example is whether aircraft on board an aircraft carrier are equipped with bombs for ground support or missiles for defense

25

26  Configuration management can be used to maintain OS configuration files ◦ Example systems include  CFEngine  Bcfg2  Puppet  Chef

27  Theory of configuration maintenance worked out by Mark Burgess ◦ Practical implementations on present day computer systems ◦ CFEngine is able to perform real time repair as well as preventive maintenance ◦ http://cfengine.com/ http://cfengine.com/

28

29  Understanding the "as is" state of an asset and its major components is an essential element in preventive maintenance as used in maintenance, repair, and overhaul and enterprise asset management systems

30  Complex assets such as aircraft, ships, industrial machinery etc. depend on many different components being serviceable ◦ Serviceability is often defined in terms of the amount of usage the component has had since it was:  New  Since fitted  Since repaired  Amount of use it has had over its life  Several other limiting factors ◦ Understanding how near the end of their life each of these components is has been a major undertaking involving labor intensive record keeping until recent developments in software

31

32  Many types of components use electronic sensors to capture data to provide live condition monitoring  Data can be analyzed: ◦ on board ◦ at remote locations by other computers  This evaluates: ◦ Current serviceability ◦ Likely future state  Uses algorithms which predict potential future failures based on  previous examples of failure through field experience  modeling  Basis for "predictive maintenance"

33  Availability of accurate and timely data is essential in order for CM to provide operational value ◦ Lack of relevent data can often be a limiting factor ◦ Capturing and disseminating the operating data to the various support organizations is becoming an industry in itself

34  Consumers of this PM data have grown more numerous and complex with the growth of programs offered by original equipment manufacturers (OEMs) ◦ Designed to offer operators guaranteed availability  Make the picture more complex  The operator manages the asset  But the OEM takes on the liability to ensure its serviceability ◦ In such a situation, individual components within an asset may communicate directly to an analysis center provided by the OEM or an independent analyst

35 Software configuration management http://en.wikipedia.org/wiki/Soft ware_configuration_management

36  Typical Goals: ◦ Configuration identification  Identifies  Configurations  Configuration items  Baselines ◦ Configuration control  Implements a controlled change process  Usually achieved by setting up a change control board  Primary function is to approve or reject all change requests that are sent against any baseline

37  Typical Goals: ◦ Configuration status accounting  Recording and reporting all the necessary information on the development process status ◦ Configuration auditing  Ensures that configurations contain:  All their intended parts  All specifying documents are sound including:  Requirements  Architectural specifications  User manuals

38  Typical Goals: ◦ Build management  Manages the process and tools used for builds ◦ Process management  Ensures adherence to the organization's development process

39  Typical Goals: ◦ Environment management  Manages the software and hardware that host the system ◦ Teamwork  Facilitate team interactions related to the process ◦ Defect tracking  Making sure every defect has traceability back to the source

40  With cloud computing the purposes of SCM tools have become merged in some cases ◦ SCM tools themselves have become virtual appliances  Can be instantiated as virtual machines  Saved with state and version ◦ Tools can model and manage cloud-based virtual resources, including:  Virtual appliances  Storage units  Software bundles ◦ Roles and responsibilities of the actors have become merged as well  Developers can now dynamically instantiate virtual servers and related resources

41

42  Software configuration management (SCM) in computing ◦ Can be traced back as early as the 1950s  When CM was being applied to software development  Originally used for hardware development and production control

43  Early software had a physical footprint, such as: ◦ Cards ◦ Tapes ◦ Other media..  First software configuration management was a manual operation  With the advances in language and complexity, software engineering became a major concern due to issues like schedule, budget, and quality ◦ Involved configuration management and other methods

44  Practical lessons has led to the definition and establishment of procedures and tools  Eventually these tools became systems to manage software changes ◦ Industry-wide practices were offered as solutions  Either in an open or proprietary manner

45  With the growing use of computers, systems emerged that handled a broader scope, including: ◦ Requirements management ◦ Design alternatives ◦ Quality control ◦ And more…  Later tools followed the guidelines of organizations ◦ Such as the Capability Maturity Model of the Software Engineering Institute

46  Cisco ◦ http://www.cisco.com/en/US/tech/tk869/tk769/te chnologies_white_paper09186a008014f924.shtml http://www.cisco.com/en/US/tech/tk869/tk769/te chnologies_white_paper09186a008014f924.shtml  Chambers ◦ http://www.chambers.com.au/glossary/configurati on_management.php http://www.chambers.com.au/glossary/configurati on_management.php ◦ http://www.chambers.com.au/glossary/configurati on_identification.php http://www.chambers.com.au/glossary/configurati on_identification.php


Download ppt "See:"

Similar presentations


Ads by Google